2788:
fundamental to effective PSYOP and IO. This is particularly important in the early stages of an operation given the time it takes to develop, design, produce, distribute, disseminate, and evaluate PSYOP products and actions. All PSYOP are conducted under the authority of interagency-coordinated and OSD approved PSYOP programs. The PSYOP program approval process at the national level requires time for sufficient coordination and resolution of issues; hence, JFCs should begin PSYOP planning as early as possible to ensure the execution of PSYOP in support of operations. A JFC must have an approved PSYOP program, execution authority, and delegation of product approval authority before PSYOP execution can begin. JFCs should request PSYOP planners immediately during the initial crisis stages to ensure the JFC has plenty of lead time to obtain the proper authority to execute PSYOP. PSYOP assets may be of particular value to the JFC in pre-/post-combat operations when other means of influence are restrained or not authorized. PSYOP must be coordinated with CI, MILDEC, and OPSEC to ensure deconfliction and control, CI operations are not compromised, and that all capabilities within IO are coordinated to achieve the objectives established in planning. There must be close cooperation and coordination between PSYOP and PA staffs in order to maintain credibility with their respective audiences, which is the purpose of the IO cell. PSYOP efforts are most effective when personnel with a thorough understanding of the language and culture of the TA are included in the review of PSYOP materials and messages. As the information environment evolves, the dissemination of PSYOP products is expanding from traditional print and broadcast to more sophisticated use of the
Internet, facsimile messaging, text messaging, and other emerging media. The effectiveness of PSYOP is enhanced by the synchronization and coordination of the core, supporting, and related capabilities of IO; particularly
2837:
forces' mission. MILDEC and OPSEC are complementary activities – MILDEC seeks to encourage incorrect analysis, causing the adversary to arrive at specific false deductions, while OPSEC seeks to deny real information to an adversary, and prevent correct deduction of friendly plans. To be effective, a MILDEC operation must be susceptible to adversary collection systems and "seen" as credible to the enemy commander and staff. A plausible approach to MILDEC planning is to employ a friendly course of action (COA) that can be executed by friendly forces and that adversary intelligence can verify. However, MILDEC planners must not fall into the trap of ascribing to the adversary particular attitudes, values, and reactions that "mirror image" likely friendly actions in the same situation, i.e., assuming that the adversary will respond or act in a particular manner based on how we would respond. There are always competing priorities for the resources required for deception and the resources required for the real operation. For this reason, the deception plan should be developed concurrently with the real plan, starting with the commander's and staff's initial estimate, to ensure proper resourcing of both. To encourage incorrect analysis by the adversary, it is usually more efficient and effective to provide a false purpose for real activity than to create false activity. OPSEC of the deception plan is at least as important as OPSEC of the real plan, since compromise of the deception may expose the real plan. This requirement for close hold planning while ensuring detailed coordination is the greatest challenge to MILDEC planners. On joint staffs, MILDEC planning and oversight responsibility is normally organized as a staff deception element in the operations directorate of a joint staff (J-3).
2689:(EMS) while protecting friendly freedom of action in that spectrum. Expanding reliance on the EMS for informational purposes increases both the potential and the challenges of EW in IO. The increasing prevalence of wireless telephone and computer usage extends both the utility and threat of EW, offering opportunities to exploit an adversary's electronic vulnerabilities and a requirement to identify and protect our own from similar exploitation. As the use of the EMS has become universal in military operations, so has EW become involved in IO. All of the core, supporting, and related IO capabilities can either directly use EW or indirectly benefit from EW. In order to coordinate and deconflict EW, and more broadly all military usage of the EMS, an Electronic Warfare Coordination Cell (EWCC) may be established to reside with the component commander most appropriate to the operation. In addition, all joint operations require a joint restricted frequency list (JRFL). This list specifies protected, guarded, and taboo frequencies that should not normally be disrupted without prior coordination and planning, either because of friendly use or friendly exploitation. This is maintained and promulgated by the communications system directorate of a joint staff (J-6) in coordination with J-3 and the joint commander's electronic warfare staff (or EWCC, if delegated).
3715:"There must be a fundamental change of culture in how ISAF approaches operations. StratCom should not be a separate Line of Operation, but rather an integral and fully embedded part of policy development, planning processes, and the execution of operations. Analyzing and maximizing StratCom effects must be central to the formulation of schemes of maneuver and during the execution of operations. In order to affect this paradigm shift, ISAF HQ must synchronize all stratCom stakeholders. Implicit in this change of culture is the clear recognition that modern strategic communication is about credible dialogue, not a monologue where we design our systems and resources to deliver messages to target audiences in the most effective manner. This is now a population centric campaign and no effort should be spared to ensure that the Afghan people are part of the conversation. Receiving, understanding, and amending behavior as a result of messages received from audiences can be an effective method of gaining genuine trust and credibility. This would improve the likelihood of the population accepting ISAF messages and changing their behavior as a result."
3258:
communications tool used to broadcast information where radio ownership exceeds 80 percent. The United States military operates approximately 100 RIABs and hire local Afghan DJs in
Afghanistan to broadcast information and host call-in shows. The United States Army employed RIAB systems to broadcast anti-Taliban and anti-Al Qaeda messages and countered Taliban propaganda by pushing onto Taliban frequencies in Paktia Province. One advantage of employing RIAB systems is the ability to broadcast vital information immediately to a large audience in the event of a crisis. One Afghan DJ has 50,000 listeners. Nawa District Governor Abdul Manaf uses the local RIAB station to conduct weekly call-in shows and believes the RIAB system is one of his best communication tools to inform a large audience. In Afghanistan's Paktika province, which has a literacy rate of two percent, an estimated 92 percent of the residents listen to the radio every day. Radio programs transmitted using RIAB systems provide beneficial information to Afghan farmers in remote areas. In the isolated, mountainous Wazi Kwah district of
3393:"Terrorists employ all the IO capabilities of U.S. military doctrine, including the five core capabilities of PSYOP, military deception, EW, CNO, and OPSEC, and the supporting and related capabilities. They use IO to support both offensive operations (acts of terrorism) and defensive operations (e.g., protecting their hiding places). They use IO strategically in support of broad objectives. While terrorists do not speak and write of "IO", they demonstrate an understanding of the value and methods of IO capabilities. Terrorists appear to be particularly adept at PSYOP, PA, counterpropaganda, and certain forms of OPSEC and deception, driven by their desire to simultaneously reach desired audiences and hide from their enemies. They recognize the value of various media, including the Internet, and exploit it to support their cause. Terrorists and their supporters have a CNO capability, with CNA manifesting itself as "electronic jihad" rather than as acts of terror."
647:
456:
418:
398:
436:
3712:"In , the most important targets of influence are not enemy commanders, but individuals and groups, both local and international, whose cooperation is vital to the mission's success. Granted, joint and Army IO doctrine publications do not ignore these targets – PSYOP and counterpropaganda can be designed to influence them. But it is notable that the activities most directly aimed at influencing local and international audiences – functions such as public affairs, civil affairs, CMOs, and defense support to public diplomacy – are treated only as 'related activities' in IO doctrine, if they are mentioned at all"
269:
2875:
capabilities that exploit new opportunities and vulnerabilities, such as EW and CNO, OPSEC is essential to ensure friendly capabilities are not compromised. The process of identifying essential elements of friendly information and taking measures to mask them from disclosure to adversaries is only one part of a defense-in-depth approach to securing friendly information. To be effective, other types of security must complement OPSEC. Examples of other types of security include physical security, IA programs, computer network defense (CND), and personnel programs that screen personnel and limit authorized access.
2636:
378:
2752:
569:
3036:(FBM) submarine force and as a backup communications link for the USAF manned strategic bomber and intercontinental ballistic missile forces. To ensure survivability, TACAMO operated as a solo platform, well away from and not interacting with other major naval forces such as sea-based aircraft carrier strike groups and their carrier air wings or land-based maritime patrol aircraft Operated by Fleet Air Reconnaissance Squadron THREE (VQ-3) and Fleet Air Reconnaissance Squadron FOUR (VQ-4), the EC-130Q was eventually replaced by the U.S. Navy's current TACAMO platform, the
2695:. DOD now emphasizes maximum control of the entire electromagnetic spectrum, including the capability to disrupt all current and future communication systems, sensors, and weapons systems. This may include: (1) navigation warfare, including methods for offensive space operations where global positioning satellites may be disrupted; or, (2) methods to control adversary radio systems; and, (3) methods to place false images onto radar systems, block directed energy weapons, and misdirect unmanned aerial vehicles (UAVs) or robots operated by adversaries.
2827:
2776:
2841:
their efforts. This requires a high degree of coordination with all elements of friendly forces' activities in the information environment as well as with physical activities. Each of the core, supporting, and related capabilities has a part to play in the development of successful MILDEC and in maintaining its credibility over time. While PA should not be involved in the provision of false information, it must be aware of the intent and purpose of MILDEC in order not to inadvertently compromise it.
596:
2656:
3540:"...immediate concerns also include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups..." (p. 9–10)
34:
526:
3262:, a RIAB system supplies the only source of outside news. Afghan National Army commanders use the RIAB to communicate to villagers and elders and provide thoughts to the community. Afghans can use information distributed by the United States military such as how to react to an approaching military convoy or purpose or use of U.S.-sponsored agriculture programs. For general news, Afghans can also use other information outlets such as the
3543:"International interest in R&D for steganography technologies and their commercialization and application has exploded in recent years. These technologies pose a potential threat to national security. Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great." (p. 41–42)
2978:, and military communications bands. Missions are flown at the maximum altitudes possible to ensure optimum propagation patterns. The EC-130J flies during either day or night scenarios with equal success, and is air-refuelable. A typical mission consists of a single-ship orbit which is offset from the desired target audience. The targets may be either military or civilian personnel. The Commando Solo is operated exclusively by the
347:
179:
2768:
2866:
95:
3420:
destruction of numerous NATO armoured vehicles and the deaths of scores of
Western or Afghan security forces, with NATO quickly countering in its own Twitter feeds. The Taliban also employ a sophisticated network of spokesmen to distribute messages and even have their own mobile radio broadcast service, which frequently moves location to avoid the threat of retaliatory airstrikes by NATO warplanes."
5622:
3628:
3344:
3250:
3106:, White House Coordinator for Arms Control and Weapons of Mass Destruction, in which he said, "we're glad they are having trouble with their centrifuge machine and that we – the US and its allies – are doing everything we can to make sure that we complicate matters for them", offering "winking acknowledgement" of US involvement in Stuxnet. According to the
226:. Though these examples fall within the capabilities associated with information operations, they were applied in specific circumstances for particular missions and not de-conflicted or synchronized for maximum effect. Because of their discrete applications, information operations was not fully exercised during the war as it is known today.
3389:"Terrorists are adept at integrating their physical acts of violence with IO. They make audio and video recordings of the incidents for distribution over the Internet and on television. Their violence becomes theater, staged for its psychological impact, and replayed over and over again in the media as IO."
3708:
the previous year. Hastings' article "The Run Away
General" ultimately led to McChrystal's firing by President Obama. Media reports stated that the Holmes' IO unit was subjected to a retaliatory campaign when it resisted the order to influence the targets, including a subsequent reprimand against Lt.
3606:
reportedly received a coded email message that read: "The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering." The faculties referred to the four targets (twin
3562:
A police search of a
British, al-Qaeda member's home, uncovered what is now called "The al-Qaeda Training Manual", a techniques instruction book on deception, forgery, "blending in", hiding places, and the use of covers to blend into the terrorist area of operation (usually cities with large civilian
194:", on January 20, 1944. This secretive unit was responsible for executing 22 large-scale military deceptions in Europe using techniques such as inflatable vehicles, false radio transmissions, loud-speaker sound effects, and phone generals. Specific operations the 23rd was noted for having success was
3553:
By early 2002, a
Cranfield University MSc thesis developed the first practical implementation of an online real-time Counter Terrorist Steganography Search Engine. This was designed to detect the most likely image steganography in transit and thereby provide UK Ministry of Defence Intelligence Staff
285:
system. These directorates typically have an array of personnel from information operations generalists, intelligence analysts, psychological operations specialists, and cyber and electronic warfare officers. Different headquarters have included civil affairs, space and cyberspace operations within
3581:
The
Internet is the main resource to spread propaganda with al-Aqaeda and other terrorist groups. "According to Bruce Hoffman, before it was taken down, al-Qaeda's website Alneda.com emphasized three themes: 1)the West is implacably hostile to Islam, 2) the only way to address this threat and the
3577:
Terrorist PSYOP differs from
American PSYOP in one two major areas. First, US PSYOP targets foreign adversaries and information is coordinated with many other agencies and screened before it is published. Second, while PSYOP by US and coalition forces is "designed to bring an end to violence and
2874:
OPSEC as an IO Core
Capability. OPSEC denies the adversary the information needed to correctly assess friendly capabilities and intentions. In particular, OPSEC complements MILDEC by denying an adversary information required to both assess a real plan and to disprove a deception plan. For those IO
2840:
MILDEC as an IO Core
Capability. MILDEC is fundamental to successful IO. It exploits the adversary's information systems, processes, and capabilities. MILDEC relies upon understanding how the adversary commander and supporting staff think and plan and how both use information management to support
2717:
CNO as an IO Core Capability. The increasing reliance of unsophisticated militaries and terrorist groups on computers and computer networks to pass information to C2 forces reinforces the importance of CNO in IO plans and activities. As the capability of computers and the range of their employment
2836:
MILDEC is described as being those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly
2830:
Simulated OH-58C Kiowa helicopter and simulated fuel blivets during a deception operation on 10 November 1990 carried out by the XVIII Airborne Corps Deception Cell. This simulated forward arming and refueling point (FARP) at TL 139512 in the Eastern Province of Saudi Arabia was approximately 45
2787:
PSYOP has a central role in the achievement of IO objectives in support of the JFC. In today's information environment even PSYOP conducted at the tactical level can have strategic effects. Therefore, PSYOP has an approval process that must be understood and the necessity for timely decisions is
236:
In the mid-1990s, the U.S. Department of Defense began characterizing doctrine known as Command and Control Warfare (C2W) which was described as a strategy to attack the decision-making, or command and control (C2) capabilities of an adversary while protecting the decision-making capabilities of
3410:
As for CND, terrorists are aware of keeping data secure and websites running because they use the Internet. Hamas and Hizballaha have had to defend their websites from Israeli hackers who in the past have defaced them. The methods they use include access controls, encryption, authentication,
2844:
A message targeted to exploit a fissure between a key member of the adversary's leadership who has a contentious relationship with another key decision maker is an example. That message could cause internal strife resulting in the adversary foregoing an intended course of action and adopting a
2666:
Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly
4902:
276:
Information Operations is considered an umbrella term to describe the coordination activities required to plan, synchronize, and assess operations, activities, and investments typically related to the non-lethal capabilities of psychological operations, cyberspace operations, civil-military
3419:
with NATO forces in the country, distributing anti-government messages on mobile phone networks and using Twitter to claim largely improbable successes as most foreign combat troops look to leave the country by 2014. A day rarely passes without a Taliban spokesman using Twitter to claim the
614:
Many U.S. Air Force units have redesignated between Information Operations, Cyberspace Operations, and Intelligence. For example, the 39th IO Sqdn's official website identifies itself as a subordinate organization of the 688th Information Operations Wing, however the Wing's official website
3257:
Radio is the dominant information tool to reach wide audiences in isolated, mountainous regions. The US military has deployed RIABs throughout Afghanistan in order to communicate with the residents. Due to a 70 percent illiteracy rate and lack of education in Afghanistan, radio is a vital
259:
During this time, the Army National Guard began to engage in developing their own information operations capabilities, establishing ad hoc information operations field support teams (FSTs), and vulnerability assessments teams (VATs), coordinated with the LIWA/IDC. National Guard units from
2887:, or upload photos, which can lead to the enemy knowing troop movements and locations. With this information, setting up ambush and wreaking havoc on US and support personnel becomes much easier. Geo-tagging features of cellular phones especially, may cause this type of breach in OPSEC.
3597:
All terrorists practice a high level of OPSEC since their need to be secret is how they can be successful. Whether it is the al-Qaeda training manual, online magazines targeted for the world, or the training of youth in Jihad camps, OPSEC is one of the first priorities for terrorists.
248:
approved the Department of Defense release of a then Secret Directive S-3600.1 that codified the concept of Information Operations. This directive mandated the U.S. Armed Services to develop their own doctrine, training, and equipment, to execute information operations.
3284:--The SOMS-B is a ground-based HMMWV mounted radio and television broadcast system. Like the EC-130C/J it can broadcast on AM, FM, SW and VHF television frequencies. The SOMS-B also has the capability to produce programming or radio and television broadcasts
4421:
2718:
broadens, new vulnerabilities and opportunities will continue to develop. This offers both opportunities to attack and exploit an adversary's computer system weaknesses and a requirement to identify and protect our own from similar attack or exploitation.
2878:
What occurs, often, is that data is either leaked, stolen, or hacked online and the enemy has access to and can decipher what that information may say. This is especially true for defensive operational security. US servicemen and servicewomen may have
2799:
Psychological operations are planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and
372:, units division-sized or larger have an IO staff directorate, known as the G-39, responsible for the integration of information operations capabilities. These directorates are often augmented by IO Field Support Teams from the following Army IO units:
3270:
because RIAB systems are controlled by the US military. Special Operations first employed RIAB systems in Afghanistan in 2005 which improved their ability to supply information to and communicate with the local population in their areas of operation.
3402:
There are many examples of CNA and are generally done in support of other operations. Terrorists have integrated cyber attacks into their thinking, strategies, and operations as an extremely cost-effective way to harm the US and other adversaries.
3406:
The same can be said for CNE, which is about penetrating computer networks before actually attacking them. Gaining access to specific networks is seen to be as part of the CNA process for terrorists (they do not distinguish between the two).
170:(OPSEC), in concert with specified supporting and related capabilities, to Information Operations (IO) are actions taken to affect adversary information and information systems while defending one's own information and information systems.
3601:
Secure communications are big as well. The 11 September hijackers, for example, accessed anonymous Hotmail and Yahoo! accounts from computers at Kinko's and at a public library. Messages are also coded. Three weeks before the attacks,
237:
friendly forces. It focused on a robust targeting system and defined five core capabilities, called pillars, it leverages: operations security, military deception, psychological operations, electronic warfare, and physical destruction.
198:
and Operation Viersen. Today the 23rd, has been attributed as saving the lives of 15,000 to 30,000 American service members. In the Pacific, the Navy successfully conducted its first electronic warfare activities later in the war when
5506:
3923:
3484:
on 5 February 2001 in two articles titled "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". In July the same year, an article was titled even more precisely: "Militants wire Web with links to
3423:
The Taliban HAVE to rely on CNO and integrate it into their IO campaign as it is the most cost-effective method of disrupting Western forces. This is a prime example of how CNO is used in conjunction with PSYOP to achieve their
2725:
Computer network defense (CND). Actions are taken through the use of computer networks to protect, monitor, analyze, detect and respond to unauthorized activity within the Department of Defense information systems and computer
3320:
from 1985 to 1993 and was re-launched in January 2002. RFA produces a variety of cultural, political, and informational programs that are transmitted to listeners via shortwave, satellite and AM and FM signals provided by the
3950:
3578:
save lives, terrorist PSYOP is frequently directed toward promoting violence and threatening civilian populations with death and destruction. Suicide bombers are portrayed as martyrs rather than killers of innocent people."
330:, with the intent of coordinating and executing U.S. information operations at the strategic level. On September 12, 2011, by executive order, the JIOWC was chartered as a Chairman's Controlled Activity aligned under the
2916:(ABCCC) was based on a basic C-130E platform and provided tactical airborne command post capabilities to air commanders and ground commanders in low air threat environments. This EC-130E ABCCC has since been retired.
2729:
Computer network exploitation (CNE). Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or
4794:
4779:
4723:
2721:
Computer network attack (CNA). Actions are taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks
508:
Most Army commissioned officers, warrant officers, and noncomissioned officers have the option of earning the P4 Information Operations Additional Skill Identifier (ASI) by attending one of two 10-day courses:
492:. Phase one consists of 415 hours of study consisting of 20 four-hour synchronous class periods held weekly. Phase 2 is a 15-day resident exercise held at the Regional Readiness Training Center collocated with
3535:
to prepare and execute the 11 September 2001 terrorist attack. The Federal Plan for Cyber Security and Information Assurance Research and Development, published in April 2006 makes the following statements:
3175:
operators can see. Suter 2 lets them take control of the enemy's networks and direct their sensors. Suter 3, tested in Summer 2006, enables the invasion of links to time-critical targets such as battlefield
2667:
unimpeded access to, the EM spectrum. EW can be applied from air, sea, land, and space by manned and unmanned systems, and can target communication, radar, or other services. EW includes three major
112:
3550:
Moreover, an online "terrorist training manual", the "Technical Mujahid, a Training Manual for Jihadis" contained a section entitled "Covert Communications and Hiding Secrets Inside Images."
252:
Shortly after the release of DODD S-3600.1, the U.S. Army stood up the Land Information Warfare Activity/Information Dominance Center (LIWA/IDC), which would eventually transition into the
5644:
3463:
488:
IO Qualification Course - Reserve Component (IOQC-RC) - a two-phase course taught by the National Guard Information Operations School, 3-124th Information Operations (IO) Battalion,
5427:
4727:
150:
is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of
4925:
481:
In the Army, only commissioned officers are formally qualified in the Information Operations functional area, known as FA30. Officers can qualified through one of two courses:
4791:
4776:
2685:
EW supports information operations by using offensive and defensive tactics and techniques in a variety of combinations to shape, disrupt, and exploit adversarial use of the
281:
level typically have an Information Operations directorate known as the G-39 (for Army or Marine headquarters) or J-39 (for joint headquarters), for example, following the
307:
5019:
2931:
psychological operations (PSYOPS) aircraft. This aircraft also employed a C-130E airframe, but was modified by using the mission electronic equipment from the retired
3514:
had pornographic images on their computers, and that these images had been used to hide secret messages (although no other Italian paper ever covered the story). The
4696:
5062:
4812:
5444:
5532:
4649:
5561:
5284:
5156:
3531:
published an article claiming that al-Qaeda had used steganography to encode messages into images, and then transported these via e-mail and possibly via
5088:
361:
includes the U.S. Army Information Operations Proponent (USAIOP) whose mission is to executes Total Army Force Modernization responsibilities across the
3554:
a realistic approach to "narrowing the field", suggesting that interception capacity was never the difficulty but rather prioritising the target media.
4842:
256:, and established the Information Operations functional area in April 1999 to specially train and assign commissioned officers to plan and conduct IO.
5042:
4447:
3325:. RFA's mission is "to promote and sustain democratic values and institutions in Afghanistan by disseminating news, factual information and ideas".
218:, including a weekly "news" leaflet dropped on communist forces, but also included radio and loudspeaker broadcasts. During the war forces under
5431:
5363:
Bruce Hoffman, "Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment," Studies in Conflict & Terrorism, 26:429-442, 2003.
5718:, Presentation (PDF slides) to the Bantle – Institute for National Security and Counterterrorism (INSCT) Symposium, Syracuse University (2006).
5117:
222:
used electronic jamming, much like the Navy at the end of World War 2, against radar on radar-directed anti-aircraft guns, particularly during
4223:
5684:
5003:
4626:
4036:
5748:
3830:
315:
5458:
4612:
3909:
2821:
440:
4929:
3495:
operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site
402:
382:
253:
5704:
5699:
3470:
to send hidden messages. This avatar contains the message "Boss said that we should blow up the bridge at midnight." encrypted with
2705:
3007:
2959:
2740:
1570:
4983:
3709:
Col. Holmes. Army investigators ultimately determined Holme's claims of illegal psychological operations were "not substantiated."
3081:
software and equipment. While it is not the first time that hackers have targeted industrial systems, it is the first discovered
4568:
4473:
2746:
1997:
580:
bases its Information Operations doctrine from Air Force Doctrinal Publication (AFDP) 3–13, Information in Air Force Operations.
358:
5491:
Rajiv Chandrasekaran, Military to investigate claim that psy-ops team was used to influence U.S. senators, Wash. Post (Feb. 24,
5178:
5016:
4954:
485:
IO Qualification Course (IOQC) - a 12-week, 480-hour resident course taught at the Combined Army Center, Fort Leavenworth, KS.
5602:
4787:
3682:
staff, communicated alleged use of illegal PSYOP on visiting U.S. dignitaries, claiming such orders originated from Lt. Gen.
4580:
3976:
5598:
4246:
3775:
2991:
599:
3877:
5302:
2353:
646:
538:
289:
In recent years, the U.S. military has stood up unique task forces solely focused on information operations, such as the
5492:
5443:
Major Garrett, Key Senator Calls Psyops Charges Serious, but He Denies Feeling Manipulated, National Journal (Feb. 20,
4846:
3815:
3029:
2803:
2640:
2548:
2326:
941:
455:
417:
397:
54:
5733:
5670:
3694:, government ministers, and European diplomats. Holmes' disclosure resulted in several news articles, most notably a
3679:
3322:
2002:
134:
76:
5250:
4700:
4394:
3411:
firewalls, intrusion detection, anti-viral tools, audits, security management, and security awareness and training.
5101:
3003:
2999:
2080:
5484:
5689:
3825:
3563:
populations). The philosophy the MILDEC is for the concealment of activities rather than misleading adversaries.
3309:
2987:
2648:
2425:
2063:
1850:
695:
223:
43:
5640:
5538:
3645:
3638:
3361:
3354:
3312:
broadcast services. It broadcasts 12 hours daily as part of a 24-hour stream of programming in conjunction with
277:
operations, public affairs, operations security, and military deception. Operational U.S. military units at the
5753:
3780:
3675:
2189:
5715:
5710:
Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism
2668:
272:
Comes from JP 3-13 (Joint Publication) and pertains to Information Operations (Info Ops) in the United States.
3701:
3086:
2644:
2606:
2053:
4850:
2983:
2543:
1247:
1007:
407:
203:
aircraft were fitted with receivers and rudimentary jammers to locate and jam Japanese air search radars.
5426:
William Levesque, Officer says he refused 'illegal' order in Afghanistan, St. Petersburg Times (Feb. 25,
5039:
4076:
3735:
2553:
1740:
1542:
1413:
951:
489:
241:
215:
211:
155:
4671:
4193:
552:, the proponent for information operations is the Marine Corps Information Operations Center (MCIOC) at
435:
3765:
3589:
has found, "Children are being taught to hate Jews and Westerners, and to take up arms against them ".
3501:
3471:
3442:
2017:
553:
549:
116:
105:
4749:
3546:"The threat posed by steganography has been documented in numerous intelligence reports." (p. 42)
4529:
4499:
3820:
2793:
2789:
2127:
1635:
984:
858:
712:
542:
5114:
5652:
5648:
5632:
3840:
3519:
3171:
Three generations of Suter have been developed. Suter 1 allows its operators to monitor what enemy
3137:
3132:
2686:
2578:
2445:
1992:
1685:
1503:
1351:
584:
159:
268:
3805:
3740:
3500:". Other media worldwide cited these rumors many times, especially after the terrorist attack of
3157:
3152:
and communications systems belonging to an enemy. Development of the program has been managed by
3033:
2924:
2531:
2513:
2269:
1828:
1750:
1695:
1293:
956:
577:
377:
323:
3123:, included references to Stuxnet as one of his operational successes as the IDF chief of staff.
3028:("Take Charge and Move Out") aircraft was a land-based naval aviation platform that served as a
2635:
3683:
3456:
3181:
3078:
2756:
2398:
2373:
2095:
2007:
1880:
1755:
1356:
1333:
779:
678:
319:
286:
the directorate while others have organized them under separate directorates within the staff.
219:
47:
4344:
3585:
Terrorists also like to use the Internet to recruit and persuade children to their cause. As
3582:
only language the West understands is the logic of violence, and 3) jihad is the only option"
3522:, who in 2004 was fired after allegations emerged that he had fabricated stories and sources.
4559:
JCS, JP 3-58, Joint Doctrine for Military Deception (Washington, DC: GPO, 31 May 1996), v-vi.
3845:
3770:
3730:
3700:
article titled, "Another Runaway General: Army Deploys Psy-Ops on U.S. Senators" authored by
3116:
2947:. The EC-130E was eventually replaced by the EC-130J Commando Solo and was retired in 2006.
1987:
1920:
1873:
1527:
1490:
1453:
1371:
1323:
1207:
1017:
825:
734:
331:
5534:
The Decisive Weapon: A Brigade Combat Team Commander's Perspective on Information Operations
4876:
3210:
U.S. Air Force officials have speculated that a technology similar to Suter was used by the
2751:
568:
229:
Much the same as in the Korean War, deception was also disregarded as a practice during the
5459:"Obama Publishes Account of Firing Gen. McChrystal On the Same Day McChrystal Briefs Biden"
4958:
3785:
3196:
2967:
2378:
2280:
2137:
2132:
1950:
1915:
1650:
1470:
1328:
1264:
1118:
1088:
685:
445:
4268:
58:
8:
5716:
Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas
5507:"Lt. Gen. Caldwell cleared of allegations he ordered psy-ops team to influence lawmakers"
5483:
Phil Stewart, U.S. Probes if Senators Targeted by Afghan Psy-Ops Unit, Reuters (Feb. 24,
3810:
3506:
3222:
on 6 September 2007. The evasion of air defence radar was otherwise unlikely because the
3111:
2932:
2860:
2229:
2214:
2090:
1977:
1955:
1930:
1890:
1800:
1610:
1515:
1465:
1232:
1222:
1187:
979:
969:
739:
663:
497:
200:
167:
20:
5124:"A Report to the Center for International Media Assistance", :e27 "Retrieved 2011-10-14"
4980:
4763:
4369:
5271:
4319:
3800:
3760:
3705:
3527:
3467:
3165:
3161:
3098:
3018:
2979:
2928:
2815:
2630:
2563:
2418:
2338:
2259:
2204:
2179:
2100:
2046:
2012:
1943:
1860:
1770:
1675:
1620:
1510:
1475:
1428:
1303:
1274:
1227:
1165:
1140:
974:
788:
707:
534:
493:
467:
411:
369:
290:
163:
151:
5694:
5186:
4606:
4269:"The Unified Command Plan and Combatant Commands: Background and Issues for Congress"
4084:
3903:
3835:
3790:
3510:
reported that an Al Qaeda cell which had been captured at the Via Quaranta mosque in
3308:
Radio Aazadi, formerly known as Radio Free Afghanistan (RFA) is the Afghan branch of
3219:
3211:
3177:
3071:
2599:
2508:
2455:
2358:
2348:
2343:
2313:
2296:
2291:
2264:
2209:
1910:
1900:
1895:
1885:
1805:
1795:
1790:
1765:
1735:
1625:
1595:
1590:
1580:
1575:
1565:
1480:
1433:
1403:
1242:
1035:
1012:
946:
587:(AFSC) 14FX, after completing the Information Operations Professional Course (IOPC).
5709:
4792:"Cracking the code: Defending against the superweapons of the 21st century cyberwar"
4790:
in Washington DC, reported by C-Span and contained in the PBS program Need to Know (
4169:
2826:
2568:
5727:
Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet
3725:
3313:
3259:
3149:
3141:
2944:
2711:
2573:
2538:
2470:
2363:
2301:
2194:
2122:
2115:
1972:
1905:
1855:
1845:
1720:
1640:
1600:
1585:
1552:
1537:
1408:
1393:
1346:
1254:
1212:
1155:
1150:
1108:
931:
908:
815:
744:
673:
656:
449:
391:
282:
5430:.); Army to Investigate Rolling Stone's Psy-Ops Report, Atlantic Monthly (Feb. 24
5272:
Federal Plan for Cyber Security and Information Assurance Research and Development
5113:
The Pentagon, Information Operations, and International Media Development (2010).
5075:
4294:
4140:
COMMAND & CONTROL WARFARE: PUTTING ANOTHER TOOL IN THE WAR-FIGHTER'S DATA BASE
4112:
COMMAND & CONTROL WARFARE: PUTTING ANOTHER TOOL IN THE WAR-FIGHTER'S DATA BASE
206:
Despite the success of the 23rd, deception was never used in a significant way in
5121:
5046:
5023:
4987:
4798:
4783:
3611:
3586:
3572:
3478:
Rumors about terrorists using steganography started first in the daily newspaper
3459:" technique, a sender could get messages out and cover their tracks all at once.
3416:
2963:
2955:
2907:
2659:
2383:
2368:
2286:
2242:
2184:
1840:
1835:
1725:
1715:
1630:
1605:
1547:
1388:
1318:
1308:
1160:
1145:
1068:
1040:
840:
820:
668:
335:
5134:
2775:
5589:
5313:
4840:
4138:
4110:
4006:
3850:
3755:
3244:
3120:
3107:
2971:
2848:
2558:
2306:
1730:
1690:
1668:
1655:
1645:
1615:
1532:
1485:
1288:
1279:
1170:
1123:
1103:
1093:
1063:
1030:
918:
875:
830:
702:
635:
603:
4587:
3610:
The list of methods goes on and on and is very similar to the methods used in
5742:
5721:
4088:
3696:
3436:
3067:
2940:
2405:
2393:
2249:
2169:
2085:
2068:
1925:
1780:
1760:
1443:
1438:
1418:
1398:
1313:
1284:
1259:
1135:
1113:
1098:
1073:
913:
835:
798:
793:
690:
245:
186:
The modern U.S. military can trace its use of information operations back to
3884:
595:
190:
when the Army activated the 23rd Headquarters Special Troops, known as the "
4530:"Joint Publication 3-53 : Doctrine for Joint Psychological Operations"
3750:
3603:
3011:
2592:
2518:
2498:
2493:
2388:
2333:
1967:
1962:
1785:
1700:
1448:
1182:
1083:
880:
784:
387:
278:
3455:, the notion of junk e-mail takes on a whole new light. Coupled with the "
3447:
When one considers that messages could be encrypted steganographically in
3085:
that spies on and subverts industrial systems, and the first to include a
260:
Washington, Iowa, Vermont, and Texas were part of this early development.
5115:
The Pentagon, Information Operations, and International Media Development
4224:"Here's what the new information warfare command in the Pacific is doing"
3687:
3452:
3317:
3303:
3204:
3145:
3103:
3041:
2503:
2254:
2219:
2058:
1745:
1710:
1423:
1366:
1269:
1053:
774:
769:
230:
187:
178:
173:
2655:
5405:
58 "Virtual Soldiers in a Holy War," Ha'aretz Daily, 16 September 2002.
3691:
3462:
3223:
3153:
3115:, a showreel that was played at a retirement party for the head of the
3037:
2975:
2755:
Soldiers from the U.S. Army's 350th Tactical Psychological Operations,
2460:
2430:
2152:
1521:
463:
425:
207:
191:
5081:
520:
3745:
3480:
2450:
2274:
2224:
2174:
2164:
2159:
2024:
1815:
1810:
1775:
1217:
903:
870:
759:
525:
4146:. Maxwell Air Force Base, Alabama: Air University Press. p. xiv
4118:. Maxwell Air Force Base, Alabama: Air University Press. p. xiv
301:
5695:
U.S. Department of Defense Information Operations Related Documents
5685:
U.S. Army Information Operations Proponent (USIOP) Official Website
5651:
external links, and converting useful links where appropriate into
5285:"The New Issue of Technical Mujahid, a Training Manual for Jihadis"
5040:
Radio in a Box – Military Embraces Counterinsurgency in Afghanistan
3496:
3492:
2936:
2880:
2465:
2440:
2073:
1705:
1680:
1298:
853:
727:
557:
346:
5725:
3160:. It is specialised to interfere with the computers of integrated
2767:
3090:
3082:
3075:
3063:
3058:
2865:
2475:
2435:
2199:
2033:
2029:
1376:
1361:
1237:
898:
893:
863:
802:
764:
607:
583:
Air Force officers can serve as Information Operations Officers,
501:
362:
5690:
U.S. Marine Corps Information Operations Center Official Website
3532:
3192:
3188:
3025:
2760:
1982:
1383:
1200:
936:
210:, however psychological warfare was routinely conducted by the
5002:
Radio in a Box – Giving Afghanistans Their Own Voice! (2010).
5396:
Brian Ross, "A Secret Language," ABCNEWS.com, 4 October 2001.
3511:
3486:
3448:
3215:
3172:
2962:(PSYOP) and civil affairs broadcast missions in the standard
2884:
2706:
Computer network operations § CNO in the Military Domain
1458:
994:
989:
429:
338:, through the Deputy Director Global Operations, J39 (DDGO).
327:
195:
19:"Information Operations" redirects here. For other uses, see
3249:
5712:, Yale Information Society Project Conference Paper (2005).
5038:
Military Embraces Counterinsurgency in Afghanistan (2008).
3795:
3230:
used by the IAF were not equipped with stealth technology.
3227:
3200:
3032:
strategic communications link aircraft for the U.S. Navy's
754:
749:
365:
to meet the Army's requirement for Information Operations.
351:
3951:"How the Ghost Army of WWII Used Art to Deceive the Nazis"
182:
U.S. Army leaflet targeting the 45th North Korean Division
4841:
David A. Fulghum; Michael A. Dornheim; William B. Scott.
4786:
speaking at the 10 December 2010 Washington Forum of the
3653:
3415:"The Taliban have in recent months waged an intensifying
3369:
3267:
3263:
2939:(Operation Desert Storm), the second Gulf War (Operation
627:
4044:
North Dakota State University Libraries Official Website
3649:
3365:
3233:
563:
306:
3518:
articles were written by veteran foreign correspondent
2914:
EC-130E Airborne Battlefield Command and Control Center
513:
Tactical Information Operations Planners Course (TIOPC)
476:
296:
5146:
DOCUMENT CALLED IO IN OEF AND IF -saved in your folder
5100:
Radio-in-a-Box: Afghanistan's New Warrior-DJs (2011).
4764:"Stuxnet worm hits Iran nuclear plant staff computers"
3704:
who recently earned fame for his reporting on General
3333:
3187:
The program has been tested with aircraft such as the
174:
History of Information Operations in the U.S. Military
5251:"Taliban website hacked as Afghan cyber war heats up"
5004:
Radio in a Box – Giving Afghanistans Their Own Voice!
4627:"Military Personnel Warned Against Geotagging Photos"
4295:"U.S. Army Information Operations Proponent (USAIOP)"
4057:"Psychological Warfare in Korea: An Interim Report".
115:. Please help to ensure that disputed statements are
5078:"U.S. Marine Corps Releases", "Retrieved 2011-11-10"
5061:
In Afghan Fight, U.S. Takes to the Airwaves (2010).
4928:. Aviation Week and Space Technology. Archived from
4903:"Why Syria's Air Defenses Failed to Detect Israelis"
4813:"Israel video shows Stuxnet as one of its successes"
3924:"Ghost Army: The Combat Con Artists of World War II"
3686:. Among the alleged targets were American Senators
3504:, without ever showing proof. The Italian newspaper
3164:. Suter was integrated into US unmanned aircraft by
2699:
5274:
National Science and Technology Council, April 2006
5137:"Special Warfare" 20 (5):e26 "Retrieved 2011-11-10"
5087:Local DJ celebrity to his Afghan listeners (2010).
5034:
5032:
4877:"Israel suspected of 'hacking' Syrian air defences"
3218:radars and sneak into their airspace undetected in
3070:discovered in June 2010. It initially spreads via
2734:
2651:(PA ANG) broadcast television and radio programming
2619:
615:identifies itself as a Cyberspace Operations unit.
537:, information operations are often supervised by a
521:
U.S. Navy & Marine Corps Information Operations
516:
Army Information Operations Planners Course (AIOPC)
341:
5232:
5230:
5228:
4650:"Army: Facebook geotagging dangerous for soldiers"
4478:16th Air Force (Air Forces Cyber) Official Website
3678:, a member of the Army's 71st TIOG serving on the
5635:may not follow Knowledge's policies or guidelines
5560:McChrystal, Gen. Stanley A. (21 September 2009).
5537:. Military Review. pp. 34–35. Archived from
5179:"Afghanistan – Radio Free Europe / Radio Liberty"
5127:
4750:"Last-minute paper: An indepth look into Stuxnet"
3981:Naval Air Force, U.S. Pacific Fleet Official Site
3977:"Electronic Attack Wing Pacific: Command History"
2935:aircraft. This airframe served during the first
302:U.S. Department of Defense Information Operations
5740:
5730:, 16 National Strategy F. Rev. 14 (Summer 2007).
5029:
4923:
4900:
3928:The National World War 2 Museum Official Website
3397:
2891:
5225:
4955:"Afghanistan's "radio war" | @pritheworld"
4949:
4947:
4896:
4894:
4721:
2759:, drop leaflets over a village near Hawijah in
5057:
5055:
4998:
4996:
4870:
4868:
4836:
4834:
4724:"Siemens: Stuxnet worm hit industrial systems"
4174:. Washington, D.C.: U.S. Department of Defense
3443:Steganography § Alleged use by terrorists
3047:
2854:
2809:
263:
5102:Radio-in-a-Box: Afghanistan's New Warrior-DJs
5068:
4973:
4689:
4555:
4553:
3648:. Consider transferring direct quotations to
3364:. Consider transferring direct quotations to
2600:
590:U.S. Air Force Information Operations Units:
322:(USSTRATCOM) sometime around 2004 or 2005 at
5094:
4944:
4891:
4699:. Siemens. 30 September 2010. Archived from
3310:Radio Free Europe / Radio Liberty's (RFE/RL)
3280:Special Operation Media Systems – B (SOMS-B)
5063:In Afghan Fight, U.S. Takes to the Airwaves
5052:
5009:
4993:
4874:
4865:
4831:
3831:Joint Information Operations Warfare Center
529:Navy Information Dominance Warfare Insignia
316:Joint Information Operations Warfare Center
293:Fleet Information Warfare Command Pacific.
5559:
5348:
5346:
5107:
5089:Local DJ celebrity to his Afghan listeners
4811:Williams, Christopher (15 February 2011).
4804:
4550:
4426:The Official Website of the U.S. Air Force
4194:"Chapter 2: Officer Classification System"
4167:
4136:
4108:
3466:An example showing how terrorists may use
2822:Category:World War II deception operations
2693:Domination of the Electromagnetic Spectrum
2624:
2607:
2593:
460:152nd Theater Information Operations Group
441:151st Theater Information Operations Group
57:. Please do not remove this message until
5671:Learn how and when to remove this message
5015:Army radio connects with Afghans (2009).
4715:
4221:
4171:DODD S-3600.1 Information Operations (IO)
4168:Hutcherson, Norman B. (9 December 1996).
3872:
3870:
3868:
3866:
2845:position more favorable to our interests.
422:71st Theater Information Operations Group
403:56th Theater Information Operations Group
334:. The JIOWC falls within the Joint Staff
254:1st Information Operations Command (Land)
135:Learn how and when to remove this message
77:Learn how and when to remove this message
4926:"Technology Will Be Key to Iraq Buildup"
4810:
4244:
4238:
4163:
4161:
4137:Hutcherson, Norman B. (September 1994).
4109:Hutcherson, Norman B. (September 1994).
3461:
3248:
2864:
2825:
2774:
2766:
2750:
2741:Psychological Operations (United States)
2654:
2639:U.S. Military personnel assigned to the
2634:
1571:List of military strategies and concepts
567:
524:
350:56th TIOG Change of Command Ceremony at
345:
305:
267:
177:
111:Relevant discussion may be found on the
53:Relevant discussion may be found on the
5587:
5414:
5384:
5372:
5352:
5343:
5337:
5236:
5219:
5207:
5133:Breaking the Afghan Insurgency (2007).
2747:Military information support operations
5741:
5588:Denning, Dorothy E. (18 August 2005).
5456:
5248:
4611:: CS1 maint: archived copy as title (
4448:"39th Information Operations Squadron"
4000:
3998:
3908:: CS1 maint: archived copy as title (
3863:
3253:United States Psychological Operations
2994:(AFSOC). The 193 AOW is based at the
572:Air Force Information Operations Badge
5530:
4788:Foundation for Defense of Democracies
4722:Robert McMillan (16 September 2010).
4158:
3955:Smithsonian Magazine Official Website
3639:too many or overly lengthy quotations
3557:
3355:too many or overly lengthy quotations
3234:Psychological Operations Capabilities
564:U.S. Air Force Information Operations
5615:
5599:Defense Technical Information Center
5591:Information Operations and Terrorism
5511:The Washington Post Official Website
4924:David A. Fulghum (14 January 2007).
4905:. Aviation Week and Space Technology
4500:"DOD Information Operations Roadmap"
4370:"Tactical IO Planner Course (TIOPC)"
4222:Pomerleau, Mark (16 February 2023).
4014:Defense Technical Information Center
3621:
3337:
2992:Air Force Special Operations Command
600:39th Information Operations Squadron
477:Information Operations Qualification
297:U.S. Military Information Operations
88:
27:
4901:David A. Fulghum (3 October 2007).
4629:. RedOrbit Staff & Wire Reports
4396:Information In Air Force Operations
4261:
3995:
3334:Terrorists (IO from US Perspective)
3287:
2831:kilometers northwest of An Nuariya.
539:Navy Information Operations Command
13:
5749:Information operations and warfare
5457:Stuart, Tessa (17 November 2020).
4847:Aviation Week and Space Technology
4037:"PSYCHOLOGICAL WARFARE KOREA 1951"
4034:
3948:
3816:Propaganda in the Mexican Drug War
2996:Harrisburg Air National Guard Base
2804:4th Psychological Operations Group
2641:4th Psychological Operations Group
383:1st Information Operations Command
14:
5765:
5611:
5605:from the original on 18 May 2015.
5504:
5074:/The Busiest Man in Nawa (2011).
4402:. U.S. Air Force. 1 February 2023
4069:
4004:
3930:. The National World War 2 Museum
3680:NATO Training Mission-Afghanistan
3489:". A citation from the article: "
3328:
3323:International Broadcasting Bureau
3238:
2700:Computer Network Operations (CNO)
5620:
5159:. Federal Business Opportunities
5017:Army radio connects with Afghans
4647:
4422:"Information Operations Officer"
4320:"IO Qualification Course (IOQC)"
4275:. Congressional Research Service
3626:
3607:towers, Pentagon, and Capitol).
3430:
3342:
3004:Harrisburg International Airport
2763:province, Iraq, on 6 March 2008.
2735:Psychological Operations (PSYOP)
2620:Information Related Capabilities
645:
594:
454:
434:
416:
396:
376:
342:U.S. Army Information Operations
93:
32:
5700:Operations Security (JP 3-13.3)
5580:
5553:
5524:
5498:
5477:
5450:
5437:
5420:
5408:
5399:
5390:
5378:
5366:
5357:
5331:
5295:
5277:
5265:
5242:
5213:
5201:
5171:
5149:
5140:
4917:
4770:
4756:
4742:
4726:. Computerworld. Archived from
4697:"Building a Cyber Secure Plant"
4664:
4641:
4619:
4573:
4562:
4522:
4492:
4466:
4452:Hurlbert Field Official Website
4440:
4414:
4387:
4362:
4337:
4312:
4287:
4215:
4186:
4130:
3826:The Institute of World Politics
2988:Pennsylvania Air National Guard
2785:PSYOP as an IO Core Capability.
2771:U.S. Army PSYOP Force structure
2680:Electronic warfare Support (ES)
2649:Pennsylvania Air National Guard
214:, predominantly in the form of
5705:Military Deception (JP 3-13.4)
5463:Rolling Stone Official Website
5157:"SOMS-B 2 MRBS Antenna System"
5135:Breaking the Afghan Insurgency
4875:John Leyden (4 October 2007).
4766:. BBC News. 26 September 2010.
4374:U.S. Army Combined Arms Center
4349:U.S. Army Combined Arms Center
4345:"IO Qualification Course (RC)"
4324:U.S. Army Combined Arms Center
4299:U.S. Army Combined Arms Center
4247:"The Secret Pentagon Spy Ring"
4245:Ambinder, Marc (20 May 2010).
4102:
4077:"BATTLE OF KOREA: Deadly Flak"
4050:
4028:
3969:
3942:
3916:
3781:Information Operations Roadmap
3297:
359:U.S. Army Combined Army Center
16:United States defense category
1:
5734:White House FAQ about the WoT
5249:Taylor, Rob (27 April 2012).
4509:. 30 October 2003. p. 61
3856:
3274:
3096:In May 2011, the PBS program
3087:programmable logic controller
2892:Equipment methods and tactics
2645:193rd Special Operations Wing
5562:"COMISAF Initial Assessment"
5183:RadioFreeEurope/RadioLiberty
4676:Army Spouses Online Facebook
4059:The Public Opinion Quarterly
3617:
2990:operationally gained by the
2984:193d Special Operations Wing
2923:was an earlier version of a
7:
3736:Command and control warfare
3719:
3398:Computer network operations
3048:Computer network operations
2855:Operations Security (OPSEC)
2810:Military Deception (MILDEC)
2064:Military–industrial complex
1543:Operational manoeuvre group
541:(NIOC), for example in the
490:Vermont Army National Guard
336:Operations Directorate (J3)
318:(JIOWC) was created by the
264:Information Operations (IO)
242:Deputy Secretary of Defense
156:computer network operations
59:conditions to do so are met
10:
5770:
5564:. US Department of Defense
4201:U.S. Army Official Website
4007:"Deception: Here to Stay!"
3766:Fifth Dimension Operations
3570:
3474:using "växjö" as password.
3440:
3434:
3301:
3242:
3130:
3056:
3052:
2905:
2858:
2819:
2813:
2744:
2738:
2709:
2703:
2677:Electronic Protection (EP)
2628:
554:Marine Corps Base Quantico
550:United States Marine Corps
18:
2986:(193 SOW), a unit of the
2901:
2794:civil-military operations
2128:Loss-of-strength gradient
985:Combat information center
545:which has several NIOCs.
543:United States Tenth Fleet
240:On December 9, 1996, the
5289:The Jamestown Foundation
4273:crsreports.congress.gov/
4046:. Georgetown University.
4016:. U.S. Naval War College
3841:Psychological Operations
3646:summarize the quotations
3592:
3566:
3362:summarize the quotations
3292:
3133:Suter (computer program)
3126:
2960:psychological operations
2687:electromagnetic spectrum
2446:Military science fiction
1931:Technology and equipment
1352:List of military tactics
585:Air Force Specialty Code
408:Joint Base Lewis–McChord
160:psychological operations
5076:The Busiest Man in Nawa
5022:15 October 2009 at the
4979:Radio in a Box (2011).
4801:, 4 minutes into piece)
4474:"688th Cyberspace Wing"
3821:Military Public Affairs
3806:Network-centric warfare
3741:Communications security
3451:messages, particularly
3158:United States Air Force
3156:, a secret unit of the
3034:Fleet Ballistic Missile
2925:United States Air Force
2625:Electronic Warfare (EW)
2514:Wartime sexual violence
2270:Full-spectrum dominance
2081:Supply-chain management
578:United States Air Force
324:Lackland Air Force Base
5120:6 January 2011 at the
5104:"Retrieved 2011-10-14"
5091:"Retrieved 2011-10-14"
5065:"Retrieved 2011-14-10"
5049:"Retrieved 2011-11-11"
5026:"Retrieved 2011-10-30"
5006:"Retrieved 2011-14-10"
4990:"Retrieved 2011-14-10"
4065:(1 (Spring 1951)): 66.
3957:. Smithsonian Magazine
3776:Historical revisionism
3475:
3457:chaffing and winnowing
3314:Voice of America (VOA)
3254:
3199:. It has been used in
3182:surface-to-air missile
2870:
2832:
2780:
2772:
2764:
2757:10th Mountain Division
2674:Electronic Attack (EA)
2662:
2652:
2426:Awards and decorations
2399:Peace through strength
2374:Low-intensity conflict
2008:Conscientious objector
1881:Area of responsibility
573:
530:
355:
320:U.S. Strategic Command
311:
273:
220:United Nations Command
183:
148:Information Operations
5754:Psychological warfare
5531:Baker, Ralph (2006).
5303:"The Al Qaeda Manual"
4986:25 April 2012 at the
4797:27 April 2018 at the
4782:27 April 2018 at the
3846:Psychological warfare
3771:Gatekeeper (politics)
3731:Bolivarian propaganda
3465:
3316:. RFA first aired in
3252:
3117:Israel Defense Forces
3102:cited a statement by
2952:EC-130J Commando Solo
2921:EC-130E Commando Solo
2896:
2868:
2829:
2779:NATO leaflet in Libya
2778:
2770:
2754:
2660:EC-130J Commando Solo
2658:
2638:
1018:Torpedo data computer
1008:Ship gun fire-control
571:
528:
349:
309:
271:
181:
5641:improve this article
5045:2 March 2012 at the
4083:. 11 February 1952.
3786:Industrial espionage
3180:launchers or mobile
2933:EC-121S Coronet Solo
2544:Military occupations
2379:Military engineering
2281:Unrestricted Warfare
2138:Force multiplication
1036:Military manoeuvrers
446:Fort Totten (Queens)
354:, WA on May 7, 2017.
291:U.S. Pacific Fleet's
104:factual accuracy is
5653:footnote references
4817:The Daily Telegraph
3811:Operations Security
3507:Corriere della Sera
3162:air defence systems
2982:, specifically the
2943:) and in Operation
2861:Operations security
2792:(PA), MILDEC, CNO,
2230:Penal military unit
2215:Rules of engagement
1891:Command and control
1516:Operations research
980:Director (military)
970:Fire-control system
740:Command and control
621:Part of a series on
168:operations security
46:of this article is
21:Information warfare
4932:on 7 February 2012
4853:on 12 October 2007
4035:Brauer, Albert C.
4005:Meier, William A.
3949:Gormly, Kellie B.
3890:on 8 February 2015
3801:Military Deception
3761:Electronic Warfare
3706:Stanley McChrystal
3674:In 2011, Lt. Col.
3614:around the world.
3558:Military deception
3528:The New York Times
3476:
3255:
3166:L-3 Communications
3019:United States Navy
2980:Air National Guard
2929:Air National Guard
2871:
2833:
2816:Military deception
2781:
2773:
2765:
2663:
2653:
2631:Electronic Warfare
2339:Counter-insurgency
2260:Command of the sea
2205:Jewish laws on war
2180:Geneva Conventions
1716:Divide and conquer
1511:Military operation
1476:Tactical objective
975:Fire-control radar
952:Electronic-warfare
574:
535:United States Navy
531:
494:Norwich University
370:United States Army
356:
312:
274:
224:Operation Strangle
184:
164:military deception
152:electronic warfare
5681:
5680:
5673:
4843:"Black Surprises"
4752:. Virus Bulletin.
4652:. Tucson Sentinel
3836:Political Warfare
3791:Irregular Warfare
3671:
3670:
3525:In October 2001,
3387:
3386:
3220:Operation Orchard
3212:Israeli Air Force
3178:ballistic missile
3150:computer networks
3072:Microsoft Windows
2617:
2616:
2509:Horses in warfare
2456:Anti-war movement
2359:Gunboat diplomacy
2349:Disaster response
2297:Philosophy of war
2292:Principles of war
2265:Deterrence theory
2210:Right of conquest
2133:Lanchester's laws
1901:Principles of war
1591:Counter-offensive
1576:Military campaign
1481:Target saturation
1404:Counterinsurgency
1013:Gun data computer
947:Close air support
909:Aircraft carriers
216:airborne leaflets
145:
144:
137:
87:
86:
79:
5761:
5676:
5669:
5665:
5662:
5656:
5624:
5623:
5616:
5606:
5596:
5574:
5573:
5571:
5569:
5557:
5551:
5550:
5548:
5546:
5541:on 5 August 2011
5528:
5522:
5521:
5519:
5517:
5502:
5496:
5481:
5475:
5474:
5472:
5470:
5454:
5448:
5441:
5435:
5424:
5418:
5412:
5406:
5403:
5397:
5394:
5388:
5382:
5376:
5370:
5364:
5361:
5355:
5350:
5341:
5335:
5329:
5328:
5326:
5324:
5318:
5312:. Archived from
5307:
5299:
5293:
5292:
5281:
5275:
5269:
5263:
5262:
5260:
5258:
5246:
5240:
5234:
5223:
5217:
5211:
5205:
5199:
5198:
5196:
5194:
5189:on 23 April 2012
5185:. Archived from
5175:
5169:
5168:
5166:
5164:
5153:
5147:
5144:
5138:
5131:
5125:
5111:
5105:
5098:
5092:
5085:
5079:
5072:
5066:
5059:
5050:
5036:
5027:
5013:
5007:
5000:
4991:
4977:
4971:
4970:
4968:
4966:
4961:on 15 April 2013
4957:. Archived from
4951:
4942:
4941:
4939:
4937:
4921:
4915:
4914:
4912:
4910:
4898:
4889:
4888:
4886:
4884:
4872:
4863:
4862:
4860:
4858:
4849:. Archived from
4838:
4829:
4828:
4826:
4824:
4808:
4802:
4774:
4768:
4767:
4760:
4754:
4753:
4746:
4740:
4739:
4737:
4735:
4719:
4713:
4712:
4710:
4708:
4703:on 21 April 2021
4693:
4687:
4686:
4684:
4682:
4668:
4662:
4661:
4659:
4657:
4645:
4639:
4638:
4636:
4634:
4623:
4617:
4616:
4610:
4602:
4600:
4598:
4592:
4586:. Archived from
4585:
4577:
4571:
4566:
4560:
4557:
4548:
4547:
4545:
4543:
4534:
4526:
4520:
4518:
4516:
4514:
4504:
4496:
4490:
4489:
4487:
4485:
4480:. U.S. Air Force
4470:
4464:
4463:
4461:
4459:
4454:. U.S. Air Force
4444:
4438:
4437:
4435:
4433:
4428:. U.S. Air Force
4418:
4412:
4411:
4409:
4407:
4401:
4391:
4385:
4384:
4382:
4380:
4366:
4360:
4359:
4357:
4355:
4341:
4335:
4334:
4332:
4330:
4316:
4310:
4309:
4307:
4305:
4291:
4285:
4284:
4282:
4280:
4265:
4259:
4258:
4256:
4254:
4242:
4236:
4235:
4233:
4231:
4219:
4213:
4212:
4210:
4208:
4198:
4190:
4184:
4183:
4181:
4179:
4165:
4156:
4155:
4153:
4151:
4145:
4134:
4128:
4127:
4125:
4123:
4117:
4106:
4100:
4099:
4097:
4095:
4073:
4067:
4066:
4054:
4048:
4047:
4041:
4032:
4026:
4025:
4023:
4021:
4011:
4002:
3993:
3992:
3990:
3988:
3973:
3967:
3966:
3964:
3962:
3946:
3940:
3939:
3937:
3935:
3920:
3914:
3913:
3907:
3899:
3897:
3895:
3889:
3883:. Archived from
3882:
3874:
3726:Black propaganda
3702:Michael Hastings
3684:William Caldwell
3666:
3663:
3657:
3630:
3629:
3622:
3382:
3379:
3373:
3346:
3345:
3338:
3288:Other/Integrated
3260:Paktika Province
3142:computer program
3023:EC-130Q Hercules
2958:used to conduct
2945:Enduring Freedom
2712:Cyber Operations
2609:
2602:
2595:
2364:Humanitarian aid
2302:Security dilemma
2123:Power projection
1906:Economy of force
1886:Chain of command
1601:Defence in depth
1586:Commerce raiding
1409:Defeat in detail
745:Defense ministry
649:
640:
639:
630:
618:
617:
598:
458:
438:
420:
400:
380:
140:
133:
129:
126:
120:
117:reliably sourced
97:
96:
89:
82:
75:
71:
68:
62:
36:
35:
28:
5769:
5768:
5764:
5763:
5762:
5760:
5759:
5758:
5739:
5738:
5677:
5666:
5660:
5657:
5638:
5629:This article's
5625:
5621:
5614:
5609:
5594:
5583:
5578:
5577:
5567:
5565:
5558:
5554:
5544:
5542:
5529:
5525:
5515:
5513:
5503:
5499:
5482:
5478:
5468:
5466:
5465:. Rolling Stone
5455:
5451:
5442:
5438:
5425:
5421:
5413:
5409:
5404:
5400:
5395:
5391:
5383:
5379:
5371:
5367:
5362:
5358:
5351:
5344:
5336:
5332:
5322:
5320:
5319:on 26 July 2014
5316:
5305:
5301:
5300:
5296:
5283:
5282:
5278:
5270:
5266:
5256:
5254:
5247:
5243:
5235:
5226:
5218:
5214:
5206:
5202:
5192:
5190:
5177:
5176:
5172:
5162:
5160:
5155:
5154:
5150:
5145:
5141:
5132:
5128:
5122:Wayback Machine
5112:
5108:
5099:
5095:
5086:
5082:
5073:
5069:
5060:
5053:
5047:Wayback Machine
5037:
5030:
5024:Wayback Machine
5014:
5010:
5001:
4994:
4988:Wayback Machine
4978:
4974:
4964:
4962:
4953:
4952:
4945:
4935:
4933:
4922:
4918:
4908:
4906:
4899:
4892:
4882:
4880:
4873:
4866:
4856:
4854:
4839:
4832:
4822:
4820:
4809:
4805:
4799:Wayback Machine
4784:Wayback Machine
4775:
4771:
4762:
4761:
4757:
4748:
4747:
4743:
4733:
4731:
4720:
4716:
4706:
4704:
4695:
4694:
4690:
4680:
4678:
4670:
4669:
4665:
4655:
4653:
4646:
4642:
4632:
4630:
4625:
4624:
4620:
4604:
4603:
4596:
4594:
4593:on 21 July 2013
4590:
4583:
4581:"Archived copy"
4579:
4578:
4574:
4567:
4563:
4558:
4551:
4541:
4539:
4532:
4528:
4527:
4523:
4512:
4510:
4502:
4498:
4497:
4493:
4483:
4481:
4472:
4471:
4467:
4457:
4455:
4446:
4445:
4441:
4431:
4429:
4420:
4419:
4415:
4405:
4403:
4399:
4393:
4392:
4388:
4378:
4376:
4368:
4367:
4363:
4353:
4351:
4343:
4342:
4338:
4328:
4326:
4318:
4317:
4313:
4303:
4301:
4293:
4292:
4288:
4278:
4276:
4267:
4266:
4262:
4252:
4250:
4243:
4239:
4229:
4227:
4220:
4216:
4206:
4204:
4196:
4192:
4191:
4187:
4177:
4175:
4166:
4159:
4149:
4147:
4143:
4135:
4131:
4121:
4119:
4115:
4107:
4103:
4093:
4091:
4075:
4074:
4070:
4056:
4055:
4051:
4039:
4033:
4029:
4019:
4017:
4009:
4003:
3996:
3986:
3984:
3975:
3974:
3970:
3960:
3958:
3947:
3943:
3933:
3931:
3922:
3921:
3917:
3901:
3900:
3893:
3891:
3887:
3880:
3878:"Archived copy"
3876:
3875:
3864:
3859:
3722:
3667:
3661:
3658:
3652:or excerpts to
3643:
3631:
3627:
3620:
3612:organized crime
3595:
3587:Dorothy Denning
3575:
3573:Martyrdom video
3569:
3560:
3445:
3439:
3433:
3417:information war
3400:
3383:
3377:
3374:
3368:or excerpts to
3359:
3347:
3343:
3336:
3331:
3306:
3300:
3295:
3290:
3277:
3247:
3241:
3236:
3135:
3129:
3112:Daily Telegraph
3061:
3055:
3050:
2956:C-130J Hercules
2910:
2908:Lockheed EC-130
2904:
2899:
2894:
2863:
2857:
2824:
2818:
2812:
2749:
2743:
2737:
2714:
2708:
2702:
2633:
2627:
2622:
2613:
2584:
2583:
2534:
2524:
2523:
2489:
2481:
2480:
2421:
2411:
2410:
2384:Multilateralism
2369:Law enforcement
2329:
2319:
2318:
2287:Just war theory
2245:
2235:
2234:
2185:Geneva Protocol
2155:
2145:
2144:
2118:
2108:
2107:
2049:
2039:
2038:
1946:
1936:
1935:
1876:
1866:
1865:
1831:
1821:
1820:
1751:Network-centric
1671:
1661:
1660:
1568:
1558:
1557:
1506:
1496:
1495:
1444:Rapid dominance
1349:
1339:
1338:
1294:Electromagnetic
1203:
1193:
1192:
1179:
1132:
1080:
1056:
1046:
1045:
1041:Combat training
1022:
999:
965:Combat systems:
961:
923:
919:Auxiliary ships
885:
845:
841:Military police
807:
730:
720:
719:
659:
633:
632:
631:
626:
566:
523:
479:
344:
304:
299:
266:
176:
141:
130:
124:
121:
110:
102:This article's
98:
94:
83:
72:
66:
63:
52:
37:
33:
24:
17:
12:
11:
5:
5767:
5757:
5756:
5751:
5737:
5736:
5731:
5719:
5713:
5707:
5702:
5697:
5692:
5687:
5679:
5678:
5633:external links
5628:
5626:
5619:
5613:
5612:External links
5610:
5608:
5607:
5584:
5582:
5579:
5576:
5575:
5552:
5523:
5505:Ukman, Jason.
5497:
5476:
5449:
5436:
5419:
5415:Denning (2005)
5407:
5398:
5389:
5385:Denning (2005)
5377:
5373:Denning (2005)
5365:
5356:
5353:Denning (2005)
5342:
5338:Denning (2005)
5330:
5294:
5276:
5264:
5241:
5237:Denning (2005)
5224:
5220:Denning (2005)
5212:
5208:Denning (2005)
5200:
5170:
5148:
5139:
5126:
5106:
5093:
5080:
5067:
5051:
5028:
5008:
4992:
4981:Radio in a Box
4972:
4943:
4916:
4890:
4879:. The Register
4864:
4830:
4803:
4769:
4755:
4741:
4730:on 25 May 2012
4714:
4688:
4663:
4648:Post, Global.
4640:
4618:
4572:
4561:
4549:
4521:
4491:
4465:
4439:
4413:
4386:
4361:
4336:
4311:
4286:
4260:
4249:. The Atlantic
4237:
4226:. Defensescoop
4214:
4185:
4157:
4129:
4101:
4068:
4049:
4027:
3994:
3968:
3941:
3915:
3861:
3860:
3858:
3855:
3854:
3853:
3851:Radicalization
3848:
3843:
3838:
3833:
3828:
3823:
3818:
3813:
3808:
3803:
3798:
3793:
3788:
3783:
3778:
3773:
3768:
3763:
3758:
3756:Disinformation
3753:
3748:
3743:
3738:
3733:
3728:
3721:
3718:
3717:
3716:
3713:
3710:
3676:Michael Holmes
3669:
3668:
3634:
3632:
3625:
3619:
3616:
3594:
3591:
3568:
3565:
3559:
3556:
3548:
3547:
3544:
3541:
3435:Main article:
3432:
3429:
3428:
3427:
3426:
3425:
3399:
3396:
3395:
3394:
3385:
3384:
3350:
3348:
3341:
3335:
3332:
3330:
3329:Adversarial IO
3327:
3302:Main article:
3299:
3296:
3294:
3291:
3289:
3286:
3282:
3281:
3276:
3273:
3245:Radio in a box
3243:Main article:
3240:
3239:Radio in a Box
3237:
3235:
3232:
3140:is a military
3131:Main article:
3128:
3125:
3121:Gabi Ashkenazi
3074:, and targets
3057:Main article:
3054:
3051:
3049:
3046:
2954:is a modified
2906:Main article:
2903:
2900:
2898:
2895:
2893:
2890:
2889:
2888:
2876:
2869:Someone Talked
2856:
2853:
2852:
2851:
2846:
2842:
2838:
2814:Main article:
2811:
2808:
2807:
2806:
2801:
2797:
2796:(CMO), and EW.
2790:public affairs
2739:Main article:
2736:
2733:
2732:
2731:
2727:
2723:
2719:
2704:Main article:
2701:
2698:
2697:
2696:
2690:
2683:
2682:
2681:
2678:
2675:
2629:Main article:
2626:
2623:
2621:
2618:
2615:
2614:
2612:
2611:
2604:
2597:
2589:
2586:
2585:
2582:
2581:
2576:
2571:
2566:
2561:
2556:
2551:
2549:Military terms
2546:
2541:
2535:
2530:
2529:
2526:
2525:
2522:
2521:
2516:
2511:
2506:
2501:
2496:
2490:
2487:
2486:
2483:
2482:
2479:
2478:
2473:
2468:
2463:
2458:
2453:
2448:
2443:
2438:
2433:
2428:
2422:
2417:
2416:
2413:
2412:
2409:
2408:
2403:
2402:
2401:
2396:
2386:
2381:
2376:
2371:
2366:
2361:
2356:
2351:
2346:
2341:
2336:
2330:
2325:
2324:
2321:
2320:
2317:
2316:
2311:
2310:
2309:
2307:Tripwire force
2299:
2294:
2289:
2284:
2277:
2272:
2267:
2262:
2257:
2252:
2246:
2241:
2240:
2237:
2236:
2233:
2232:
2227:
2222:
2217:
2212:
2207:
2202:
2197:
2192:
2187:
2182:
2177:
2172:
2167:
2162:
2156:
2151:
2150:
2147:
2146:
2143:
2142:
2141:
2140:
2130:
2125:
2119:
2114:
2113:
2110:
2109:
2106:
2105:
2104:
2103:
2098:
2093:
2083:
2078:
2077:
2076:
2071:
2061:
2056:
2050:
2045:
2044:
2041:
2040:
2037:
2036:
2027:
2022:
2021:
2020:
2010:
2005:
2000:
1995:
1990:
1985:
1980:
1975:
1970:
1965:
1960:
1959:
1958:
1947:
1942:
1941:
1938:
1937:
1934:
1933:
1928:
1923:
1918:
1913:
1908:
1903:
1898:
1893:
1888:
1883:
1877:
1872:
1871:
1868:
1867:
1864:
1863:
1858:
1853:
1848:
1843:
1838:
1832:
1829:Administrative
1827:
1826:
1823:
1822:
1819:
1818:
1813:
1808:
1803:
1798:
1793:
1788:
1783:
1778:
1773:
1768:
1763:
1758:
1756:New generation
1753:
1748:
1743:
1738:
1733:
1731:Fleet in being
1728:
1723:
1718:
1713:
1708:
1703:
1698:
1693:
1688:
1683:
1678:
1672:
1669:Grand strategy
1667:
1666:
1663:
1662:
1659:
1658:
1656:Scorched earth
1653:
1648:
1643:
1638:
1633:
1628:
1623:
1618:
1613:
1608:
1603:
1598:
1593:
1588:
1583:
1578:
1569:
1564:
1563:
1560:
1559:
1556:
1555:
1550:
1545:
1540:
1535:
1533:Deep operation
1530:
1525:
1518:
1513:
1507:
1502:
1501:
1498:
1497:
1494:
1493:
1488:
1483:
1478:
1473:
1468:
1463:
1462:
1461:
1451:
1446:
1441:
1436:
1431:
1426:
1421:
1416:
1411:
1406:
1401:
1396:
1391:
1386:
1381:
1380:
1379:
1374:
1369:
1359:
1350:
1345:
1344:
1341:
1340:
1337:
1336:
1334:Unconventional
1331:
1326:
1321:
1316:
1311:
1306:
1301:
1296:
1291:
1282:
1280:Disinformation
1277:
1272:
1267:
1262:
1257:
1252:
1251:
1250:
1245:
1235:
1230:
1225:
1220:
1215:
1210:
1204:
1199:
1198:
1195:
1194:
1191:
1190:
1185:
1178:
1177:
1176:
1175:
1174:
1173:
1163:
1158:
1153:
1148:
1143:
1131:
1130:
1129:
1128:
1127:
1126:
1116:
1111:
1106:
1101:
1096:
1091:
1079:
1078:
1077:
1076:
1071:
1066:
1057:
1052:
1051:
1048:
1047:
1044:
1043:
1038:
1033:
1031:Basic training
1028:
1021:
1020:
1015:
1010:
1005:
998:
997:
992:
987:
982:
977:
972:
967:
960:
959:
957:Reconnaissance
954:
949:
944:
939:
934:
929:
922:
921:
916:
911:
906:
901:
896:
891:
884:
883:
878:
876:Special forces
873:
868:
867:
866:
856:
851:
844:
843:
838:
833:
831:Reconnaissance
828:
823:
818:
813:
806:
805:
796:
791:
782:
777:
772:
767:
762:
757:
752:
747:
742:
737:
731:
726:
725:
722:
721:
718:
717:
716:
715:
710:
700:
699:
698:
693:
683:
682:
681:
674:Post-classical
671:
666:
660:
655:
654:
651:
650:
642:
641:
623:
622:
612:
611:
604:Hurlburt Field
565:
562:
522:
519:
518:
517:
514:
506:
505:
486:
478:
475:
474:
473:
452:
432:
414:
394:
343:
340:
303:
300:
298:
295:
265:
262:
175:
172:
166:(MILDEC), and
143:
142:
101:
99:
92:
85:
84:
40:
38:
31:
15:
9:
6:
4:
3:
2:
5766:
5755:
5752:
5750:
5747:
5746:
5744:
5735:
5732:
5729:
5728:
5723:
5722:K. A. Taipale
5720:
5717:
5714:
5711:
5708:
5706:
5703:
5701:
5698:
5696:
5693:
5691:
5688:
5686:
5683:
5682:
5675:
5672:
5664:
5654:
5650:
5649:inappropriate
5646:
5642:
5636:
5634:
5627:
5618:
5617:
5604:
5600:
5593:
5592:
5586:
5585:
5563:
5556:
5540:
5536:
5535:
5527:
5512:
5508:
5501:
5494:
5490:
5486:
5480:
5464:
5460:
5453:
5446:
5440:
5433:
5429:
5423:
5416:
5411:
5402:
5393:
5386:
5381:
5374:
5369:
5360:
5354:
5349:
5347:
5339:
5334:
5315:
5311:
5304:
5298:
5290:
5286:
5280:
5273:
5268:
5252:
5245:
5238:
5233:
5231:
5229:
5221:
5216:
5209:
5204:
5188:
5184:
5180:
5174:
5158:
5152:
5143:
5136:
5130:
5123:
5119:
5116:
5110:
5103:
5097:
5090:
5084:
5077:
5071:
5064:
5058:
5056:
5048:
5044:
5041:
5035:
5033:
5025:
5021:
5018:
5012:
5005:
4999:
4997:
4989:
4985:
4982:
4976:
4960:
4956:
4950:
4948:
4931:
4927:
4920:
4904:
4897:
4895:
4878:
4871:
4869:
4852:
4848:
4844:
4837:
4835:
4818:
4814:
4807:
4800:
4796:
4793:
4789:
4785:
4781:
4778:
4773:
4765:
4759:
4751:
4745:
4729:
4725:
4718:
4702:
4698:
4692:
4677:
4673:
4667:
4651:
4644:
4628:
4622:
4614:
4608:
4589:
4582:
4576:
4570:
4565:
4556:
4554:
4538:
4531:
4525:
4508:
4501:
4495:
4479:
4475:
4469:
4453:
4449:
4443:
4427:
4423:
4417:
4398:
4397:
4390:
4375:
4371:
4365:
4350:
4346:
4340:
4325:
4321:
4315:
4300:
4296:
4290:
4274:
4270:
4264:
4248:
4241:
4225:
4218:
4202:
4195:
4189:
4173:
4172:
4164:
4162:
4142:
4141:
4133:
4114:
4113:
4105:
4090:
4086:
4082:
4078:
4072:
4064:
4060:
4053:
4045:
4038:
4031:
4015:
4008:
4001:
3999:
3982:
3978:
3972:
3956:
3952:
3945:
3929:
3925:
3919:
3911:
3905:
3886:
3879:
3873:
3871:
3869:
3867:
3862:
3852:
3849:
3847:
3844:
3842:
3839:
3837:
3834:
3832:
3829:
3827:
3824:
3822:
3819:
3817:
3814:
3812:
3809:
3807:
3804:
3802:
3799:
3797:
3794:
3792:
3789:
3787:
3784:
3782:
3779:
3777:
3774:
3772:
3769:
3767:
3764:
3762:
3759:
3757:
3754:
3752:
3749:
3747:
3744:
3742:
3739:
3737:
3734:
3732:
3729:
3727:
3724:
3723:
3714:
3711:
3707:
3703:
3699:
3698:
3697:Rolling Stone
3693:
3689:
3685:
3681:
3677:
3673:
3672:
3665:
3662:February 2015
3655:
3651:
3647:
3641:
3640:
3635:This article
3633:
3624:
3623:
3615:
3613:
3608:
3605:
3599:
3590:
3588:
3583:
3579:
3574:
3564:
3555:
3551:
3545:
3542:
3539:
3538:
3537:
3534:
3530:
3529:
3523:
3521:
3517:
3513:
3509:
3508:
3503:
3499:
3498:
3494:
3488:
3483:
3482:
3473:
3469:
3468:forum avatars
3464:
3460:
3458:
3454:
3450:
3444:
3438:
3437:Steganography
3431:Steganography
3422:
3421:
3418:
3414:
3413:
3412:
3408:
3404:
3392:
3391:
3390:
3381:
3378:February 2015
3371:
3367:
3363:
3357:
3356:
3351:This article
3349:
3340:
3339:
3326:
3324:
3319:
3315:
3311:
3305:
3285:
3279:
3278:
3272:
3269:
3265:
3261:
3251:
3246:
3231:
3229:
3225:
3221:
3217:
3213:
3208:
3206:
3202:
3198:
3194:
3190:
3185:
3183:
3179:
3174:
3169:
3167:
3163:
3159:
3155:
3151:
3148:that attacks
3147:
3144:developed by
3143:
3139:
3134:
3124:
3122:
3118:
3114:
3113:
3109:
3105:
3101:
3100:
3094:
3092:
3088:
3084:
3080:
3077:
3073:
3069:
3068:computer worm
3065:
3060:
3045:
3043:
3039:
3035:
3031:
3027:
3024:
3020:
3015:
3013:
3009:
3005:
3001:
2997:
2993:
2989:
2985:
2981:
2977:
2973:
2969:
2965:
2961:
2957:
2953:
2948:
2946:
2942:
2941:Iraqi Freedom
2938:
2934:
2930:
2926:
2922:
2917:
2915:
2909:
2886:
2882:
2877:
2873:
2872:
2867:
2862:
2850:
2849:Article title
2847:
2843:
2839:
2835:
2834:
2828:
2823:
2817:
2805:
2802:
2798:
2795:
2791:
2786:
2783:
2782:
2777:
2769:
2762:
2758:
2753:
2748:
2742:
2728:
2724:
2720:
2716:
2715:
2713:
2707:
2694:
2691:
2688:
2684:
2679:
2676:
2673:
2672:
2670:
2665:
2664:
2661:
2657:
2650:
2646:
2642:
2637:
2632:
2610:
2605:
2603:
2598:
2596:
2591:
2590:
2588:
2587:
2580:
2577:
2575:
2572:
2570:
2567:
2565:
2562:
2560:
2557:
2555:
2552:
2550:
2547:
2545:
2542:
2540:
2537:
2536:
2533:
2528:
2527:
2520:
2517:
2515:
2512:
2510:
2507:
2505:
2502:
2500:
2497:
2495:
2492:
2491:
2485:
2484:
2477:
2474:
2472:
2469:
2467:
2464:
2462:
2459:
2457:
2454:
2452:
2449:
2447:
2444:
2442:
2439:
2437:
2436:Warrior caste
2434:
2432:
2429:
2427:
2424:
2423:
2420:
2415:
2414:
2407:
2406:Show of force
2404:
2400:
2397:
2395:
2394:Peacebuilding
2392:
2391:
2390:
2387:
2385:
2382:
2380:
2377:
2375:
2372:
2370:
2367:
2365:
2362:
2360:
2357:
2355:
2352:
2350:
2347:
2345:
2342:
2340:
2337:
2335:
2332:
2331:
2328:
2323:
2322:
2315:
2312:
2308:
2305:
2304:
2303:
2300:
2298:
2295:
2293:
2290:
2288:
2285:
2283:
2282:
2278:
2276:
2273:
2271:
2268:
2266:
2263:
2261:
2258:
2256:
2253:
2251:
2250:Air supremacy
2248:
2247:
2244:
2239:
2238:
2231:
2228:
2226:
2223:
2221:
2218:
2216:
2213:
2211:
2208:
2206:
2203:
2201:
2198:
2196:
2193:
2191:
2190:Islamic rules
2188:
2186:
2183:
2181:
2178:
2176:
2173:
2171:
2170:Court-martial
2168:
2166:
2163:
2161:
2158:
2157:
2154:
2149:
2148:
2139:
2136:
2135:
2134:
2131:
2129:
2126:
2124:
2121:
2120:
2117:
2112:
2111:
2102:
2099:
2097:
2094:
2092:
2089:
2088:
2087:
2084:
2082:
2079:
2075:
2072:
2070:
2069:Arms industry
2067:
2066:
2065:
2062:
2060:
2057:
2055:
2052:
2051:
2048:
2043:
2042:
2035:
2031:
2028:
2026:
2023:
2019:
2016:
2015:
2014:
2011:
2009:
2006:
2004:
2001:
1999:
1996:
1994:
1991:
1989:
1986:
1984:
1981:
1979:
1976:
1974:
1971:
1969:
1966:
1964:
1961:
1957:
1954:
1953:
1952:
1949:
1948:
1945:
1940:
1939:
1932:
1929:
1927:
1924:
1922:
1919:
1917:
1914:
1912:
1909:
1907:
1904:
1902:
1899:
1897:
1894:
1892:
1889:
1887:
1884:
1882:
1879:
1878:
1875:
1870:
1869:
1862:
1859:
1857:
1854:
1852:
1849:
1847:
1844:
1842:
1839:
1837:
1834:
1833:
1830:
1825:
1824:
1817:
1814:
1812:
1809:
1807:
1804:
1802:
1799:
1797:
1794:
1792:
1789:
1787:
1784:
1782:
1779:
1777:
1774:
1772:
1769:
1767:
1764:
1762:
1759:
1757:
1754:
1752:
1749:
1747:
1744:
1742:
1739:
1737:
1734:
1732:
1729:
1727:
1724:
1722:
1719:
1717:
1714:
1712:
1709:
1707:
1704:
1702:
1699:
1697:
1694:
1692:
1689:
1687:
1686:Broken-backed
1684:
1682:
1679:
1677:
1674:
1673:
1670:
1665:
1664:
1657:
1654:
1652:
1649:
1647:
1644:
1642:
1639:
1637:
1634:
1632:
1629:
1627:
1624:
1622:
1619:
1617:
1614:
1612:
1609:
1607:
1604:
1602:
1599:
1597:
1594:
1592:
1589:
1587:
1584:
1582:
1579:
1577:
1574:
1573:
1572:
1567:
1562:
1561:
1554:
1551:
1549:
1546:
1544:
1541:
1539:
1536:
1534:
1531:
1529:
1528:Expeditionary
1526:
1524:
1523:
1519:
1517:
1514:
1512:
1509:
1508:
1505:
1500:
1499:
1492:
1489:
1487:
1484:
1482:
1479:
1477:
1474:
1472:
1469:
1467:
1464:
1460:
1457:
1456:
1455:
1452:
1450:
1447:
1445:
1442:
1440:
1437:
1435:
1432:
1430:
1427:
1425:
1422:
1420:
1417:
1415:
1412:
1410:
1407:
1405:
1402:
1400:
1399:Counterattack
1397:
1395:
1392:
1390:
1387:
1385:
1382:
1378:
1375:
1373:
1370:
1368:
1365:
1364:
1363:
1360:
1358:
1355:
1354:
1353:
1348:
1343:
1342:
1335:
1332:
1330:
1327:
1325:
1324:Psychological
1322:
1320:
1317:
1315:
1312:
1310:
1307:
1305:
1302:
1300:
1297:
1295:
1292:
1290:
1286:
1283:
1281:
1278:
1276:
1273:
1271:
1268:
1266:
1263:
1261:
1260:Combined arms
1258:
1256:
1253:
1249:
1246:
1244:
1241:
1240:
1239:
1236:
1234:
1231:
1229:
1226:
1224:
1221:
1219:
1216:
1214:
1211:
1209:
1206:
1205:
1202:
1197:
1196:
1189:
1186:
1184:
1181:
1180:
1172:
1169:
1168:
1167:
1164:
1162:
1159:
1157:
1154:
1152:
1149:
1147:
1144:
1142:
1139:
1138:
1137:
1134:
1133:
1125:
1122:
1121:
1120:
1117:
1115:
1112:
1110:
1107:
1105:
1102:
1100:
1099:Fortification
1097:
1095:
1092:
1090:
1087:
1086:
1085:
1082:
1081:
1075:
1072:
1070:
1067:
1065:
1062:
1061:
1059:
1058:
1055:
1050:
1049:
1042:
1039:
1037:
1034:
1032:
1029:
1027:
1024:
1023:
1019:
1016:
1014:
1011:
1009:
1006:
1004:
1001:
1000:
996:
993:
991:
988:
986:
983:
981:
978:
976:
973:
971:
968:
966:
963:
962:
958:
955:
953:
950:
948:
945:
943:
940:
938:
935:
933:
930:
928:
925:
924:
920:
917:
915:
914:Landing craft
912:
910:
907:
905:
902:
900:
897:
895:
892:
890:
887:
886:
882:
879:
877:
874:
872:
869:
865:
862:
861:
860:
857:
855:
852:
850:
847:
846:
842:
839:
837:
834:
832:
829:
827:
824:
822:
819:
817:
814:
812:
809:
808:
804:
800:
799:Standing army
797:
795:
792:
790:
786:
783:
781:
778:
776:
773:
771:
768:
766:
763:
761:
758:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
732:
729:
724:
723:
714:
711:
709:
706:
705:
704:
701:
697:
694:
692:
691:pike and shot
689:
688:
687:
684:
680:
677:
676:
675:
672:
670:
667:
665:
662:
661:
658:
653:
652:
648:
644:
643:
637:
629:
625:
624:
620:
619:
616:
609:
605:
601:
597:
593:
592:
591:
588:
586:
581:
579:
570:
561:
559:
555:
551:
546:
544:
540:
536:
527:
515:
512:
511:
510:
503:
499:
495:
491:
487:
484:
483:
482:
472:
471:(Deactivated)
469:
465:
461:
457:
453:
451:
447:
443:
442:
437:
433:
431:
427:
423:
419:
415:
413:
409:
405:
404:
399:
395:
393:
389:
385:
384:
379:
375:
374:
373:
371:
366:
364:
360:
353:
348:
339:
337:
333:
329:
325:
321:
317:
308:
294:
292:
287:
284:
280:
270:
261:
257:
255:
250:
247:
246:John P. White
243:
238:
234:
232:
227:
225:
221:
217:
213:
209:
204:
202:
197:
193:
189:
180:
171:
169:
165:
161:
157:
153:
149:
139:
136:
128:
118:
114:
108:
107:
100:
91:
90:
81:
78:
70:
60:
56:
50:
49:
45:
39:
30:
29:
26:
22:
5726:
5667:
5658:
5643:by removing
5630:
5590:
5581:Bibliography
5566:. Retrieved
5555:
5543:. Retrieved
5539:the original
5533:
5526:
5514:. Retrieved
5510:
5500:
5488:
5479:
5467:. Retrieved
5462:
5452:
5439:
5422:
5417:, p. 13
5410:
5401:
5392:
5387:, p. 12
5380:
5368:
5359:
5333:
5321:. Retrieved
5314:the original
5309:
5297:
5288:
5279:
5267:
5255:. Retrieved
5253:. Reuters US
5244:
5239:, p. 11
5222:, p. 20
5215:
5203:
5191:. Retrieved
5187:the original
5182:
5173:
5161:. Retrieved
5151:
5142:
5129:
5109:
5096:
5083:
5070:
5011:
4975:
4963:. Retrieved
4959:the original
4934:. Retrieved
4930:the original
4919:
4907:. Retrieved
4881:. Retrieved
4855:. Retrieved
4851:the original
4821:. Retrieved
4816:
4806:
4772:
4758:
4744:
4734:16 September
4732:. Retrieved
4728:the original
4717:
4705:. Retrieved
4701:the original
4691:
4679:. Retrieved
4675:
4666:
4654:. Retrieved
4643:
4631:. Retrieved
4621:
4595:. Retrieved
4588:the original
4575:
4564:
4540:. Retrieved
4536:
4524:
4511:. Retrieved
4506:
4494:
4482:. Retrieved
4477:
4468:
4456:. Retrieved
4451:
4442:
4430:. Retrieved
4425:
4416:
4404:. Retrieved
4395:
4389:
4377:. Retrieved
4373:
4364:
4352:. Retrieved
4348:
4339:
4327:. Retrieved
4323:
4314:
4302:. Retrieved
4298:
4289:
4277:. Retrieved
4272:
4263:
4251:. Retrieved
4240:
4228:. Retrieved
4217:
4205:. Retrieved
4200:
4188:
4176:. Retrieved
4170:
4148:. Retrieved
4139:
4132:
4120:. Retrieved
4111:
4104:
4092:. Retrieved
4080:
4071:
4062:
4058:
4052:
4043:
4030:
4018:. Retrieved
4013:
3985:. Retrieved
3980:
3971:
3959:. Retrieved
3954:
3944:
3932:. Retrieved
3927:
3918:
3892:. Retrieved
3885:the original
3751:Cyberwarfare
3695:
3659:
3644:Please help
3636:
3609:
3604:Mohamed Atta
3600:
3596:
3584:
3580:
3576:
3561:
3552:
3549:
3526:
3524:
3515:
3505:
3490:
3479:
3477:
3446:
3409:
3405:
3401:
3388:
3375:
3360:Please help
3352:
3307:
3283:
3256:
3209:
3207:since 2006.
3186:
3170:
3136:
3110:
3099:Need To Know
3097:
3095:
3062:
3022:
3016:
3012:Pennsylvania
3000:Olmstead AFB
2995:
2951:
2949:
2920:
2918:
2913:
2911:
2800:individuals.
2784:
2692:
2669:subdivisions
2519:Fifth column
2499:War resister
2494:Women in war
2389:Peacekeeping
2334:Arms control
2279:
1968:Mobilization
1963:Conscription
1921:Intelligence
1874:Organization
1520:
1449:Encirclement
1329:Radiological
1265:Conventional
1119:Subterranean
1026:Development:
1025:
1002:
964:
926:
889:Naval units:
888:
881:Signal corps
848:
826:Intelligence
811:Specialties:
810:
735:Organization
686:Early modern
613:
589:
582:
575:
547:
532:
507:
480:
470:
459:
439:
421:
401:
388:Fort Belvoir
381:
367:
357:
313:
310:JIOWC Emblem
288:
279:flag-officer
275:
258:
251:
239:
235:
228:
205:
185:
147:
146:
131:
122:
103:
73:
67:October 2023
64:
42:
25:
5516:28 November
5469:28 November
5375:, p. 5
5340:, p. 7
5310:Justice.gov
5210:, p. 6
4823:14 February
4777:Gary Samore
4484:26 November
4458:26 November
4432:26 November
4406:26 November
4379:26 November
4354:26 November
4329:26 November
4304:26 November
4207:25 December
4203:. U.S. Army
4178:25 December
4150:25 December
4122:25 December
4020:27 November
3987:27 November
3983:. U.S. Navy
3961:27 November
3934:27 November
3688:John McCain
3520:Jack Kelley
3453:e-mail spam
3424:objectives.
3318:Afghanistan
3304:Radio Azadi
3298:Radio Azadi
3205:Afghanistan
3184:launchers.
3146:BAE Systems
3104:Gary Samore
3042:E-6 Mercury
2883:, multiple
2722:themselves.
2504:War studies
2327:Non-warfare
2255:Appeasement
2220:Martial law
2059:War economy
1998:Transgender
1951:Recruitment
1711:Containment
1596:Culminating
1504:Operational
1424:Envelopment
1367:Air assault
1248:Air cavalry
1208:Air defence
1188:Information
1089:Cold-region
1054:Battlespace
1003:Historical:
849:Land units:
775:Space force
770:Coast guard
703:Late modern
664:Prehistoric
332:Joint Staff
231:Vietnam War
212:Eighth Army
201:TBM Avenger
188:World War 2
5743:Categories
4707:5 December
4279:5 December
4253:24 January
4230:5 December
3857:References
3692:Carl Levin
3654:Wikisource
3571:See also:
3441:See also:
3370:Wikisource
3275:B (SOMS-B)
3214:to thwart
3154:Big Safari
3079:industrial
3038:Boeing 707
3008:Middletown
2859:See also:
2820:See also:
2745:See also:
2710:See also:
2564:War crimes
2554:Operations
2461:Foot drill
2431:Battle cry
2344:deterrence
2003:Harassment
1978:Specialism
1801:Technology
1796:Succession
1741:Liberation
1676:Asymmetric
1611:Empty fort
1522:Blitzkrieg
1491:Withdrawal
1454:Investment
1233:Camouflage
1228:Biological
1166:Underwater
1141:Amphibious
1060:Aerospace
927:Air units:
904:Submarines
713:fourth-gen
708:industrial
696:napoleonic
498:Northfield
468:California
464:Camp Parks
462:(USAR) at
444:(USAR) at
426:Camp Mabry
424:(ARNG) at
412:Washington
406:(ARNG) at
208:Korean War
192:Ghost Army
125:April 2024
44:neutrality
5645:excessive
4909:5 October
4883:5 October
4857:5 October
4094:12 August
4089:0040-781X
3746:Cyberware
3650:Wikiquote
3637:contains
3618:Criticism
3516:USA Today
3481:USA Today
3366:Wikiquote
3353:contains
2730:networks.
2726:networks.
2451:War novel
2354:Grey-zone
2314:War games
2275:Overmatch
2225:War crime
2175:Desertion
2165:Ceasefire
2160:Armistice
2047:Logistics
2025:Mercenary
2013:Volunteer
1944:Personnel
1916:Engineers
1861:Sociology
1816:World war
1811:Total war
1791:Strategic
1781:Religious
1766:Political
1761:Perpetual
1736:Irregular
1651:Offensive
1626:Defensive
1621:Deception
1581:Attrition
1434:Guerrilla
1429:Formation
1372:Airbridge
1304:Loitering
1218:Artillery
871:Artillery
821:Engineers
789:Irregular
760:Air force
363:DOTMLPF-P
162:(PSYOP),
113:talk page
55:talk page
5661:May 2016
5603:Archived
5568:17 April
5545:26 April
5489:see also
5257:27 April
5193:24 April
5163:18 April
5118:Archived
5043:Archived
5020:Archived
4984:Archived
4965:24 April
4936:24 April
4819:. London
4795:Archived
4780:Archived
4681:18 April
4656:18 April
4633:18 April
4607:cite web
3904:cite web
3720:See also
3497:eBay.com
3493:al-Qaeda
3491:Lately,
2998:(former
2937:Gulf War
2881:Facebook
2466:War song
2441:War film
2074:Materiel
1993:Children
1973:Training
1911:Medicine
1896:Doctrine
1851:Training
1786:Resource
1771:Princely
1721:Economic
1706:Conquest
1701:Colonial
1696:Cold war
1681:Blockade
1566:Strategy
1538:Maneuver
1299:Infantry
1255:Chemical
1109:Mountain
1069:Airborne
932:Fighters
899:Warships
854:Infantry
780:Reserves
728:Military
558:Virginia
450:New York
392:Maryland
283:ConStaff
106:disputed
48:disputed
5639:Please
5631:use of
4672:"OPSEC"
4597:4 April
4569:, p. 98
4537:Gwu.edu
4507:Gwu.edu
3894:4 April
3119:(IDF),
3108:British
3091:rootkit
3083:malware
3076:Siemens
3064:Stuxnet
3059:Stuxnet
3053:Stuxnet
3040:-based
2579:Writers
2574:Weapons
2539:Battles
2488:Related
2476:Wargame
2471:Uniform
2419:Culture
2200:Perfidy
2195:Justice
2116:Science
2101:Outpost
2054:History
2034:Warrior
2030:Soldier
2018:foreign
1956:counter
1856:Service
1806:Theater
1746:Limited
1726:Endemic
1641:Nuclear
1414:Foxhole
1389:Cavalry
1377:Airdrop
1362:Airlift
1347:Tactics
1319:Nuclear
1309:Missile
1238:Cavalry
1223:Barrage
1201:Weapons
1161:Surface
942:Command
937:Bombers
894:Frogman
864:Cavalry
836:Medical
803:Militia
785:Regular
765:Marines
679:castles
669:Ancient
657:History
636:outline
608:Florida
548:In the
533:In the
502:Vermont
368:In the
158:(CNO),
5323:20 May
4542:20 May
4513:20 May
4087:
3533:USENET
3472:mozaiq
3216:Syrian
3197:F-16CJ
3195:, and
3193:RC-135
3189:EC-130
3089:(PLC)
3026:TACAMO
2902:EC-130
2761:Kirkuk
2559:Sieges
2243:Theory
1983:Morale
1841:Policy
1836:Branch
1616:Mosaic
1606:Fabian
1553:Covert
1486:Trench
1471:Screen
1394:Charge
1384:Battle
1357:Aerial
1275:Denial
1243:Horses
1171:Seabed
1124:Tunnel
1104:Jungle
1094:Desert
1064:Aerial
154:(EW),
5595:(PDF)
5317:(PDF)
5306:(PDF)
4591:(PDF)
4584:(PDF)
4533:(PDF)
4503:(PDF)
4400:(PDF)
4197:(PDF)
4144:(PDF)
4116:(PDF)
4040:(PDF)
4010:(PDF)
3888:(PDF)
3881:(PDF)
3593:OPSEC
3567:PSYOP
3512:Milan
3487:jihad
3449:email
3293:Radio
3228:F-16s
3224:F-15s
3173:radar
3138:Suter
3127:Suter
3066:is a
3002:) at
2885:blogs
2532:Lists
1988:Women
1926:Ranks
1846:Staff
1776:Proxy
1691:Class
1646:Naval
1631:Depth
1466:Swarm
1459:Siege
1439:Naval
1419:Drone
1314:Music
1289:Robot
1285:Drone
1270:Cyber
1213:Armor
1183:Cyber
1156:Green
1151:Brown
1114:Urban
1074:Space
995:Radar
990:Sonar
859:Armor
816:Staff
794:Ranks
430:Texas
328:Texas
196:D-Day
5570:2012
5547:2012
5518:2023
5493:2011
5485:2011
5471:2023
5445:2011
5432:2011
5428:2011
5325:2016
5259:2012
5195:2012
5165:2012
4967:2012
4938:2012
4911:2007
4885:2007
4859:2007
4825:2012
4736:2010
4709:2010
4683:2012
4658:2012
4635:2012
4613:link
4599:2015
4544:2016
4515:2016
4486:2023
4460:2023
4434:2023
4408:2023
4381:2023
4356:2023
4331:2023
4306:2023
4281:2023
4255:2022
4232:2023
4209:2023
4180:2023
4152:2023
4124:2023
4096:2021
4085:ISSN
4081:Time
4022:2023
3989:2023
3963:2023
3936:2023
3910:link
3896:2015
3796:iWar
3690:and
3502:9/11
3226:and
3203:and
3201:Iraq
3030:SIOP
3017:The
2950:The
2927:and
2919:The
2912:The
2569:Wars
2086:Base
1636:Goal
1548:Raid
1146:Blue
1084:Land
755:Navy
750:Army
576:The
352:JBLM
314:The
41:The
5647:or
5487:);
3268:VOA
3266:or
3264:BBC
3021:'s
3006:in
2153:Law
2096:FOB
2091:MOB
1136:Sea
628:War
602:at
496:in
386:at
5745::
5724:,
5601:.
5597:.
5509:.
5495:).
5461:.
5447:).
5434:).
5345:^
5308:.
5287:.
5227:^
5181:.
5054:^
5031:^
4995:^
4946:^
4893:^
4867:^
4845:.
4833:^
4815:.
4674:.
4609:}}
4605:{{
4552:^
4535:.
4505:.
4476:.
4450:.
4424:.
4372:.
4347:.
4322:.
4297:.
4271:.
4199:.
4160:^
4079:.
4063:15
4061:.
4042:.
4012:.
3997:^
3979:.
3953:.
3926:.
3906:}}
3902:{{
3865:^
3191:,
3168:.
3093:.
3044:.
3014:.
3010:,
2976:TV
2974:,
2972:HF
2970:,
2968:FM
2966:,
2964:AM
2897:EW
2671::
2647:,
2643:,
2032:/
1287:/
801:/
787:/
606:,
560:.
556:,
500:,
466:,
448:,
428:,
410:,
390:,
326:,
244:,
233:.
5674:)
5668:(
5663:)
5659:(
5655:.
5637:.
5572:.
5549:.
5520:.
5473:.
5327:.
5291:.
5261:.
5197:.
5167:.
4969:.
4940:.
4913:.
4887:.
4861:.
4827:.
4738:.
4711:.
4685:.
4660:.
4637:.
4615:)
4601:.
4546:.
4519:]
4517:.
4488:.
4462:.
4436:.
4410:.
4383:.
4358:.
4333:.
4308:.
4283:.
4257:.
4234:.
4211:.
4182:.
4154:.
4126:.
4098:.
4024:.
3991:.
3965:.
3938:.
3912:)
3898:.
3664:)
3660:(
3656:.
3642:.
3380:)
3376:(
3372:.
3358:.
2608:e
2601:t
2594:v
638:)
634:(
610:.
504:.
138:)
132:(
127:)
123:(
119:.
109:.
80:)
74:(
69:)
65:(
61:.
51:.
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.