Counter Information Messaging

Counter Information Messaging

Question (V1): What is Missing from Counter Messaging in the Information Domain. What are USCENTCOM and the global counter-ISIL coalition missing from countermessaging efforts in the information domain? Author | Editor: Canna, S. (NSI, Inc). “Western countries have...
Info OPs in Iraq and Syria

Info OPs in Iraq and Syria

Question (S3): What must the coalition do in the information environment to achieve its objectives in Iraq and Syria and how can it deny adversaries the ability to achieve theirs?Author | Editor: Spitaletta, J. (Johns Hopkins University Applied Physics Laboratory)....
Applying Bio-Psycho-Social to Cognitive Engagement

Applying Bio-Psycho-Social to Cognitive Engagement

White Paper on Bio-Psycho-Social Applications to Cognitive Engagement. Author | Editor: Spitaletta, J. (Johns Hopkins University Applied Physics Laboratory). The recently released White Paper entitled “Assessing and Anticipating Threats to US Security Interests: A...
Protecting Homeland from Int’l & Domestic Terrorism

Protecting Homeland from Int’l & Domestic Terrorism

Protecting the Homeland from International and Domestic Terrorism Threats: Current Multi-Disciplinary Perspectives on Root Causes, the Role of Ideology, and Programs for Counter-radicalization and Disengagement. Author | Editor: Fenstermacher, L. (Air Force Research...
Countering Terrorism with IT and Privacy Protection

Countering Terrorism with IT and Privacy Protection

Countering Terrorism through Information and Privacy Protection Technologies Author: Popp, R. & Poindexter, J. Abstract Security and privacy aren’t dichotomous or conflicting concerns—the solution lies in developing and integrating advanced information...