Special Operations team in Pacific will confront Chinese information campaigns
Share to More
Officials described to Congress in recent weeks the various ways the military is seeking to thwart adversary influence and information operations. In this photo, the military dropped leaflets in 2013 over southern Afghanistan in support of operations to defeat insurgency influence in the area. (Sgt. Demetrius Munnerlyn/Marine Corps)
WASHINGTON — U.S. Special Operations Command created a task force in the Pacific region to work with allies there to thwart China’s information operations, the commander told lawmakers Thursday.
The Joint Task Force Indo-Pacific team will be focused on information and influence operations in the Pacific theater, a part of the world receiving much the military’s attention because of China’s growing capabilities.
The team is poised to work with like-minded partners in the region, Gen. Richard Clarke, commander of Special Operations Command, said before the Armed Services Committee. “We actually are able to tamp down some of the disinformation that they [China] continuously sow,” he said of the task force’s efforts.
The task force is an example of the fresh ideas the military is seeking to stifle damaging adversary influence and information operations. Officials are growing more concerned about these operations that sow chaos, doubt and confusion.
“Adversary use of disinformation, misinformation and propaganda poses one of today’s greatest challenges to the United States, not just to the Department of Defense,” Christopher Maier, acting assistant secretary of defense for Special Operations/Low-intensity Conflict, said earlier this month at a House Armed Services Subcommittee hearing.
Today’s information environment gives Russia, China and non-state actors real-time access to a global audience, Maier said. “With first-mover advantage and by flooding the information environment with deliberated and manipulated information that is mostly truthful with carefully crafted deceptive elements, these actors can gain leverage to threaten our interest.”
Broadly, Maier explained that DoD organizes its efforts to combat disinformation, misinformation and propaganda in four lines of effort: countering propaganda by adversaries, force protection, countering disinformation and strategic deception abroad by adversaries, and deterring and disrupting adversarial influence capabilities.
Given that the primary delivery mechanism for this information malice is taking place through cyberspace, U.S. Cyber Command has seen an increased role beyond just affecting the 1s and 0s that are the language of the domain. Cyber Command also carries out cyber-enabled information operations of its own.
Know all the coolest acronyms
Sign up for the C4ISRNET newsletter about future battlefield technologies.
(please select a country) United States United Kingdom Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo Congo, The Democratic Republic of The Cook Islands Costa Rica Cote D'ivoire Croatia Cuba Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Territories Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guinea Guinea-bissau Guyana Haiti Heard Island and Mcdonald Islands Holy See (Vatican City State) Honduras Hong Kong Hungary Iceland India Indonesia Iran, Islamic Republic of Iraq Ireland Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Kiribati Korea, Democratic People's Republic of Korea, Republic of Kuwait Kyrgyzstan Lao People's Democratic Republic Latvia Lebanon Lesotho Liberia Libyan Arab Jamahiriya Liechtenstein Lithuania Luxembourg Macao Macedonia, The Former Yugoslav Republic of Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia, Federated States of Moldova, Republic of Monaco Mongolia Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island Northern Mariana Islands Norway Oman Pakistan Palau Palestinian Territory, Occupied Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Reunion Romania Russian Federation Rwanda Saint Helena Saint Kitts and Nevis Saint Lucia Saint Pierre and Miquelon Saint Vincent and The Grenadines Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia and Montenegro Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Georgia and The South Sandwich Islands Spain Sri Lanka Sudan Suriname Svalbard and Jan Mayen Swaziland Sweden Switzerland Syrian Arab Republic Taiwan, Province of China Tajikistan Tanzania, United Republic of Thailand Timor-leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks and Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States United States Minor Outlying Islands Uruguay Uzbekistan Vanuatu Venezuela Viet Nam Virgin Islands, British Virgin Islands, U.S. Wallis and Futuna Western Sahara Yemen Zambia Zimbabwe
I'm not a robot
Thanks for signing up!
The command’s leader pointed to the DoD’s “defend forward” directive — which charges Cyber Command to get as close as possible to adversaries in networks outside the United States — as a critical aspect of combating foreign cyber and influence operations before they reach U.S. shores.
Gen. Paul Nakasone, Cyber Command’s head, explained to senators Thursday that the command conducted over a dozen operations to head off foreign influence threats prior to the 2020 elections.
“The idea of operating outside of the United States, being able to both enable our partners with information and act when authorized. This is an active approach to our adversaries,” he said. “It’s been most effective as we’ve seen with the 2018 and 2020 elections with adversaries attempting to influence us, attempting to interfere but not being able to do that.”
The forward defense concept isn’t just applicable to cyberspace. Clarke described Special Operations Forces, specifically Military Information Support Operations professionals, that are deployed forward and work closely with embassies around the world.
“By working closely with those partners to ensure that our adversaries, our competitors are not getting that free pass and to recognize what is truth from fiction and continue to highlight that to using our intel communities is critical,” he said.
1st Special Forces Command built an Information Warfare Center specifically designed to develop “influence artillery rounds” as a means of detecting adversary activity around the globe in and rapidly push that information to those that need it.
Ultimately, however, officials explained the military is just one instrument of national power to suppress these malicious activities.
“This is what the power of [Department of] Treasury brings to it, the Federal Bureau of Investigation, [Department of] Justice, Department of Homeland Security. This is the lesson that we’ve learned, is that we have to operate together because the partnership is where the power is,” Nakasone said.
While responding to information or influence operations is imperative, Nakasone said the response could diplomatic or financial, not just a military action.
“There’s a broader piece that is being worked right now by the administration in terms of: How do we improve the further resilience of the United States as we look at adversaries continuing to avoid our laws and policies and try to use our own infrastructure in their own attempts?” he added. “This is not going to be episodic. This is something that U.S. Cyber Command and the other combatant commands need to continue to work at.”