Cognitive and Information Warfare tactics, techniques, and methods from the Chinese Perspective
Enroll in Course for $499
Information operations, a key component of China’s contemporary way of war, encompasses all the uses of information and disinformation, by states or nonstate actors, as a tool of state power and includes military information support operations, cyberspace operations, electronic warfare, military deception, psychological operations, public affairs, and strategic communications. Historically, China has recognized the importance of information as a strategic tool and has a long-standing tradition of engaging in information warfare. Chinese military doctrine refers to information operations as “information warfare” or “information-psychological operations.” The Chinese perspective emphasizes using information to shape public opinion, influence decision-making processes, and achieve specific political and military objectives.
From the Chinese viewpoint, information operations encompass various activities, including propaganda, psychological warfare, disinformation campaigns, and cyber operations. They emphasize information to exploit societal vulnerabilities, manipulate narratives, and create confusion and distrust among target audiences. The objective is to achieve desired outcomes by controlling or influencing the information space domestically and internationally.
The Chinese perspective emphasizes the importance of information dominance and the ability to shape narratives supporting political and military objectives. China views information dominance and narrative control as a vital tools in asymmetrical warfare, where non-military means, such as information and psychological operations, can be employed to achieve strategic goals. We cover several areas of Chinese cognitive warfare as students learn about their adversaries strategically, operationally, tactically, and technically.
Your Instructor
Treadstone 71
Treadstone 71 is a woman and veteran-owned small business exclusively focused on cyber and threat intelligence consulting, services, and training. We are a pure-play intelligence shop.
Training dates and locations here
Since 2002, Treadstone 71 delivers intelligence training, strategic, operational, and tactical intelligence consulting, and research. We provide a seamless extension of your organization efficiently and effectively moving your organization to cyber intelligence program maturity. Our training, established in 2008, follows intelligence community standards as applied to the ever-changing threat environment delivering forecasts and estimates as intelligence intends. From baseline research to adversary targeted advisories and dossiers, Treadstone 71 products align with your intelligence requirements. We do not follow the create once and deliver many model. We contextually tie our products to your needs. Intelligence is our only business.
- We use intuition, structured techniques, and years of experience.
- We supply intelligence based on clearly defined requirements.
- We do not assign five people to do a job only one with experience.
- We do not bid base bones only to change order you to overspending.
We do not promise what we cannot deliver. We have walked in your shoes. We understand your pressures.
We are known for our ability to:
- Anticipate key target or threat activities that are likely to prompt a leadership decision.
- Aid in coordinating, validating, and managing collection requirements, plans, and activities.
- Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
- Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
- Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
- Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
- Recognize and mitigate deception in reporting and analysis.
Assess intelligence, recommend targets to support operational objectives. - Assess target vulnerabilities and capabilities to determine a course of action.
- Assist in the development of priority information requirements.
- Enable synchronization of intelligence support plans across the supply chain.
- …and Review and understand organizational leadership objectives and planning guidance non-inclusively.
