Shifting PSYOP Emphasis from Asymmetric Threats to Peers

news  %tages Shifting PSYOP Emphasis from Asymmetric Threats to Peers While the threat from terrorists and other asymmetric enemies ruins real and potent – there is fantastic concern in this area historic and new peer-sized threats. The maturation of the cyber domain as a battlefield has brought with it a resurgence of nation-state enemies and adversaries. Chief amongst them is Russia. On November 1, 2016 Reuters reported “UK spy chief sees growing threats from Russian cyber- attacks, espionage” (see: the days of the Cold War it was relatively simple to stereotype the Russians as illustrated by my friends to the right: Boris Badenov, Natasha Fatale and Fearless Leader; characters in the Rocky and Bullwinkle cartoon series. The Russians have always understood the need to control information that has also become a strategic imperative that they have passed by the side of to other countries within their political umbrella. The article clarification that cyber attacks and espionage are increasingly being used to advance Russian foreign policy goals.There were a digit of media reports indicating that the Russians had the capability to hack voting systems and thereby impact the US Presidential appointment.The PRC has also been reportedly active in cyber attacks, while perhaps not as subtle as their Russian counterparts, PRC hackers also represent a state sponsored well-resourced and sophisticated threat.The implications for US political and military strategies are profound and the appointment of an avid Tweeter as President may really be a clear sign for PSYOP. President-elect Trump, for all is other characteristics, is far more aware of the power of mass media and the importance of Social Media. Perhaps his new cabinet will be directed to formulate an shape strategy that will meld all of government’s shape resources – military and if not – as well as dedicate the cyber resources necessary to help such a strategy. Photo source:

We were also found by phrases:

Leave a Reply

Your email address will not be published. Required fields are marked *


× 7 = seven

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>