词条 | Mimicking operations |
释义 |
}}Mimicking operations is a tactical concept, developed under Terrorist Tactics, Techniques, and Procedures, to explain a form of deception, commonly used by terrorists in their attacks. The concept is commonly used in military tactical modelling and scientific simulation; and is connected to the idea of shielding friendly forces (as well as foes) from detection and deception.[1] DefinitionMimicking operations is a – “cost-effective way of achieving a desired operational effect using superior deception tactics to exploit concealment and camouflage opportunities”.[2]Relationship with military deception operationsCarlo Kopp identified in 2002 that 'deception and Mimicry is the insertion of intentionally misleading information. It amounts to mimicking a known signal so well, that a receiver cannot distinguish the phony signal from the real signal.'[1][3]Relationship with Fifth Dimension OperationsThe mimicking operations concept was acknowledged as an early iteration of contemporary Fifth Dimension Operations.[4] Use of examples from natureThe concept of mimicking operations simulates activity that resembles a bacterial attack on a large and complex organism. Attacking cells mimic the behavior of their victims, but remain dormant while awaiting an opportunity to launch an attack.[3] The development of mimicking operations has been influenced by biology, ecology and the workings of the natural world.
Military tactics useIn military tactics, the employment of mimicking operational strategies, is based on concepts:
Mimicking operations as a subset of military deceptionMimicking Operations is a subset of military deception.[5] From a logistics perspective the capacity to develop a deception strategy, reflects the relative capacity of the combatant to collect the resources to develop suitable deception. In the case of terrorism, an individual with few resources is likely to adapt a mimicking strategy, and seek to camouflage themselves. Whereas a more resourced team of terrorists with the backing of an organisation may be more likely to afford the resources to develop a decoy, as part of a developed deception strategy. References1. ^1 {{cite web |last=Flaherty |first=C. J. |year=December 2003 |title= Mimicking Operations | journal = Australian Army Journal | volume = 1 | issue = 2 | pages = 11–14 |url=https://www.army.gov.au/sites/g/files/net1846/f/aaj_2003_2.pdf}} 2. ^{{cite journal |last=Flaherty |first=C. J. |title=3D tactics and Information Deception |journal= Journal of Information Warfare |date= September 2008 |volume=7 | issue = 27 2 |pages= 49–58 }} 3. ^1 {{cite journal |first1=Carlo |last1=Kopp |first2= Bruce |last2=Mills |year=2002 |title=Information Warfare And Evolution |citeseerx = 10.1.1.159.2149 }} 4. ^{{cite book | first1 = Robert J. | last1 = Bunker | first2 = Charles "Sid" | last2 = Heal | date = 2014 | title = Fifth Dimensional Operations: Space-Time-Cyber Dimensionality in Conflict and War—A Terrorism Research Center Book | publisher = iuniverse | url = http://bookstore.iuniverse.com/Products/SKU-000943549/Fifth-Dimensional-Operations.aspx }} 5. ^{{cite web|url=http://www.oodaloop.com/security/2012/09/07/dangerous-minds-the-relationship-between-beliefs-behaviors-and-tactics/ |title=Dangerous Minds - The Relationship between Beliefs, Behaviors, and Tactics |publisher=OODA Loop |date=2012-09-07 |accessdate=2014-07-15}} 2 : Counter-terrorism|Terrorism tactics |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。