The Makara of Hizballah: Deception in the 2006 Summer War - History and Organization of Hizballah, Lebanon, Chain of Command, Hijacking the Internet, Bunkers, Denial Operations, Electronic Warfare

Nonfiction, History, Military, Strategy, Middle East
Cover of the book The Makara of Hizballah: Deception in the 2006 Summer War - History and Organization of Hizballah, Lebanon, Chain of Command, Hijacking the Internet, Bunkers, Denial Operations, Electronic Warfare by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781311233967
Publisher: Progressive Management Publication: July 2, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781311233967
Publisher: Progressive Management
Publication: July 2, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Information, while always a critical element of warfare, is quickly becoming decisive in present day conflicts. While the use of this information can take many forms, one area where the discussion of information's impact on conflict has been delinquent is in the art of deception.
Hizballah and Israel serve as the perfect backdrop to examine the effects of deception in current conflicts. While Israel has always maintained a hard power advantage through its military might and prowess, Hizballah looked for other ways to level the playing field. The use of information in supporting deception, which has been a key enabler for the weaker side, became one of the answers to redressing the military balance.
This paper will demonstrate that Hizballah, fighting an asymmetric conflict with Israel, used deception very effectively in their defense of southern Lebanon during the 2006 Summer War; this use of deception significantly offset many of Israel's hard power advantages. It will also show that Hizballah's use of information technologies greatly enhanced their ability to wield deception. Finally, this paper will address the interrelation of various information activities and the need to maintain consolidation of these activities for planning and execution on the modern battlefield.
CHAPTER I - INTRODUCTION * CHAPTER II - DECEPTION DEFINED * A. INTRODUCTION * B. DECEPTION EXPLORED * C. GENERAL FRAMEWORK * D. THE MECHANICS OF DECEPTION * E. RELATED ACTIVITIES * F. METHODOLOGY * G. CONCLUSION * CHAPTER III - HISTORY AND ORGANIZATION OF HIZBALLAH * A. INTRODUCTION * B. LEBANON: MODERN HISTORY * C. THE CREATION AND RISE OF HIZBALLAH * 1. The Early Years * 2. The "Lebanonization Process" * 3. Hizballah Today * D. HIZBALLAH'S ORGANIZATION * 1. Overview * 2. Chain of Command * 3. Support Organizations * a. Combat Organ * b. Enforcement, Recruitment and Propaganda Organ * c. Holy Reconstruction Organ * d. Security Organ * E. CONCLUSION * CHAPTER IV - DECEPTION IN THE 2006 SUMMER CONFLICT * A. INTRODUCTION * B. BACKGROUND * C. HIZBALLAH'S DENIAL OPERATIONS * D. THE BUNKERS * E. ELECTRONIC WARFARE BLUFF * F. MEDIA & THE BATTLE OF THE STORY * G. HIJACKING THE INTERNET * H. CONCLUSION * CHAPTER V - CONCLUSION * A. RE-EXAMINING DECEPTION IN THE INFORMATION AGE * B. LINKAGES BETWEEN INFORMATION OPERATION CAPABILITIES * C. AREAS FOR FURTHER RESEARCH * 1. Application of These Deception Criteria to Other information Age Conflicts * 2. Examination of the Relationship Between Psychological Operations and Deception * 3. Deception in Computer Network Operations * 4. The Role of Non-Combatants in Information Age Conflicts * D. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Information, while always a critical element of warfare, is quickly becoming decisive in present day conflicts. While the use of this information can take many forms, one area where the discussion of information's impact on conflict has been delinquent is in the art of deception.
Hizballah and Israel serve as the perfect backdrop to examine the effects of deception in current conflicts. While Israel has always maintained a hard power advantage through its military might and prowess, Hizballah looked for other ways to level the playing field. The use of information in supporting deception, which has been a key enabler for the weaker side, became one of the answers to redressing the military balance.
This paper will demonstrate that Hizballah, fighting an asymmetric conflict with Israel, used deception very effectively in their defense of southern Lebanon during the 2006 Summer War; this use of deception significantly offset many of Israel's hard power advantages. It will also show that Hizballah's use of information technologies greatly enhanced their ability to wield deception. Finally, this paper will address the interrelation of various information activities and the need to maintain consolidation of these activities for planning and execution on the modern battlefield.
CHAPTER I - INTRODUCTION * CHAPTER II - DECEPTION DEFINED * A. INTRODUCTION * B. DECEPTION EXPLORED * C. GENERAL FRAMEWORK * D. THE MECHANICS OF DECEPTION * E. RELATED ACTIVITIES * F. METHODOLOGY * G. CONCLUSION * CHAPTER III - HISTORY AND ORGANIZATION OF HIZBALLAH * A. INTRODUCTION * B. LEBANON: MODERN HISTORY * C. THE CREATION AND RISE OF HIZBALLAH * 1. The Early Years * 2. The "Lebanonization Process" * 3. Hizballah Today * D. HIZBALLAH'S ORGANIZATION * 1. Overview * 2. Chain of Command * 3. Support Organizations * a. Combat Organ * b. Enforcement, Recruitment and Propaganda Organ * c. Holy Reconstruction Organ * d. Security Organ * E. CONCLUSION * CHAPTER IV - DECEPTION IN THE 2006 SUMMER CONFLICT * A. INTRODUCTION * B. BACKGROUND * C. HIZBALLAH'S DENIAL OPERATIONS * D. THE BUNKERS * E. ELECTRONIC WARFARE BLUFF * F. MEDIA & THE BATTLE OF THE STORY * G. HIJACKING THE INTERNET * H. CONCLUSION * CHAPTER V - CONCLUSION * A. RE-EXAMINING DECEPTION IN THE INFORMATION AGE * B. LINKAGES BETWEEN INFORMATION OPERATION CAPABILITIES * C. AREAS FOR FURTHER RESEARCH * 1. Application of These Deception Criteria to Other information Age Conflicts * 2. Examination of the Relationship Between Psychological Operations and Deception * 3. Deception in Computer Network Operations * 4. The Role of Non-Combatants in Information Age Conflicts * D. CONCLUSION

More books from Progressive Management

Cover of the book The Materials Genome Initiative: Developing Advanced and Next-Generation Materials, Computational Tools, Experimental Tools, Digital Data, Substitutes for Critical Minerals by Progressive Management
Cover of the book 21st Century Guide to Hydrokinetic, Tidal, Ocean Wave Energy Technologies: Concepts, Designs, Environmental Impact by Progressive Management
Cover of the book 21st Century FEMA Study Course: Introduction to Individual Assistance (IS-403) - Presidential Declaration Process, CFR, Mass Care, SBA, IHP, DUA, Business Disaster Loans, Habitability Assistance by Progressive Management
Cover of the book 21st Century FEMA Study Course: National Incident Management System (Incident Command System) Emergency Responder Field Operations Guide by Progressive Management
Cover of the book U.S. Marines History: Marine Advisors with the Vietnamese Provincial Reconnaissance Units, 1966-1970 - Phoenix Program, Counterinsurgency, PRU, Advisors Tell Their Stories by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Langerhans Cell Histiocytosis (LCH), Eosinophilic Granuloma, Abt-Letterer-Siwe Disease, Hand-Schuller-Christian Disease, Diffuse Reticuloendotheliosis by Progressive Management
Cover of the book Fermilab Radiological Control Program Manual: ALARA, Radioactive Material Control, Waste Management, Dosimetry, Monitoring, Exposure, Health Support, Surveys, Accelerators by Progressive Management
Cover of the book The U.S. Navy and the Cuban Missile Crisis: Questions about Kennedy and Schlesinger Accounts, Intelligence from Communications Intercepts Before Spy Photographs, Naval Operations, Navy ASW Operations by Progressive Management
Cover of the book Would the U.S. Benefit from a Unified National Strategy to Combat Violent Salafi Jihadism (VSJ)? Foundational Understanding of Islam, Sunni and Shia, Terrorism Insufficient to Describe Threat by Progressive Management
Cover of the book Technology and the Air Force: A Retrospective Assessment - Schriever, von Karman, Turbojet, Supersonic, Air Refueling, Smart Weapons, Cruise Missile, F-16, Agena, GPS, AWACS, JSTARS, CFD, Stealth by Progressive Management
Cover of the book The U.S. Counterterrorism Strategy: Addressing Radical Ideologies - Study Focusing on Al-Qaeda and ISIS Islamism and Violent Extremism, Evaluation of Preemptive and Preventive Approaches by Progressive Management
Cover of the book NASA International Space Station (ISS) Human Spaceflight Program: Commercial Resupply Services Contracts for Cargo including SpaceX Dragon, Orbital ATK, and Sierra Nevada Dream Chaser Spacecraft by Progressive Management
Cover of the book Military Testing Facilities and Equipment - Army Natick Soldier RD and E Center (NSRDEC): Human Systems, Clothing, Engineering, Polymer, Mechanical Testing and Analysis, Applied Science, Food by Progressive Management
Cover of the book To Join or Not to Join the Nuclear Club: How Nations Think about Nuclear Weapons: Two Middle East Case Studies - Libya and Pakistan by Progressive Management
Cover of the book Countering Naval Guerrilla Warfare: Are Convoys Obsolete? Theory, History, Analysis, Implications, Mahan, Corbett, Command of the Seas, Commerce Raiding, Oliver Hazard Perry Class Frigate by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy