An Information Operations Theory of Domestic Counterterrorism Efforts

80 Pages Posted: 7 May 2019 Last revised: 17 Apr 2020

See all articles by Tung Yin

Tung Yin

Lewis & Clark College Paul L Boley Library

Date Written: April 22, 2019

Abstract

Terrorism is asymmetric warfare, and counterterrorism can be thought of as information operations – using information to deceive, confuse, and identify/locate the enemy. Reading threatening public social media postings, following up on tips, and conducting electronic surveillance of emails all find analogues in information operations. Using undercover sting operations to discern the intentions of the targets serves a number of the purposes of information warfare, including identification and deception of the enemy. But a critical conclusion of the analogy is that such sting operations need to mimic actual terrorist recruiting, or else they are not accurately identifying and detecting the enemy.

Keywords: terrorism, counterterrorism, information operations, electronic surveillance, undercover sting operations, information warfare, law enforcement deception

JEL Classification: K14, K42

Suggested Citation

Yin, Tung, An Information Operations Theory of Domestic Counterterrorism Efforts (April 22, 2019). South Carolina Law Review, Vol. 71 (2019), Available at SSRN: https://ssrn.com/abstract=3376197

Tung Yin (Contact Author)

Lewis & Clark College Paul L Boley Library ( email )

10015 S.W. Terwilliger Blvd.
Portland, OR 97219
United States

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
69
Abstract Views
649
Rank
599,109
PlumX Metrics