What is information counteraction? And ensuring information security. What is information warfare

VKontakte Facebook Odnoklassniki

In August 2008, a dirty attack was launched against Russia information war

The time that has passed since the Five-Day August War in the Caucasus in 2008 has shown that so far all attempts by Russian statists to draw appropriate organizational and managerial conclusions after the anti-Russian information aggression are blocked by the ideologists of Liberal Colonialism, who have their supporters within the political elite of Russia.

In August 2008, a dirty information war was launched against Russia (primarily by the American and British media). In December 2011 - May 2012, a lot reminded me of August 2008. Although the information impact was more subtle, using the real mistakes of the current Russian government, its unpreparedness for active information warfare.

The main problem is the obvious “slipping” of organizational and management decisions in the information sphere after the adoption of the Doctrine in 2000 information security Russia, in the context of intensifying information war against Russia. Federal elections in Russia took place in the context of an intensified anti-Russian information war. The tragic events of July 2012 in Kuban also revealed problems in the field of information countering rumors and disinformation. Therefore, the most important task is the speedy adoption of the Doctrine of Information Warfare of Russia.

The main goals of the information war against Russia

1.Blocking the processes of creating the Eurasian Union, through the global operation “Anti-Putin” and repeating the scenario of the coup d’etat of February 1917, with elements of Gorbachev’s perestroika and the collapse of the USSR.

2. Opposition to the rapprochement between Russia and the EU, Russia and the BRICS countries.

3.Organization of war (with the help of provocations) in the Near and Middle East (NATO military aggression against Syria and Iran), to use the destabilization of the region against Russia.

The “Anti-Putin” information operation, developed by London, largely repeats the operations that the British Empire carried out against its main enemies in Europe - the leaders of France and Germany (Richelieu, Bismarck, De Gaulle). The USSR was also collapsed as a result of the information war, the active phase of which began with Operation Anti-Stalin. The developers of the Anti-Putin operation are MI6 and the British Lobby in the USA (long-term MI6 agent Zbigniew Brzezinski, Secretary of State Hillary Clinton, Obama's assistant David Axelrod - the great-grandson of Trotsky-Bronstein). Coordinators in Russia: US Ambassador to Russia M. McFaul and former USSR President M. Gorbachev.

Main scenarios:

Pairs A. Navalny - M. Gaidar, Yashin-Sobchak (V. Yushchenko - Y. Timoshenko) - “orange” Ukrainian scenario
- Georgian scenario for bringing M. Saakashvili to power: long-term partnership J. Soros - B. Akunin (G. Chkhartishvili)
- Provocation Scenario
- Information game to get ahead of power (Use of rumors in emergency and crisis situations)
- The Libyan-Syrian scenario is large-scale and complex disinformation on social networks and the world media.

It should be noted that during Operation Anti-Putin, the same technologies of lies and disinformation are mainly used as during Operation Anti-Stalin. The only difference is that today there are more modern means mass communications (Internet, global television, social networks), which are mainly controlled by British intelligence MI6 and business structures of various countries with a legal address in British offshore zones. On March 4, a group of patriotic statesmen around V. Putin managed to block the coup d'etat scenario leading to the Chaos of February 1917. However, there are new information battles ahead with the London center of information warfare against Russia.

Theory of Information Confrontation

Information warfare (confrontation) - a form of struggle between the parties, which is the use of special (political, economic, diplomatic, military and other) methods, methods and means to influence the information environment of the opposing party and protect their own in the interests of achieving their goals.

The main areas of information and psychological warfare:
- Political,
- diplomatic,
- financial and economic,
- military.

Two types of information warfare should be distinguished: information-technical and information-psychological.

At information and technical struggle with the main objects of influence and protection are information technology systems (communication systems, telecommunication systems, radio-electronic equipment, etc.).

At information and psychological warfare, the main objects of influence and protection are the psyche of the political elite and the population of the opposing sides; systems for the formation of public consciousness, opinion and decision-making.

Information warfare (in the political sphere) includes three components.

The first is Strategic Policy Analysis.

The second is Information Impact.

Third - Information counteraction.

Levels of information warfare:

*strategic,
*operational,
*tactical.

Model Russian system information warfare

The creation of an INFORMATION CONTROL system should become the main Priority of the Russian Information Warfare policy.

The Russian Federation must have a powerful potential of information forces and means capable of guaranteeing the infliction of specified information-technological and information-psychological damage to any aggressor state or coalition information resources global transnational corporations.

Protecting the national interests of the state involves comprehensive counteraction to information threats on a regional and local scale. Armed Forces and intelligence services Russian Federation peacetime combat personnel must be able to provide reliable protection countries from an information attack in peacetime, within the framework of the creation of the Global Information Command (GIC), which has special Rapid Information Response forces. The forces and means of the GLONASS space sensing system should prioritize the activities of Rapid Information Response units.

The interests of ensuring Russia's Information Sovereignty predetermine the need to increase Russia's information presence in all strategically important regions of the world.

Accommodation abroad GIC information and analytical centers should demonstrate the readiness of the Russian Federation to promote the formation of a stable information strategic balance of power in regions of vital interests of Russia. It is necessary to ensure the ability to effectively and promptly respond with information to any crisis situation at the initial stage of its inception, increasing the information flows of Russian state media as necessary.

Special Russian information bases GICs can be created in Cuba, Vietnam and Mongolia, Venezuela, Serbia, Belarus, Syria, South Africa, Argentina.

The most powerful group of information forces and means of the State Intelligence Committee can be located in Cuba.

Russia should consider the possibility of using information power to ensure its national security, based on the following principles:

Russia reserves the right to use all forces and means at its disposal if, as a result of unleashing information aggression, a threat arises to the very existence of the Russian Federation as an independent sovereign state;

the use of the Strategic Information Deterrence Force of the Russian Federation must be carried out decisively and systematically, consistently and systematically;

the use of information power must be carried out on a legal basis and only when diplomatic measures to resolve a crisis situation have been exhausted or have proven ineffective.

In defining and implementing the policy of information deterrence, a key role belongs to the System of Special Information Warfare Structures.

Key system components:

1. State Council for Information Warfare.
2. Advisor to the President of Russia on information warfare issues.
3. State Internet holding.
4.The Information Security Committee of Russia (Information Security Service, Information Counterintelligence Service, Situational Analysis and Forecast Center, Information Special Forces Bureau).

It also seems appropriate create special system Mer on organizing and conducting information warfare, as well as coordinating the implementation in practice by the authorities government controlled defensive and offensive information operations.

What could be the main functions of such a system?

First of all, I think, identifying and predicting threats in the information sphere carrying out the complex tactical, operational and strategic activities for their prevention and neutralization.

The next point is the creation and maintenance of forces and means in readiness information counteraction, as well as their effective management.

The system of information countermeasures against Russia can and should function at four levels: federal, professional, group and individual.

In order to combine the entire range of activities into a single whole, it is necessary to integrate them within the framework of the organizational and analytical system (OAS). It is a system for managing events at various levels: federal, professional, group and individual.

Algorithm for organizing information warfare

Stage I - Diagnostic.
Stage P - Analytical and planning.
Sh. Preparatory stage.
IU. Organizational and managerial stage.
U. Evaluation stage.

Strategic Operations

1st operation - GOLD OF RUSSIA.

It is necessary to LEGALLY demand from a number of Western countries (primarily the USA and Great Britain, Japan, France) to return to Russia the gold of the Russian Empire (according to expert estimates, more than THREE THOUSAND tons of gold).

In this regard, LEGAL INQUIRIES should be sent to the UN and OSCE, as well as to the governments of the USA and Great Britain, Japan, France.

2nd operation - BARRIER OF CORRUPTION.

It is necessary to offer the world community a global joint program to combat Russian corruption. With the support of the UN, Russia can begin negotiations with the British government on the return of illegally exported capital to Russia, since 90% of these funds are located in British offshore zones (according to expert estimates, about $700 billion).

Thus, Russia can quickly receive HUNDREDS OF BILLIONS of dollars to overcome the Second Wave of the global crisis.

Spiritual and moral operations:

1. Public Tribunal over M. Gorbachev for the collapse of the USSR.
2. Public Tribunal over N. Khrushchev for the execution of civilians in the capital of the Don Cossacks, Novocherkassk in 1962.

Of course, the model provided by the author is not complete and complete. It can only serve as the basis for a broad discussion among scientists and practitioners, representatives of the Russian political elite, and a starting point for the development of the Doctrine of Information Warfare in Russia.

Definitions

Information confrontation- rivalry between social systems in the information and psychological sphere regarding influence on certain areas of social relations and establishing control over sources of strategic resources, as a result of which some participants in the rivalry receive the advantages they need for further development, while others lose them.

Under information warfare refers to the struggle in the information sphere, which involves a complex destructive impact on the information, information systems and information infrastructure of the opposing side while simultaneously protecting one’s own information, information systems and information infrastructure from such influence. The ultimate goal of information warfare is to gain and maintain information superiority over the opposing side.

Objects and subjects of information warfare

The object of information warfare is any object in relation to which it is possible to carry out information influence (including the use of information weapons) or other influence (force, political, economic, etc.), the result of which will be a modification of its properties as information system. The object of information warfare can be any component or segment of the information-psychological space, including the following types: mass and individual consciousness of citizens; socio-political systems and processes; information infrastructure; information and psychological resources.

The subjects of information warfare include: states, their alliances and coalitions; international organizations; non-state illegal (including illegal international) armed groups and organizations of a terrorist, extremist, radical political, radical religious orientation; transnational corporations; virtual social communities; media corporations (controlling the media and mass communications - media and MK); virtual coalitions.

Notes

see also

Links

  • Manoilo A.V. Objects and subjects of information warfare. 2003.
  • Styugin M. Security assessment of the information management system of the Russian Federation. 2006.
  • Fedorov A.V. Transformations of the image of Russia on the Western screen: from the era of ideological confrontation (1946-1991) to the modern stage (1992-2010). M.: Publishing house MOO "Information for everyone", 2010. 202 p.

Wikimedia Foundation.

2010.

    See what “Information warfare” is in other dictionaries: 1) a form of interstate confrontation, involving the targeted use of specially developed means to influence the information resource of the opposing side and protect one’s own resources in the interests of achieving... ...

    Dictionary of emergency situations- – a type of social counteraction, informational influence on an opponent (enemy) in order to distort his perception and understanding of the current situation, forcing him to make erroneous decisions. In addition to informational, confrontation may... Encyclopedic Dictionary of Psychology and Pedagogy

    - ... Wikipedia

    Gorbenko, Alexander- Deputy Mayor of Moscow for Media, Interregional Cooperation, Sports and Tourism Deputy Mayor of Moscow for Media, Interregional Cooperation, Sports and Tourism since September 2010. In 2001... ... Encyclopedia of Newsmakers

    Project: Personnel... Wikipedia

    IP- “Ivanovo Press” newspaper of the city of Ivanovo, publication of IP test press IP engineering pedagogy department of education and science Source: http://www.krgtu.ru/structure/?idi=16&page … Dictionary of abbreviations and abbreviations

    - (cf. > “manipulation of public opinion”) one of the ways to control people by creating illusions or conditions for controlling behavior. This influence is aimed at the mental structures of a person, is carried out secretly and puts ... ... Wikipedia

    The request "Consciousness manipulation" redirects here. See also other meanings. Manipulation of consciousness, as defined by the author of this concept S. G. Kara Murza, actions performed by an intelligent object or a group of them, to create the desired for... ... Wikipedia

    The request "Consciousness manipulation" redirects here. See also other meanings. Manipulation of consciousness, as defined by the author of this concept S. G. Kara Murza, actions performed by an intelligent object or a group of them, to create the desired for... ... Wikipedia

Books

  • Information warfare in models and tasks. 15, S.P. Rastorguev, Due to the novelty of this scientific direction and, as a consequence, the lack of practitioners and relevant training courses, the problem of training specialists to work in the field of management... Category: Miscellaneous Series: School program Publisher:

In our opinion, we should distinguish between information confrontation (struggle) in the broad (in all spheres) and narrow sense of the word (in any sphere, for example in the political sphere).

Information warfare (struggle) – a form of struggle between the parties, which is the use of special (political, economic, diplomatic, military and other) methods, methods and means to influence the information environment of the opposing party and protect their own in the interests of achieving their goals.

The main areas of information warfare:

Political,

Diplomatic,

Financial and economic,

Innovative

Military.

Geopolitical information warfare (GIC)- one of the modern forms of struggle between states, as well as a system of measures carried out by one state with the aim of violating the information security of another state, while simultaneously protecting against similar actions by the opposing state.

Geopolitical strategic policy analysis

GOALS:

1. Analysis and forecast of the development of the situation in all the most important areas of your state and geopolitical competitor - political, diplomatic, financial-economic, military.

2. Preparation of possible options and calculation of the consequences of control information influences.


Geopolitical forecasting– the process of developing a scientifically based judgment about possible option the development of political events in the future, alternative ways and timing of its implementation, as well as the identification of specific recommendations for practical activities in the conditions of present reality.

Basic principles of geopolitical forecasting

consistency

consistency

continuity

verifiability

alternativeness

profitability

Main tasks of geopolitical forecasting

Avoid undesirable developments

Adapt to the inevitable

Accelerate the likely development of a specific event in the desired direction

Basic methods of geopolitical forecasting

Based on information justification

Factual

Expert

Combined

Based on the principle of information processing

1. Statistical (Extrapolation, Interpolation, Factor analysis, Correlation analysis).

2. Leading.

3. Analogies (mathematical analogies, historical analogies).

4. Direct expert assessments (expert survey, expert analysis).

5. Expert assessments with feedback.

What is the basis geopolitical forecasting?

In our opinion, the correct approach is the need for a scenario analysis of the world based on strategic analysis.

Stages of the GUI Management Process

1. Forecasting and planning.

2. Organization and stimulation.

3. Feedback.

4. Regulation.

5. Execution control.

Stages of developing a solution during the GIP

1. Assessing the situation:

Determination of the composition of indicators and criteria,

Assessing the reliability of the received data,

Analysis of the state of the control object,

Analysis of the state of the subject of management,

Deviation analysis.

2. Goal setting.

3. Determining the intent of the solution.

4. Formation of solution options (there must be at least THREE).


The purpose of geopolitical information confrontation is chaos in the decision-making and management systems of the opposing state, manipulation of public opinion (global, regional, national), as well as ensuring Russia’s information security to ensure effective functioning in the global information space.

Two types of information warfare (fight) should be distinguished: information-technical and information-psychological.

At information and technical confrontation with the main objects of influence and protection are information technology systems (communication systems, telecommunication systems, data transmission systems, radio electronics, information security systems, etc.).

At information-psychological confrontation, the main objects of influence and protection are the psyche of the political elite and the population of the opposing sides; systems for the formation of public consciousness and opinion, decision making.

Information confrontation (in the political sphere) includes three components.

The first is strategic policy analysis.

The second is information impact.

The third is information counteraction.


Strategic political analysis is a set of measures to obtain information about the enemy (competitor) and the conditions of information warfare; collecting information about your allies; processing information and exchanging it between members of their political community for the purpose of organizing and conducting actions.

Information must be current, reliable and complete.

The second component of information warfare is information impact. It also includes measures to block the extraction, processing and exchange of information, and the introduction of disinformation.

The third part consists of information countermeasures (protection), including actions to release information necessary to solve problems of managing political processes, and blocking disinformation disseminated and introduced into the system of formation of world and Russian public opinion by competitors (opponents).

Levels of information warfare:

strategic,

operational,

tactical.


Basically, the highest bodies of state power in Russia should act at the strategic level of informational geopolitical confrontation, and the special services and large national capital should act on operational and tactical levels.

The leading countries of the world currently have powerful information potential (primarily the USA, China, Great Britain), which can ensure they achieve global political and economic goals, especially since there are no international legal norms for waging information warfare. In addition, at the end of the 20th century, transnational corporations became active players in the field of information warfare.

It is also necessary to determine the content of the concept “impact”.

Influence is an action directed at someone in order to achieve something, to inspire something.

In psychology, influence is understood as the purposeful transfer of movement and information from one participant in an interaction to another. The impact can be direct (contact) and indirect (remote, with the help of something).

There are certain characteristics of the functioning of information in society: the scope of circulation, the time of circulation, the direction of movement, the emotional coloring of information, the method of production, the purpose of production.

It is influence that is the purpose of information production.

If we talk about social objects, then these include individuals, social groups, society, the state, and the world community. The main social elements of society are social groups and individuals.

To protect against negative impacts social objects during the global geopolitical information confrontation, it is necessary to create a system of information and psychological support as an integral part of Russia’s national security. This system must provide mental protection political elite and population of Russia from negative information and psychological influence (i.e. protection MATRIXES OF CONSCIOUSNESS of Russians from negative information flows geopolitical and geo-economic opponents of Russia).

Its main task is to ensure the psychological safety of the political elite and the population of Russia.

Information-psychological influence is the purposeful production and dissemination of special information that has a direct impact (positive or negative) on the functioning and development of the information-psychological environment of society, the psyche and behavior of the political elite and the population of Russia.

Psychological and propaganda influence are a type of information and psychological influence.

In connection with the emergence and accelerated development of the media, the role of public opinion has sharply increased, which began to have a colossal influence on political processes in society, the peculiarities of the functioning of the information and psychological environment of society. Therefore, the system of forming public opinion is also one of the main objects of information and psychological support. Consequently, it is necessary to study the peculiarities of the formation and functioning of public opinion during armed conflicts, on the basis of which practical ways to ensure the psychological safety of the political elite and the population of Russia should be developed.

Information weapon– these are devices and means intended to inflict maximum damage on the opposing side during information warfare (through dangerous information influences).

Objects of influence may be:

1. Information technology systems.

2. Information and analytical systems.

3. Information and technical systems that include humans.

4. Information and analytical systems that include humans.

5. Information resources.

6. Systems for the formation of public consciousness and opinion based on the media and propaganda.

7. Human psyche.

The author believes that in cases where information weapons directly or indirectly used against the human psyche (or social group), then we should talk about information-psychological confrontation. In practice, only three objects of influence can be named, each of which relates to a certain type of information warfare (in its pure form). These are information-technical and information-analytical systems (not including humans) - information-technical confrontation. The human psyche is an information-psychological confrontation.

Sources of information dangers can be natural (objective) and intentional.

When considering the theory of information warfare in the political sphere, it should be taken into account that it occurs at the strategic, operational and tactical levels.

Basically, the highest political elite should act at the strategic level, and information units various government agencies - at the operational and tactical levels.

As part of the implementation of the system of measures to counter terrorism in the Russian Federation, the issues of information counteraction to terrorist activities of the MTO and the armed underground are of particular relevance.

Depending on the objects of influence, the following main methods of information influence of terrorist structures can be distinguished:

1. The use of destructive psychological technologies in the process of personal contact with a potential candidate to influence his consciousness and form the necessary attitudes in him.

2. Conducting campaigning among believers, especially among young people who are beginning to master the basics of religion, in places of worship and the selection by recruiters of potential candidates for individual processing.

3. Conducting open campaigning activities in educational institutions, sports sections and clubs.

4. Conducting campaigning activities in places of deprivation of liberty by persons who have undergone combat and sabotage training in MTO camps and participants in armed conflicts in order to consolidate those convicted in the so-called. "prison" jamaats.

5. Propaganda in global information networks and use social networks And mobile applications to select and study suitable candidates for involvement in terrorist activities.

Involvement in terrorist activities is carried out in stages and is complex in nature.

At the first stage, an initial study and verification of the candidate’s reliability takes place.

At the second stage, a recruitment conversation is carried out and contacts with the environment are limited. A dependence on like-minded “brothers” and an obligation to the “jamaat” is created. All this contributes to the formation of a distorted (simplified) image of reality. At the same time, he is being trained in terrorist skills and the rules of conspiracy.

At the third stage, the candidate is secured and readiness to commit a crime of a terrorist nature is formed.

MTO specialists use targeted methods of influencing target audiences. Thus, when working with men, the main emphasis of recruiters is on the glorification of “jihad” warriors, their military successes, the need to restore justice and protect the “true” followers of Islam from oppression. The indoctrination of girls often takes advantage of their desire to have a family and children. Girls are attracted to idealized images of true Muslim spouses. Mujahideen husbands, unlike Russian ones, will not drink, smoke (which is prohibited by Sharia), or cheat (since they have the right to have legal harems). Sharia law has secured for Muslim women the right to divorce, a mandatory share of the spouses' property, the ability to keep their maiden name during marriage, etc.).

The secrecy of terrorist cells, limited contacts and the constant threat of criminal prosecution strengthen the cohesion and influence of the leader (“amir”) on other members, contribute to the erosion of responsibility for illegal acts and underestimation of their consequences.

It should be noted that MTO propaganda on the Internet is becoming more widespread.

Appeals from bandit leaders to “brothers in faith” are regularly posted on the Internet, calls for armed jihad and threats of terrorist attacks against government officials are made. An analysis of the content of popular video hosting sites indicates that a significant amount of material about the ideology and terrorist practices of the TFR gangs is freely available.

The Internet resources of the TFR bandit underground are distinguished by their attractive graphic design, speed of updating, well-thought-out interface, and priority focus on youth. The peculiarities of their technical organization are: registration of domains under dummies, placement on the servers of foreign providers, the presence of “mirrors” - web resources with a partially changed noun phrase.

a) videos with scenes of militants committing crimes (terrorist attacks, murders of law enforcement officers, etc.);

b) appeals from members of gangs (threats to government officials, law enforcement officers, bayats to “amirs”, etc.);

c) disinformation materials (about the socio-political situation, public and government figures, etc.).

Based on the direction of extremist propaganda, the following forms of “information jihad” using the Internet can be distinguished:

Placing multimedia materials criticizing the Russian leadership, the authorities of the TFR, the formation of intolerance towards Russia (“kafir Rusna”), propaganda for building a state with a Sharia form of government;

Dissemination of photos and video images of active and neutralized members of bandit groups and the results of “shahid operations”; “glorification of jihad leaders”;

Individual propaganda processing of users by distributing selective canceled verses, allegedly calling for the commission of crimes, fatwas on issues of jihad and issuance of takfir, as well as the use of verses about polytheists and infidels against Muslims;

Newsletter emails target audience calling for the correction of aqida, “pure” Islam, jihad against kufr and shirk, as well as sending terrorist threats against government officials, law enforcement officers, representatives of the media and official Islam;

Development and distribution of network computer games, promoting the ideology of armed jihad.

It should be noted that instead of countering the terrorist ideology of the gang underground, based on the prevention and suppression of the destructive information and propaganda influence, the authorities and management for a long time were mainly engaged in passive anti-terrorist propaganda and the fight against extremist and terrorist sites by blocking network addresses in the “ru” and “rf” zones.

At the same time, full-fledged information counter-terrorism (hereinafter referred to as ICT) requires new approaches to understanding the essence and content of this type of activity, which cover:

Exposing the antisocial nature of basic ideas, views and terrorist doctrines;

Undermining the population's trust in the ideological postulates of terrorism and forming a negative attitude towards terrorist structures;

Formation in society of a sustainable anti-terrorism consciousness and public support for the state’s anti-terrorism policy.

The current needs of IPT involve a shift in emphasis from passive counter-argumentation and propaganda to active offensive information counteraction to specific terrorist threats and actions.

At the present stage, IPT can be represented as a complex of offensive operational search, information and propaganda, legal, organizational and other measures aimed at identifying, preventing and neutralizing the negative information and psychological impact of terrorist structures on public relations, as well as countering the use of information and communication technologies for terrorist purposes. Practical activities in this area is carried out within the framework of the implementation of the Comprehensive Plan for Countering the Ideology of Terrorism in the Russian Federation for 2013–2018.

IPT is primarily the responsibility of law enforcement agencies and intelligence agencies.

The main tasks of information counter-terrorism include:

monitoring and analysis of operationally significant information about the aspirations of terrorist structures, their resource base and tactics of action in the information space aimed at inciting terrorism;

organization and implementation of active measures to neutralize identified terrorist threats in the information sphere;

identification, search and prosecution of persons involved in the creation and filling information space terrorist content;

using the potential of government authorities, local self-government, public and political structures, educational, scientific and business communities, religious denominations, the media and other civil society institutions in order to study and expose terrorist ideology, and develop a sustainable anti-terrorist consciousness among the population.

An important role in solving the tasks of law enforcement agencies through IPT is played by operational search and information and propaganda activities, which make it possible to reduce the activity of terrorist and extremist organizations and minimize the risk of using religious and national factors to destabilize the socio-political situation in the country.

Operational investigative activities in the field of IPT cover:

monitoring of terrorist and extremist Internet resources;

prompt verification of the activities of organizations that have signs of organizational connections with terrorist structures;

creation of controlled Internet resources from legendary positions;

implementation of targeted measures to compromise the activities of INNOs and MOs, destructive NGOs, organizers, ideologists and active executors of actions to spread the ideology of terrorism.

In contrast to operational-search activities, information and propaganda activities are aimed at preventing the formation of a resource base of terrorist organizations and the formation of an anti-terrorist ideology among the population. To this end, law enforcement agencies:

distribute anti-terrorism materials in print media, on television, and on Internet resources;

take measures to prevent the resumption of the functioning of radical information resources blocked by the Federal Service for Supervision of Communications, information technologies and mass communications

conduct information campaigns aimed at reducing the base of accomplices, based on legalized materials of criminal cases on crimes of a terrorist and extremist nature;

organize preventive lectures and round tables, provide assistance in creating and filling anti-terrorist portals of educational institutions with content;

carry out counter-propaganda activities in religious organizations, educational institutions, and during public events.

As already noted, the current needs of IPT must be adequate to threats in the information sphere and take into account public demands.

Countering the propaganda of the Islamic State Organization in Russia should not be in the nature of theological disputes and revealing contradictions between the terror of the “caliphate” and the norms of the Holy Quran.

There is no need to expose the inhuman and sadistic nature of IS militants, since violence is positioned by IS ideologists as a requirement of faith and an inevitable means of ensuring order in the state. For terrorists and their target audience, violence becomes religiously justified and legal.

In the course of preventive work, emphasis should be placed on the economic essence of the “Caliphate” project, the commercialism and criminal connections of the leaders of “IS,” and their willingness to sacrifice the lives of tens of thousands of supporters.

The system of activities of law enforcement agencies in the field of IPT should be universal in nature and complemented by the concerted efforts of all interested structures of the public sector. The tasks of the IPT cannot be solved only with the help of special services and law enforcement forces. Comprehensive protection of the information space of the Russian Federation from terrorist ideas should be built on the basis efficient work Media, youth and educational policy in the conditions of coordinated work of all government bodies and civil society institutions.

2.2. Counterpropaganda as a psychological means of strengthening and neutralizing the information and propaganda impact

Counterpropaganda and propaganda are also closely related to each other as intelligence and counterintelligence. They can act as two independent means and as a single means of the political communication system. In the latter case, counter-propaganda is an integral element of propaganda that protects propaganda from possible counter-arguments of the enemy (opponent) and enhances its psychological impact on mass consciousness. As an example, let us cite the leaflet “Romanians of the Hungarian Army,” distributed by Soviet special propagandists in 1942 among Hungarian army soldiers of Romanian origin. Here is its text:

“We, two Transylvanian Romanians, were captured by the Russians. We asked ourselves the question: “What bad did the Russians do to us?” And they answered: “Nothing.” It was Hitler and Antonescu who did us bad by giving Northern Transylvania into the hands of the Hungarians. We are treated well at the camp. It’s better to fight against the Hungarians than against the Russians. Surrender and return alive to your families!”.

Elements of counter-propaganda designed to enhance the psychological impact and neutralize the enemy’s possible counter-arguments about the hellish torments of being in Soviet captivity are two phrases: “We, two Transylvanian Romanians, were captured by the Russians” and “We are treated well in the camp.” Strength leaflet is that it is compiled as evidence (we discussed this technique of specific suggestion in section 2.1.) of two eyewitnesses about good conditions being in Soviet captivity. And it is always difficult to refute the story of eyewitnesses. A more powerful type of counter-propaganda in the propaganda impact on the enemy is the return release of prisoners to their own military units and their personal testimonies about good conditions while in captivity. This technique was often used by Soviet special propagandists during World War II.

Conventionally, counter-propaganda can be divided into offensive and defensive. Offensive counter-propaganda, from the point of view of the author of this work, includes: negative advertising, black PR, the use of rumors, anecdotes, epigrams, nicknames, nicknames, pseudonyms.

Offensive counter-propaganda is built on the principle of asymmetry and uses unpredictable and, at first glance, absurd actions against opponents. The main goal of offensive counter-propaganda is to strike the enemy on his own territory. Let's consider the main techniques of offensive counter-propaganda used in psychological warfare and election technologies:

"Trap". It consists of luring the enemy (opponent) to that information field, where he will then be struck. Following, the enemy does not realize that he has entered a “mined field.” This technique was successfully used by the “telekiller” S. Dorenko against Yu. M. Luzhkov and E. M. Primakov, the leaders of the “Fatherland - All Russia” bloc.

Political propaganda, being an integral part of the system of political communication, is a specific information process, aimed at the emotional-volitional sphere of mass consciousness. The effectiveness of the psychological impact of propaganda is determined not so much by the diversity and perfection of its forms and technologies, but by the psychological characteristics of mass consciousness, among which we can highlight:

* Blocking another point of view;

* Emotionality;

* Black and white picture of the world;

* Active search enemies;

* Suggestibility;

* Stereotyping and figurative thinking.

By its nature, political propaganda is totalitarian, because, like mass consciousness, it does not accept a different point of view. Alternative information to propaganda is refuted, and its source different ways discredited through counter-propaganda.


3.
4.

© Compiled by: M.V. Kiselev, 2004