New Imperialists : Ideologies of Empire
New Imperialists : Ideologies of Empire
New Imperialists : Ideologies of Empire
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
MIRRLEES: American S<strong>of</strong>t Power 213<br />
process, and disseminate an uninterrupted flow <strong>of</strong> information while<br />
exploiting or destroying an adversary’s ability to do the same.” 57<br />
Information operations are thus conceived as an ideological instrument<br />
<strong>of</strong> American foreign policy. “Informational capability,” contends<br />
Armistead, “more than any other component <strong>of</strong> power, is truly crucial to<br />
effective [American] foreign policy in this new era”; 58 “information is<br />
rapidly assuming a place <strong>of</strong> primacy in the conduction <strong>of</strong> [American]<br />
foreign policy . . . and it must be understood for what it truly is: a<br />
weapon.” 59 Armistead believes that the sooner the U.S. state develops<br />
information weapons to control and manipulate the flow <strong>of</strong> information<br />
(as military intelligence, propaganda, electronic wavelengths, and<br />
computer data streams) the more successful it will be in winning future<br />
international struggles and achieving global information superiority.<br />
Armistead provides a detailed overview <strong>of</strong> the U.S. government<br />
agencies, <strong>of</strong>fices, and councils that can play a role in the American<br />
state’s <strong>of</strong>fensive and defensive information operations. In addition to<br />
recommending better intra-agency and government coordination <strong>of</strong><br />
information operations, Armistead outlines a number <strong>of</strong> defensive and<br />
<strong>of</strong>fensive informational operations strategies. Defensive information<br />
operations involve intelligence gathering, counter-intelligence, and<br />
surveillance, so that the American state can know, monitor, and debilitate<br />
the actions and informational strategies <strong>of</strong> its adversaries. 60 Offensive<br />
information operations are more complicated, and involve five strategies.<br />
Armistead recommends a computer network attack (C.N.A.) as the<br />
first <strong>of</strong>fensive information strategy. C.N.A. is “any information strategy<br />
that disrupts, denies, degrades, or destroys information that is resident in<br />
the computer networks <strong>of</strong> an adversary, or the computers and networks<br />
themselves.” 61 After addressing how “space plays an integral role in all<br />
aspects <strong>of</strong> [American] military operations,” 62 Armistead discusses the<br />
second strategy <strong>of</strong> <strong>of</strong>fensive information operations: the deepened militarization<br />
<strong>of</strong> space by the U.S. state and the continued commodification<br />
<strong>of</strong> space by U.S.-based transnational media, surveillance, and technology<br />
corporations. The goal <strong>of</strong> this project is to “develop a better strategy for<br />
handling the availability <strong>of</strong> space technology overseas while maintaining<br />
the nation’s domination in space.” 63 The third <strong>of</strong>fensive information<br />
strategy proposed by Armistead is electronic warfare, or, the U.S. state’s<br />
direction or use <strong>of</strong> electromagnetic energy to control or attack the<br />
electromagnetic field <strong>of</strong> an adversarial entity. 64