Mimicking operations
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Mimicking operations is a tactical concept, developed under Terrorist Tactics, Techniques, and Procedures, to explain a form of deception, commonly used by terrorists in their attacks. The concept is commonly used in military tactical modelling and scientific simulation; and is connected to the idea of shielding friendly forces (as well as foes) from detection and deception.[1]
Definition
[edit]Mimicking operations is a – “cost-effective way of achieving a desired operational effect using superior deception tactics to exploit concealment and camouflage opportunities”.[2]
Relationship with military deception operations
[edit]Carlo Kopp identified in 2002 that 'deception and Mimicry is the insertion of intentionally misleading information. It amounts to mimicking a known signal so well, that a receiver cannot distinguish the phony signal from the real signal.'[1][3]
Relationship with Fifth Dimension Operations
[edit]The mimicking operations concept was acknowledged as an early iteration of contemporary Fifth Dimension Operations.[4]
Use of examples from nature
[edit]The concept of mimicking operations simulates activity that resembles a bacterial attack on a large and complex organism. Attacking cells mimic the behavior of their victims, but remain dormant while awaiting an opportunity to launch an attack.[3] The development of mimicking operations has been influenced by biology, ecology and the workings of the natural world.
- A species evolves the appearance of another to aid its survival.
- Animals or insects develop a physical similarity to their predators, in order to avoid danger.
- Portia spiders strum the webs of other spiders to imitate mating behaviors or the actions of distressed prey.
Military tactics use
[edit]In military tactics, the employment of mimicking operational strategies, is based on concepts:
- A potential target is given confusing information and is encouraged to walk into what appears to be a safe situation.
- The use of mimicry manipulates information through the simulation of behavior or of physical appearance.
- Mimicking operations represents an increasingly cost-effective way of achieving a desired operational effect using superior information to exploit concealment, deception and imitation techniques.
Mimicking operations as a subset of military deception
[edit]Mimicking Operations is a subset of military deception.[5] From a logistics perspective the capacity to develop a deception strategy, reflects the relative capacity of the combatant to collect the resources to develop suitable deception. In the case of terrorism, an individual with few resources is likely to adapt a mimicking strategy, and seek to camouflage themselves. Whereas a more resourced team of terrorists with the backing of an organisation may be more likely to afford the resources to develop a decoy, as part of a developed deception strategy.
References
[edit]- ^ a b Flaherty, C. J. (December 2003). "Mimicking Operations" (PDF). Australian Army Journal. 1 (2): 11–14.
- ^ Flaherty, C. J. (September 2008). "3D tactics and Information Deception". Journal of Information Warfare. 7 (27 2): 49–58.
- ^ a b Kopp, Carlo; Mills, Bruce (2002). "Information Warfare And Evolution": 352–360. CiteSeerX 10.1.1.159.2149.
{{cite journal}}
: Cite journal requires|journal=
(help) - ^ Bunker, Robert J.; Heal, Charles "Sid" (2014). Fifth Dimensional Operations: Space-Time-Cyber Dimensionality in Conflict and War—A Terrorism Research Center Book. iuniverse.
- ^ "Dangerous Minds - The Relationship between Beliefs, Behaviors, and Tactics". OODA Loop. 2012-09-07. Retrieved 2014-07-15.