2011
DOI: 10.21236/ada544900
|View full text |Cite
|
Sign up to set email alerts
|

Re-integrating Influence and Cyber Operations

Abstract: The art of influence operations as a subset to information operations as well as personnel that practice influence operations for the military have been doctrinally removed from conducting cyber operations. With the openness that the military has created to social networking as a tool for soldiers, the fact that many of the greatest cyber espionage tactics involve a form of influence operations tactic, often in the form of social engineering, to gain, maintain and exploit networks. Continued ignorance in this … Show more

Help me understand this report

This publication either has no citations yet, or we are still processing them

Set email alert for when this publication receives citations?

See others like this or search for similar articles