28.07.2013 Views

New Imperialists : Ideologies of Empire

New Imperialists : Ideologies of Empire

New Imperialists : Ideologies of Empire

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

MIRRLEES: American S<strong>of</strong>t Power 213<br />

process, and disseminate an uninterrupted flow <strong>of</strong> information while<br />

exploiting or destroying an adversary’s ability to do the same.” 57<br />

Information operations are thus conceived as an ideological instrument<br />

<strong>of</strong> American foreign policy. “Informational capability,” contends<br />

Armistead, “more than any other component <strong>of</strong> power, is truly crucial to<br />

effective [American] foreign policy in this new era”; 58 “information is<br />

rapidly assuming a place <strong>of</strong> primacy in the conduction <strong>of</strong> [American]<br />

foreign policy . . . and it must be understood for what it truly is: a<br />

weapon.” 59 Armistead believes that the sooner the U.S. state develops<br />

information weapons to control and manipulate the flow <strong>of</strong> information<br />

(as military intelligence, propaganda, electronic wavelengths, and<br />

computer data streams) the more successful it will be in winning future<br />

international struggles and achieving global information superiority.<br />

Armistead provides a detailed overview <strong>of</strong> the U.S. government<br />

agencies, <strong>of</strong>fices, and councils that can play a role in the American<br />

state’s <strong>of</strong>fensive and defensive information operations. In addition to<br />

recommending better intra-agency and government coordination <strong>of</strong><br />

information operations, Armistead outlines a number <strong>of</strong> defensive and<br />

<strong>of</strong>fensive informational operations strategies. Defensive information<br />

operations involve intelligence gathering, counter-intelligence, and<br />

surveillance, so that the American state can know, monitor, and debilitate<br />

the actions and informational strategies <strong>of</strong> its adversaries. 60 Offensive<br />

information operations are more complicated, and involve five strategies.<br />

Armistead recommends a computer network attack (C.N.A.) as the<br />

first <strong>of</strong>fensive information strategy. C.N.A. is “any information strategy<br />

that disrupts, denies, degrades, or destroys information that is resident in<br />

the computer networks <strong>of</strong> an adversary, or the computers and networks<br />

themselves.” 61 After addressing how “space plays an integral role in all<br />

aspects <strong>of</strong> [American] military operations,” 62 Armistead discusses the<br />

second strategy <strong>of</strong> <strong>of</strong>fensive information operations: the deepened militarization<br />

<strong>of</strong> space by the U.S. state and the continued commodification<br />

<strong>of</strong> space by U.S.-based transnational media, surveillance, and technology<br />

corporations. The goal <strong>of</strong> this project is to “develop a better strategy for<br />

handling the availability <strong>of</strong> space technology overseas while maintaining<br />

the nation’s domination in space.” 63 The third <strong>of</strong>fensive information<br />

strategy proposed by Armistead is electronic warfare, or, the U.S. state’s<br />

direction or use <strong>of</strong> electromagnetic energy to control or attack the<br />

electromagnetic field <strong>of</strong> an adversarial entity. 64

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!