Psyops and Perception Management. CSCE 727 - Farkas2 Perception Management Information operations that aim to affect perception of others to influence.

Slides:



Advertisements
Similar presentations
Freedom of Expression Prepared By Najib sani & Muhammad Tajuddeen M.
Advertisements

The First Amendment guarantees people the right to express themselves through speech and writing – Allows everyone to hear opinions and ideas of others.
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Information Warfare and Internet Resources. Andrianova Maria Igorevna Saratov State University, Sociology Department, 4 year student.
Propaganda & Persuasion Persuasion A communication process to influence others Recipient voluntarily adopts new behavior or point of view Mutually satisfying.
Background Information Definition:. Background Information Controversy Ex)
An Introduction to Integrated Marketing Communications
1 Freedom of Expression Prepared By Joseph Leung.
Cyberbullying Internet Saftey: Information for H.S. Students.
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Chapter 5 Freedom of Expression
Chapter Fourteen Communicating Customer Value: Integrated Marketing Communications Strategy.
Freedom of Speech and Freedom of Assembly. The Purpose of Freedom of Speech 1 to guarantee to each person a right of free expression, in the spoken and.
Freedom of Speech in Cyberspace
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
The Information Battleground Terrorist Violence and the Role of the Media.
Munitions of the Mind “For to win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the acme.
14 -1 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall i t ’s good and good for you Chapter Fourteen Communicating Customer Value:
Ch3 Freedom of Speech The US Constitution.
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Information Warfare Playgrounds to Battlegrounds.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3
Journalism Chapter 2 Making Ethical Choices. ethics Branch of philosophy that deals with right and wrong.
Chapter 12 The Media. Copyright © 2011 Cengage WHO GOVERNS? WHO GOVERNS? 1.How much power do the media have? 2.Can we trust the media to be fair? TO WHAT.
Introduction to Mass Media HISTORY INDUSTRY CONTROVERSY.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Media Law: Understanding Freedom of Expression Chapter Outline  History  Today’s Media Law  Controversies.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
Freedom of Speech First Amendment Expression, Speech and Symbolic Speech.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
Media Law. Media law You are the online editor of your campus newspaper. A person using a pseudonym has posted a message on your website that could be.
Chapter 11.2 The Mass Media. Types of Media  The mass media influence politics and gov’t. They also form a link between the people and elected officials.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
The Mass Media Mass media – all the means for communicating any information to the general public. News media condense and clarify stories, alert the.
Information Warfare Playgrounds to Battlegrounds.
Computer crimes.
PROPAGANDA DEFINITIONS. Definitions of Propaganda From Latin propagatio: to grow, to spread, to multiply. Propaganda = to disseminate, to propagate but.
Jeopardy Media If you read the chapter this is easy “That would be a great test question” Chapter stuff Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q.
Chapter 12 The Media. Copyright © 2013 Cengage WHO GOVERNS? WHO GOVERNS? 1.How much power do the media have? 2.Can we trust the media to be fair? TO WHAT.
Canadian World War II Propaganda.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
A Crash Course in Press Law For the High School Press.
PROPAGANDA AND POLITICS The Power of Words. Walter Lippman “We must remember that in time of war what is said on the enemy’s side of the front is always.
© 2010 Pearson Education Chapter 6 The Media. Case Study: YouTube YouTube (youtube.com) Began in 2005 Has helped change the political landscape for candidates.
Communicating Customer Value: Integrated Marketing Communications Strategy Copyright ©2014 by Pearson Education, Inc. All rights reserved.
Psyops and Perception Management. CSCE Farkas2 Perception Management Information operations that aim to affect perception of others to influence.
Chapter 14 - slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter Fourteen Communicating Customer Value: Integrated Marketing.
Propaganda. Commercial Advertisement vs. Propaganda Advertising encourages your desire for consumer goods, services and ideas using suggestive images.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3.
Social Engineering Charniece Craven COSC 316.
Presented by Ika Novita Dewi, MCS
Freedom of Expression.
Psyops and Perception Management
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Bill of Rights- First Amendment Notes
Online Legal and Ethical Issues
Propaganda.
Propaganda.
Chapter 12 The Media.
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Psyops and Perception Management

CSCE Farkas2 Perception Management Information operations that aim to affect perception of others to influence – Emotions – Reasoning – Decisions – Actions Related to Psychological Operations Influence behavior by affecting human Psyche (fear, desire, logic, etc.)

Injecting Content into Target’s Information Space Targeted population Communication medium – Any medium that can be exploited – Face-to-face, print, telecommunication, internet, etc. – Real time, broad audience (television, video, etc.) CSCE Farkas3

4

5

CSCE Farkas6

7 Covert Action “…attempt by one government to pursue its foreign policy objectives by conducting some secret activity to influence the behavior of a foreign government or political, military, economic, or societal events and circumstances in a foreign country.” (Silent Warfare)

CSCE Farkas8 Covert Total secrecy: details or even the existence of activities are confidential Unaccounted: actions are public knowledge but government involvement is concealed Goal: direct furthering of national foreign policy objectives Wide range of activities: – Radio Free Europe, e/Radio_Liberty e/Radio_Liberty

CSCE Farkas9 Perception of a Foreign Government Goal: change foreign government’s policy to support offense’s political interest Influence – Foreign government’s perception – Perceptions of elements of foreign society

CSCE Farkas10 Agents of Influence Influence directly government policy Data collection is not necessary Persuade colleagues to adopt certain policies E.g., government officials – s: Soviet intelligence agents working for U.S. government (Harry Dexter White – Assistant Secretary of the Dept. of Treasury), intelligence/csi-publications/csi- studies/studies/vol49no1/html_files/harry_dexter_8.htm l intelligence/csi-publications/csi- studies/studies/vol49no1/html_files/harry_dexter_8.htm l

CSCE Farkas11 Agent of Influence Trusted contact – willing to work for a foreign government, no detailed instructions, not paid Controlled agent – receives precise instructions, usually paid Manipulated agent – unaware of serving a foreign government

CSCE Farkas12 Use of Information and Disinformation Providing information (or misinformation) – Influence a desired action – E.g., revealing identities of opponents’ intelligence agents Origin of information Sender of information Misinformation – Plausible – “silent forgery” – “deception operation”

CSCE Farkas13 Perception of Foreign Society Hard to measure Cumulative effect over long period of time Agents of Influence – Interact with public – journalists, TV commentator, etc. – Prominent person – political figure, aid organization, etc. Culture

CSCE Farkas14 Unattributed Propaganda “Black” propaganda: origin is concealed Disseminating opinions, information or misinformation via media Government may not be directly associated with materials – Increase believability – Government may not want to be associated with certain opinions

CSCE Farkas15 Unattributed Propaganda “Gray” propaganda: origin not public knowledge E.g., Radio Free Europe, Radio Liberty – Information about targets’ own countries – Information about the West – Set up as private U.S. organizations but were run by CIA Planting stories in independent news media

Global vs. Local Propaganda US WW I. posters, US WW II posters, War-II-Propaganda-Vintage-Art-Posters_c50710_.htmhttp:// War-II-Propaganda-Vintage-Art-Posters_c50710_.htm Chinese posters, Cultural Revolution, CSCE Farkas16

CSCE Farkas17 Offensive Operations Information Space Communication Medium: any (TV, radio, Internet, Web sites, , news groups, etc.) Target: individuals, groups, nations, World

CSCE Farkas18 Internet Global Access – mass audiences Easy to set up Web sites Low cost (compare with broadcasting radio, TV, etc.) “great equalizer” Authority over Internet?

CSCE Farkas19 Tools for Perception Management In War and Anti-War by Alvin and Heidi Toffler: 1. Atrocity accusations (true or false) 2. Hyperbolic inflation of stakes 3. Demonization and/or dehumanization of enemy 4. Polarization (if you are not with me, you are against me) 5. Claim of divine sanction 6. Meta-propaganda (discredit opponent’s propaganda)

CSCE Farkas20 Psyops Affect human psyche – Goal: influence behavior – Means: fear, desire, logic, etc.

CSCE Farkas21 From:

CSCE Farkas22 Lies and Distortions Widely used Destroys the integrity of the carrying media Cultural Differences? Ethical/unethical? Bad/Useful? Digital media – Fabrication, spoofed originator, modification, etc. – Easy to carry out – Trust in observation (senses: see, hear, touch, taste, etc.)

CSCE Farkas23 Distortion Distort information Conscious/Unconscious Important elements ignored, down played Insignificant elements made to appear important Digital media: – Web page metatags: hidden data

CSCE Farkas24 Fabrication Fake information Must seem legitimate Goal: influence decision/activities of enemy or competition, financial gain, popularity, etc. Can be very effective Must know target Errors and intentional fabrications

CSCE Farkas25 Hoaxes Fabrications to – Amuse – Create fear – Discredit/damage Digital media: – Easy to send hoax mail or post information – Virus hoaxes

CSCE Farkas26 Social Engineering Trick people into doing something they would not do if the truth is known. Means: – Impersonating – Threatening – Pretend position/relationship/urgency/etc.

CSCE Farkas27 Denouncement Discredit, defame, demonize, or dehumanize an opponent Goal: gain of support for the entity performing the denouncement and loss for the adversary Military/politics/economy/personal Hate groups Conspiracy theory Defamation: damage the reputation and good name of another

CSCE Farkas28 Harassment Targets opponent directly Unwanted, threatening messages Communication: in person, via medium Examples: – Physical threat – Hate mails – Sexual harassment

CSCE Farkas29 Advertising Scam: cone artists lure customers into scam – Fake prizes, telemarketing, etc. – Internet: easy solicitations – junk , chat room, newsgroups, Web site, etc. Spam: junk – Time consuming: read/process/delete – Unwanted/useless/harmful data

CSCE Farkas30 United State Restrictions First Amendment to the Constitution of the United States: freedom of speech and press – Exception: child pornography, offensive and harmful speech, obscene material, etc. – Materials depicting violence ? 1996: Communications Decency Act (US congress) – Indecent material – restricting access to minors – Controversial – civil liberties groups 1997: Supreme Court ruled that CDA sections 223 and 224 abridged First Amendment rights