请输入您要查询的百科知识:

 

词条 Mimicking operations
释义

  1. Definition

  2. Relationship with military deception operations

  3. Relationship with Fifth Dimension Operations

  4. Use of examples from nature

  5. Military tactics use

  6. Mimicking operations as a subset of military deception

  7. References

{{multiple issues|{{COI|date=April 2014}}{{refimprove|date=April 2014}}
}}Mimicking operations is a tactical concept, developed under Terrorist Tactics, Techniques, and Procedures, to explain a form of deception, commonly used by terrorists in their attacks. The concept is commonly used in military tactical modelling and scientific simulation; and is connected to the idea of shielding friendly forces (as well as foes) from detection and deception.[1]

Definition

Mimicking operations is a – “cost-effective way of achieving a desired operational effect using superior deception tactics to exploit concealment and camouflage opportunities”.[2]

Relationship with military deception operations

Carlo Kopp identified in 2002 that 'deception and Mimicry is the insertion of intentionally misleading information. It amounts to mimicking a known signal so well, that a receiver cannot distinguish the phony signal from the real signal.'[1][3]

Relationship with Fifth Dimension Operations

The mimicking operations concept was acknowledged as an early iteration of contemporary Fifth Dimension Operations.[4]

Use of examples from nature

The concept of mimicking operations simulates activity that resembles a bacterial attack on a large and complex organism. Attacking cells mimic the behavior of their victims, but remain dormant while awaiting an opportunity to launch an attack.[3] The development of mimicking operations has been influenced by biology, ecology and the workings of the natural world.

  • A species evolves the appearance of another to aid its survival.
  • Animals or insects develop a physical similarity to their predators, in order to avoid danger.
  • Portia spiders strum the webs of other spiders to imitate mating behaviors or the actions of distressed prey.

Military tactics use

In military tactics, the employment of mimicking operational strategies, is based on concepts:

  • A potential target is given confusing information and is encouraged to walk into what appears to be a safe situation.
  • The use of mimicry manipulates information through the simulation of behavior or of physical appearance.
  • Mimicking operations represents an increasingly cost-effective way of achieving a desired operational effect using superior information to exploit concealment, deception and imitation techniques.

Mimicking operations as a subset of military deception

Mimicking Operations is a subset of military deception.[5] From a logistics perspective the capacity to develop a deception strategy, reflects the relative capacity of the combatant to collect the resources to develop suitable deception. In the case of terrorism, an individual with few resources is likely to adapt a mimicking strategy, and seek to camouflage themselves. Whereas a more resourced team of terrorists with the backing

of an organisation may be more likely to afford the resources to develop a decoy, as part of a developed deception strategy.

References

1. ^{{cite web |last=Flaherty |first=C. J. |year=December 2003 |title= Mimicking Operations | journal = Australian Army Journal | volume = 1 | issue = 2 | pages = 11–14 |url=https://www.army.gov.au/sites/g/files/net1846/f/aaj_2003_2.pdf}}
2. ^{{cite journal |last=Flaherty |first=C. J. |title=3D tactics and Information Deception |journal= Journal of Information Warfare |date= September 2008 |volume=7 | issue = 27 2 |pages= 49–58 }}
3. ^{{cite journal |first1=Carlo |last1=Kopp |first2= Bruce |last2=Mills |year=2002 |title=Information Warfare And Evolution |citeseerx = 10.1.1.159.2149 }}
4. ^{{cite book | first1 = Robert J. | last1 = Bunker | first2 = Charles "Sid" | last2 = Heal | date = 2014 | title = Fifth Dimensional Operations: Space-Time-Cyber Dimensionality in Conflict and War—A Terrorism Research Center Book | publisher = iuniverse | url = http://bookstore.iuniverse.com/Products/SKU-000943549/Fifth-Dimensional-Operations.aspx }}
5. ^{{cite web|url=http://www.oodaloop.com/security/2012/09/07/dangerous-minds-the-relationship-between-beliefs-behaviors-and-tactics/ |title=Dangerous Minds - The Relationship between Beliefs, Behaviors, and Tactics |publisher=OODA Loop |date=2012-09-07 |accessdate=2014-07-15}}

2 : Counter-terrorism|Terrorism tactics

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/11 1:02:04