An Information Operations Theory of Domestic Counterterrorism Efforts
80 Pages Posted: 7 May 2019 Last revised: 17 Apr 2020
Date Written: April 22, 2019
Terrorism is asymmetric warfare, and counterterrorism can be thought of as information operations – using information to deceive, confuse, and identify/locate the enemy. Reading threatening public social media postings, following up on tips, and conducting electronic surveillance of emails all find analogues in information operations. Using undercover sting operations to discern the intentions of the targets serves a number of the purposes of information warfare, including identification and deception of the enemy. But a critical conclusion of the analogy is that such sting operations need to mimic actual terrorist recruiting, or else they are not accurately identifying and detecting the enemy.
Keywords: terrorism, counterterrorism, information operations, electronic surveillance, undercover sting operations, information warfare, law enforcement deception
JEL Classification: K14, K42
Suggested Citation: Suggested Citation