Information Environment Awareness Quiz
40 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What action should you take if you detect or suspect disinformation?

Ignore it

Social media algorithms are designed to prioritize content the audience will engage with via shares, reactions, and links, because that's how they earn advertising revenue.

True

Russians have decided that an asymmetric conflict can be waged against the US and Western nations by __________.

degrading each country's social cohesion

What is the most effective strategy for resisting persuasion?

<p>Airmen must be able to recognize the influence of effort or attempt.</p> Signup and view all the answers

Why are social-media-generated facts increasingly the information weapons of choice?

<p>All of these</p> Signup and view all the answers

What has created a complex and volatile global security environment?

<p>Increased strategic competition and international disorder</p> Signup and view all the answers

What countries have used social media to conduct disinformation and propaganda offensives targeting individual Airmen?

<p>Russia and China</p> Signup and view all the answers

The aim of cognitive warfare is the same as other warfighting domains.

<p>True</p> Signup and view all the answers

What three dimensions comprise the Information Environment?

<p>Physical, Informational, and Cognitive</p> Signup and view all the answers

When is the most conclusive time to assess the final truth of an event?

<p>In-depth coverage ranging from scholarly analysis to popular books; quality/accuracy in books varies widely. Authors include government leads or panels, organizations, and committees. Assessments include reference books that provide factual information, overviews, and summaries.</p> Signup and view all the answers

What is the main difference between disinformation and misinformation?

<p>The intent of the information</p> Signup and view all the answers

Who relies on Facebook, Twitter, Instagram, and other social networks to stay connected with families, friends, and current events?

<p>Military community</p> Signup and view all the answers

How does the integrated deterrence concept affect the United States?

<p>Information operations against the United States may cause the United States to turn inward focused on domestic matters.</p> Signup and view all the answers

Are fake Twitter bots an organized influence operation controlled by Artificial Intelligence (AI)?

<p>True</p> Signup and view all the answers

Why are influence operations efficient and effective?

<p>The Internet and social media have resulted in a qualitatively new landscape of influence operations, persuasion, and, more generally, mass manipulation.</p> Signup and view all the answers

A deepfake video can manipulate the video to make a person appear to say things completely out of context.

<p>True</p> Signup and view all the answers

What is the most important reason an individual Airman should be vigilant with information hosted on social media?

<p>May dissuade Airmen from reenlisting, degrade morale compromising mission effectiveness, or operations.</p> Signup and view all the answers

What must an Airman do to protect vital information and influence to increase or preserve combat power effectiveness?

<p>Take defensive and offensive actions, within the information environment (and influence to increase or preserve combat power effectiveness and determine what is real).</p> Signup and view all the answers

When using the SMART model and analyzing information based on the Two-Source Test phase, what should you be aware of?

<p>Question and challenge your own confirmation bias</p> Signup and view all the answers

What model can be used to separate truth from fiction?

<p>Sources, Motives, Authority, Review, Two-source test (SMART)</p> Signup and view all the answers

Why is disinformation exceptionally dangerous?

<p>Targeted disinformation could be used to create confirmation bias that an adversary could exploit to achieve their objectives. If servicemembers believe an attack is imminent, perhaps because of false reports or social media posts showing confrontational statements from leaders or fabricated reports of capabilities, threats, attacks, and hostilities, even an innocuous encounter may be seen as demonstrating hostile intent and provoking an armed response.</p> Signup and view all the answers

What is one example of a Diplomatic Informational Military and Economic (DIME) being used as a national power for creating and exploiting the information advantage?

<p>Using information to shape and control state activities.</p> Signup and view all the answers

Real news reporting spreads faster on the Internet than false news reporting.

<p>False</p> Signup and view all the answers

What does cognitive warfare attempt to accomplish?

<p>Alter people's perceptions, which forms the foundation for their actions.</p> Signup and view all the answers

Which headline example of disinformation could cause individuals to doubt orders or policy, and dwell on the consequences of action?

<p>New Russian capability disables US Navy ships</p> Signup and view all the answers

What is an active threat example of deepfake campaigns using Artificial Intelligence (AI)?

<p>Internet bots</p> Signup and view all the answers

How can Airmen begin to pick apart an influence attempt?

<p>Recognize, apply, and improve your ability to detect falsehoods.</p> Signup and view all the answers

What is the importance of information warfare within military activities?

<p>Competition between the United States and other countries to control, degrade, manipulate, and corrupt the information environment.</p> Signup and view all the answers

Who are most importantly, actively gaining influence and control at a regional and global scale?

<p>Russia and China</p> Signup and view all the answers

What is a technique to protect from trolls, bots, and other tools?

<p>Be aware of targeting you may be susceptible to and stop feeding the bot.</p> Signup and view all the answers

Are cheapfakes exceptionally dangerous and easy to spread?

<p>True</p> Signup and view all the answers

False stories of unjustified strikes against an adversary could create doubt about the reliability of sensors and weapons and cause hesitation.

<p>True</p> Signup and view all the answers

When using the SMART model and analyzing information based on the Review phase, which of the following should you ask?

<p>Is enough evidence presented to draw a logical conclusion?</p> Signup and view all the answers

Adversaries can determine how close Airmen are connected to others by __________.

<p>analyzing the volume, frequency, and pattern of Airmen's communications</p> Signup and view all the answers

What makes it cheap and easy to target Military and veterans for intelligence gathering and influence campaigns?

<p>Social media</p> Signup and view all the answers

Within the media information timeline, what information period depicts the least accurate account of the event?

<p>Day of event</p> Signup and view all the answers

When using the SMART model and analyzing information based on the Authority phase, which of the following is an example of credible credentials?

<p>A former military analyst providing situational awareness information</p> Signup and view all the answers

Which of the following influence availability bias?

<p>Information that is readily accessible and easily recalled</p> Signup and view all the answers

What is a more trustworthy web domain for accurate information?

<p>.edu</p> Signup and view all the answers

What are the three primary techniques Facebook, Google, and Twitter use to exploit Airmen and information about Airmen?

<p>Sociometric analysis, social engineering, advanced persistent threats (ATP)</p> Signup and view all the answers

Study Notes

Disinformation and Misinformation

  • Disinformation aims to degrade social cohesion in countries rather than directly defeating military forces.
  • Misinformation differs from disinformation primarily in intent.

Social Media and Information Warfare

  • Social media algorithms prioritize engaging content for advertising revenue.
  • Military communities rely on platforms like Facebook and Twitter for connection and current events.
  • Cognitive warfare seeks to alter perceptions to influence actions.

Threats in the Information Environment

  • Russia and China actively use social media for disinformation targeting Airmen.
  • Deepfake technologies can misrepresent individuals in videos, compromising trust.
  • Fake Twitter bots are employed as organized influence operations, often enhanced by AI.

Strategies for Awareness and Resistance

  • Recognizing and challenging personal confirmation biases is crucial for critical information analysis.
  • Airmen must employ defensive and offensive strategies to safeguard important information and maintain combat effectiveness.
  • Effective strategies for resisting persuasion include understanding the influence of various efforts.

Assessment of Information

  • The information environment comprises Physical, Informational, and Cognitive dimensions.
  • Comprehensive assessments, including scholarly analyses, provide clearer insights into events over time.
  • The SMART model (Sources, Motives, Authority, Review, Two-source test) assists in discerning truth from fiction.

Influence Operations Efficiency

  • Influence operations thrive on the qualitative changes brought about by the Internet and social media, leading to mass manipulation.
  • Targeted disinformation can exploit confirmation bias among service members, impacting morale and mission effectiveness.

Recognition of Information Validity

  • Credible information sources are typically associated with authoritative domains, such as .edu.
  • The day an event occurs usually presents the least accurate accounts in media reporting.

Techniques and Strategies Against Manipulation

  • To counteract trolling and bot-driven influence, individuals should be aware of their targeting susceptibilities.
  • Social media facilitates cheap and efficient access to military and veterans for intelligence gathering, making them prime targets.

Key Concepts in Information Warfare

  • The competition between nations for control and manipulation of the information environment is crucial in military contexts.
  • Adversaries utilize communication patterns to gauge connections among Airmen, impacting strategic responses.
  • Influence availability is shaped by the accessibility and memorability of information.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on the information environment and disinformation awareness in this engaging quiz. Explore key concepts related to social media algorithms, the impact of disinformation, and more. Perfect for anyone looking to enhance their understanding of information dynamics.

Use Quizgecko on...
Browser
Browser