An Information Operations Theory of Domestic Counterterrorism Efforts

80 Pages Posted: 7 May 2019 Last revised: 17 Apr 2020

See all articles by Tung Yin

Tung Yin

Lewis & Clark Law School

Date Written: April 22, 2019


Terrorism is asymmetric warfare, and counterterrorism can be thought of as information operations – using information to deceive, confuse, and identify/locate the enemy. Reading threatening public social media postings, following up on tips, and conducting electronic surveillance of emails all find analogues in information operations. Using undercover sting operations to discern the intentions of the targets serves a number of the purposes of information warfare, including identification and deception of the enemy. But a critical conclusion of the analogy is that such sting operations need to mimic actual terrorist recruiting, or else they are not accurately identifying and detecting the enemy.

Keywords: terrorism, counterterrorism, information operations, electronic surveillance, undercover sting operations, information warfare, law enforcement deception

JEL Classification: K14, K42

Suggested Citation

Yin, Tung, An Information Operations Theory of Domestic Counterterrorism Efforts (April 22, 2019). South Carolina Law Review, Vol. 71 (2019), Available at SSRN:

Tung Yin (Contact Author)

Lewis & Clark Law School ( email )

10015 S.W. Terwilliger Blvd.
Portland, OR 97219
United States

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Abstract Views
PlumX Metrics