14 research outputs found

    You have been friended by the U.S. military : using social networking services for IO messaging

    Get PDF
    Social Networking Services (SNS) have achieved a salience in today's society. Facebook has over 500 million active users worldwide. SNS has been used by companies to advertise and communicate with their customers. Politicians and government officials have created Facebook and Twitter accounts to keep in touch with constituents. They use these tools for campaigns, to gather feedback, and for strategic communications. The perceived effect of these tools to influence populations has prompted countries such as Iran and China to enact policies to limit access to these websites. The Department of Defense (DoD) is using some of these tools for public affairs and strategic communications, but the use of these tools for the purpose of planned influence operations has not been exploited. Currently, SNS are used extensively in the private business and political sector. Studying the private sector's use of SNS could yield some insights for the DoD and influence campaigns. The purpose of this study is to determine if U.S. Information Operations (IO) professionals should develop Tactics, Techniques, and Procedures (TTPs) for the use of SNS in order to conduct IO. This work will research the successful use of SNS by marketing and political campaign professionals in order to identify the best uses of SNS for the IO community within the DoD.http://archive.org/details/youhavebeenfrien109455006US Army (USA) authorsApproved for public release; distribution is unlimited

    Security Analysis: A Critical Thinking Approach

    Get PDF
    Security Analysis: A Critical-Thinking Approach is for anyone desiring to learn techniques for generating the best answers to complex questions and best solutions to complex problems. It furnishes current and future analysts in national security, homeland security, law enforcement, and corporate security an alternative, comprehensive process for conducting both intelligence analysis and policy analysis. The target audience is upper-division undergraduate students and new graduate students, along with entry-level practitioner trainees. The book centers on a Security Analysis Critical-Thinking Framework that synthesizes critical-thinking and existing analytic techniques. Ample examples are provided to assist readers in comprehending the material. Newly created material includes techniques for analyzing beliefs and political cultures. The book also functions as an introduction to Foreign Policy and Security Studies.https://encompass.eku.edu/ekuopen/1005/thumbnail.jp

    A holistic, risk, and futures based approach to deception: technological convergence and emerging patterns of conflict

    Get PDF
    Modern challenges in forensic and security domains require greater insight and flexibility into the ways deception can be identified and responded to. Deception is common across interactions and understanding how mindset, motive and context affects deception is critical. Research has focussed upon how deception manifests in interpersonal interactions and has sought to identify behaviours indicative of truth-telling and deceit. The growth of mediated communication has further increased challenges in ensuring information is credible. Deception in military environments has focussed on planning deception, where approaches have been developed to deceive others, but rarely examined from counter-deception perspectives. To address these challenges this thesis advocates a holistic approach to deception detection, whereby strategies will be tailored to match context. In accordance with an in vivo approach to research, a critical review of literature related to deception and related areas was conducted leading to the initial development of a theoretical holistic model of deception detection comprising a deception framework and an individual differences (deceiver and target) framework. Following model development, validation with Subject Matter Experts (SMEs) was conducted. Explanatory thematic analysis of interviews conducted with SMEs (n=19) led to the development of meta-themes related to the ‘deceiver’, their ‘intent; ‘strategies and tactics’ of deception, ‘interpretation’ by the target and ‘target’ decision-making strengths and vulnerabilities. These findings led to the development of the Holistic Model of Deception, an approach where detection strategies are tailored to match the context of an interaction, whether interpersonal or mediated. Understanding the impact of culture on decision-making in deception detection and in particular the cues used to detect deception in interpersonal and mediated environments is required for understanding human behaviour in a globalised world. Interviews were conducted with Western (n=22) and Eastern (n=16) participants before being subject to explanatory and comparative thematic analysis identified twelve cross-cultural strategies for assessing credibility and one culturally specific strategy used by Western participants. Risk assessment and management techniques have been used to assess risks posed in forensic and security environments; however, such approaches have not been applied to deception detection. The Deception Assessment Real-Time Nexus©2015 and Deception Risk Assessment Technique©2015 were developed as an early warning tool and a Structured Professional Judgement risk assessment and management technique. The Deception Risk Assessment Technique©2015 outlines multiple ways of identifying and managing threats posed by deception and is employable across individuals and groups. In developing the futures-based approach to deception detection, reactive, active and proactive approaches to deception were reviewed, followed by an examination of scenario planning utility and methodology from futures and strategic forecasting research. Adopting the qualitative ‘intuitive logics’ methodology ten scenarios were developed of potential future threats involving deception. Risk assessment of two scenarios was conducted to show the value of a risk assessment approach to deception detection and management. In conclusion, this thesis has developed a Holistic Model of Deception, explored the links between interpersonal and mediated strategies for detecting deception, formulated a risk assessment and management approach to deception detection and developed future scenarios of threats involving deception

    Naval Postgraduate School Catalog 2015

    Get PDF
    Approved for public release; distribution is unlimited

    Naval Postgraduate School Catalog 2016

    Get PDF
    Approved for public release; distribution is unlimited

    Méta-apprentissage des algorithmes génétiques

    Get PDF

    Naval Postgraduate School Academic Catalog - September 2022

    Get PDF

    Naval Postgraduate School Academic Catalog - September 2021

    Get PDF

    Naval Postgraduate School Academic Catalog - January 2021

    Get PDF

    Naval Postgraduate School Academic Catalog - 09 July 2021

    Get PDF
    corecore