This page includes articles that have been VRIfied (verified by VRI) for facts, correct referencing in any selected style, and correct writing. As a result, the articles that are selected to be published can be used as reference material by scholars for their research purposes. You may submit your discussion posts, essays, poems, or general information written with correct referencing and free of plagiarism to registrar@virginiaresearchinstitute.org.

Once we receive your material, we will be passing them to our experts and after they confirm, sometimes after several changes, we will publish them on this page. As we receive articles, we will categorize them in a suitable order to make your search convenient.

Intelligence Studies:

September 28, 2014

Author: Miss Eugenie de Silva, B.A., M.A.


In the media, you will commonly hear individuals using the term, “propaganda,” without any actual, in-depth knowledge of the concept. Propaganda is more than what you hear about in the news or in movies. Accordingly, this was written to provide a brief description of how propaganda was used in the past.

Prior to any analysis, a brief definition of propaganda has been provided. Within this article, propaganda is defined as techniques which are utilized to spread “ideas, information, or rumor” in an effort to further a group’s ideas and influence other individuals (Cottam, Uhler, Mastors, & Preston, 2010, 341). Propaganda tactics can be employed through various forums as is exemplified later in this work.

Firstly, in the case of Northern Ireland, it is necessary to focus on one former radical organization of the nation that specifically utilized the psychological concept of propaganda. This major radical organization within Northern Ireland that is commonly discussed was the Irish Republican Army (IRA). This organization within Northern Ireland was influenced by its own social identity. The social identity is defined as the “part of a person’s self-concept that is determined by the groups to which the person belongs” (Cottam, Uhler, Mastors, & Preston, 2010, 342). Accordingly, the IRA was an organization that fought for what it believed to be just. Furthermore, in an effort to broaden its horizons and recruit more members, the organization utilized propaganda techniques such as those that were published in the IRA Army Green Book. This book outlined all the basic principles for the members of the IRA, while also providing readers with logically-deduced reasoning behind the comments. For instance, at one point in the handbook, it was denoted that “The nationhood of all Ireland has been an accepted fact for more than 1,000 years and has been recognised internationally as a fact” (“IRA Green Book”). The manual also utilized quotes from professionals, such as researchers and professors, in order to gain credibility for its ideas while influencing its readers to believe that the ideas that were professed were true and should be accepted as valid. This propaganda technique was clearly a focused approach to ensure that individuals agreed with the ideas, and then consequently joined the organization.

The Shining Path is a terrorist organization that was formed in Peru. Over the course of a twenty year civil war, the group fought against the “Peruvian armed forces in an attempt to subjugate the country and institute a revolution like the one carried out by Mao in China” (“Shining Path”). For this group, propaganda played a role in its indoctrination process. Indoctrination refers to the process in which terrorists officially recruit new members. This process primarily relies on the use of propaganda to ensure successful efforts. For instance, in certain cases, individuals will have existing motivations to join the terrorist organization; however, many a time, terrorists will have to subtly influence or radicalize individuals to ensure that they align with the ideologies of the group and join. This process, whereby terrorists apply propaganda techniques to influence individuals to accept the group’s ideas, is known as a “pull” (Cottam, Uhler, Mastors, & Preston, 2010, 279). The pull serves as a way for terrorist groups to broaden their member bases while also ensuring conformity amongst new recruits. Accordingly, conformity is “the tendency to change one’s beliefs or behaviors so that they are consistent with the standards set by the group” (Cottam, Uhler, Mastors, & Preston, 2010, 73). The propaganda process thus seems to result in conformity which can strengthen the infrastructure of a terrorist group. Moving forward, the Shining Path utilized propaganda in several instances, but mainly by providing classes to inmates within Lima’s Canto prison, in addition to initiating “an almost military discipline in which the prisoners marched, gave inflammatory speeches, and sang subversive songs” (“Shining Path”). These techniques continuously reinforced the ideas of the Shining Path, which subsequently radicalized and subtly influenced individuals to agree with the ideas by accepting them as the norm or status quo.

These forms of propaganda were also key tools in the Hamas group. The terrorist group spread its ideas through an online website which continuously uploaded information that was aligned with the group’s beliefs. The website, which was first formed in 2002, even went to the extent of dehumanizing Jewish individuals in an effort to prepare “young readers for future action” (Manor & Mizrahi, 2010). Accordingly, this website also continuously uploaded information that highlighted suicide bombing in a positive light to make these actions seem as though they were laudable and components of the status quo (Manor & Mizrahi, 2010).

In terms of Hezbollah, propaganda is a vital component of recruitment. Since the time of its first formation, Hezbollah utilized various forms of propaganda techniques in order to gain more members. For instance, in one report it was denoted that Hezbollah even began to release video games to subtly influence individuals to agree with Hezbollah’s ideologies. According to Richard Engel, the video game that Hezbollah released allowed players to “destroy Israeli tanks, shoot down helicopters and destroy warships; killing Israeli soldiers earns bonus points” (2007). These video games reinstated and reinforced Hezbollah’s ideology against Israelis and also provided players with opportunities to also virtually be involved in such activities. This form of propaganda consequently would cause individuals to subconsciously agree with the ideas and could eventually radicalize players to join Hezbollah in its fight against Israel.

In conclusion, propaganda has been utilized as a key component in recruiting new members and subtly influencing individuals to agree with the ideas put forth by many terrorist organizations. Propaganda is a dangerous tactic that can slowly, yet steadily alter the ways in which an individual views a particular event.

© Eugenie de Silva, 2014


Cottam, Martha L., Dietz-Uhler, Beth, Mastors, Elena, & Preston, Thomas. Cognition, Social Identity, Emotions, and Attitudes in Political Psychology. Introduction to Political Psychology. New York: Psychology Press, 2010.

Engel, Richard. “Hezbollah Game Celebrates War vs. Israel.” World Blog. NBC News. Last modified on August 16, 2007. Accessed September 28, 2014.http://worldblog.nbcnews.com/_news/2007/08/16/4376799-hezbollah-game-celebrates-war-vs-israel?lite

Herald Tribune. “Shining Path Indoctrination School Dismantled in Lima Jail.” Latin American Herald Tribune Venezuela Links. Accessed September 28, 2014. http://www.laht.com/article.asp?ArticleId=349466&CategoryId=14095

“IRA Green Book.” Irish Republican Army, vol. 1 & 2: 1-19. Accessed September 28, 2014. https://edge.apus.edu/access/content/group/security-and-global-studies-common/NSEC614/Content/Irish_Republican_Army_Green_Book.pdf

Manor, Yohanan and Mizrahi, Ido. “Hama’s Web School for Suicide Bombers.” Middle East Quarterly (2010): 31-40. Accessed September 28, 2014. http://www.meforum.org/2675/hamas-web-school-suicide-bombers

July 6, 2014

Author: Miss Eugenie de Silva, B.A., M.A.

Legal Issues & Cyber Operations

Imagine that you were asked the question, “What are the challenges that the legal issues regarding cyber operations pose for cyber intelligence activities?” Would you be able to answer this question? No worries, if you can’t. For this post, I have highlighted the general answer to this question based on currently, available data.

Within the intelligence field, it is of the utmost importance that personnel follow the legal regulations that have been established. Of course, these legal boundaries limit the extent to which officials can actually carry out their activities. With regard to cyber intelligence activities, officials must strictly follow the guidelines that have been implemented to ensure that no legal, political, or even social repercussions ensue. There are several challenges to cyber intelligence activities that are posed with regard to the legal issues in cyber operations.

One of the challenges that is posed relates to the availability of information that would aid in the effort to protect the United States (U.S.) against cyberthreats. Under the Freedom of Information Act (FOIA), if businesses release information to the government, there may be a possibility of that information being released to the public (Liu, Stevens, Ruane, Dolan, Thompson, & Nolan, 2013, 7). Therefore, since access to “confidential business information of owners and operators of the nation’s critical infrastructure and of private sector entities” is vital in gathering data to protect against cyberthreats, the operations of cyber security activities may be limited if such owners and operators feel reluctant to provide the information (Liu, et. al., 2013, 7). Au contraire, the Critical Infrastructure Information Act of 2002 (CIIA) was established to ensure that information that was voluntarily provided to the government would be protected from disclosure to the public; however, this act does also have its limitations in terms of the extent to which the information could be safeguarded under certain situations (Liu, et. al., 2013, 8). If those within field cannot conduct their cyber activities due to a lack of information, then the probability of falling victim to cyber attacks may significantly rise.

Another challenge that is posed is the fact that there are legal limitations placed on which electronic communications can be monitored and accessed by personnel within the government. As per the 2013 Congress report, the Department of Homeland Security (DHS), in addition to the National Security Agency (NSA) have “incrementally ramped up monitoring of federal government networks over the past decade to identify and prevent cyber attacks” (Liu, et. al., 2013, 10). Therefore, for those within the field, the statutory limitations that have been implemented by Congress would clearly restrict government officials in their pursuit to predict, and then prevent cyber attacks. These limitations are also established through the Fourth Amendment of the Constitution. The amendment explicitly protects an individual’s right to be safe against “unreasonable searches and seizures” (Liu, et. al.., 2013, 12). Therefore, programs such as EINSTEIN, which monitors federal government network systems, would be subject to reasonable and substantial observations and restrictions. Due to the nature of the EINSTEIN program, personal communications amongst federal employees and private individuals are also monitored (Liu, et. al., 2013, 16). Overall, there are constitutional limits that are placed on cyber activities; accordingly, these limitations can substantially impact the efforts of cyber security officials.

The third challenge that is highlighted in this work pertains to legal regulations that affect information sharing. Within the fields of intelligence and law enforcement, information sharing is that which cannot be over-stressed. By sharing information, personnel can remain updated about current events and can continuously improve systems. This is also true within the field of cyber intelligence; however, under laws and statutes such as the Fourth Amendment, the Telecommunications Act of 1934, and/or other state laws that may have been enacted, limits are placed on the information that can be shared (Liu, et. al., 2013, 19). By sharing certain information, government officials may ultimately be subject to “civil and criminal liability” (Liu, et. al., 2013, 19). Of course, it would seem only logical that those within the field would prefer to conduct activities that do not result in harsh legal consequences; thus, personnel may feel restricted in the opportunities that they are provided to share information that could be vital to preventing cyber attacks.

Another final challenge that could be identified is the convergence trend. This trend poses one major challenge with regard to cyber activities. For example, it was denoted that the convergence trend “undermines the existing legal architecture along the rule-of-law dimension by exposing latent confusion and disagreement regarding with substantive constraints apply to military and intelligence operations” (Chesney, 2012, 540). It was also denoted that this trend has been recently highlighted in the media by reports that discuss confusion over which intelligence agency was to be responsible for certain activities (Chesney, 542). This trend further confuses the extent to which cyber activities can be carried out while remaining within the legal boundaries that have been accordingly established.

In its entirety, the legal issues regarding cyber operations pose three main challenges for cyber intelligence activities. Due to the legal limitations that have been established through various legal statutes, mandates, and state laws, cyber security officials must ensure that they can gather the necessary data from business owners and private sector operators. Accordingly, personnel must take into consideration the Fourth Amendment with regard to respecting the rights to be secure against unreasonable searches. Furthermore, personnel must ensure that the information that is received or shared has not been prohibited under any legal acts.

© Eugenie de Silva, 2014


Chesney, Robert. “Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate.” Journal of National Security Law & Policy (September, 2012), vol. 5:539: 539 – 629. Accessed July 6, 2014. https://edge.apus.edu/<wbr />access/content/group/security-<wbr />and-global-studies-common/<wbr />Intelligence%20Studies/<wbr />INTL647/647-wk4-Military-<wbr />Intelligence%20Convergence%<wbr />20and%20the%20Law%20of%20the%<wbr />20Title%2010-Title%2050%<wbr />20Debate.pdf

Liu, Edward C, Stevens, Gina, Ruane, Kathleen A., Dolan, Alissa M., Thomspon, Richard M., and Nolan, Andrew. “Cybersecurity: Selected Legal Issues.” Congressional Research Service (April, 2013): 1-28. Accessed July 6, 2014.https://edge.apus.edu/<wbr />access/content/group/security-<wbr />and-global-studies-common/<wbr />Intelligence%20Studies/<wbr />INTL647/647-wk4-CRS-<wbr />Cybersecurity-Selected%<wbr />20Legal%20Issues.pdf