Mimicking operations explained

Mimicking operations is a tactical concept, developed under Terrorist Tactics, Techniques, and Procedures, to explain a form of deception, commonly used by terrorists in their attacks. The concept is commonly used in military tactical modelling and scientific simulation; and is connected to the idea of shielding friendly forces (as well as foes) from detection and deception.[1]

Definition

Mimicking operations is a – “cost-effective way of achieving a desired operational effect using superior deception tactics to exploit concealment and camouflage opportunities”.[2]

Relationship with military deception operations

Carlo Kopp identified in 2002 that 'deception and Mimicry is the insertion of intentionally misleading information. It amounts to mimicking a known signal so well, that a receiver cannot distinguish the phony signal from the real signal.'[1] [3]

Relationship with Fifth Dimension Operations

The mimicking operations concept was acknowledged as an early iteration of contemporary Fifth Dimension Operations.[4]

Use of examples from nature

The concept of mimicking operations simulates activity that resembles a bacterial attack on a large and complex organism. Attacking cells mimic the behavior of their victims, but remain dormant while awaiting an opportunity to launch an attack.[3] The development of mimicking operations has been influenced by biology, ecology and the workings of the natural world.

Military tactics use

In military tactics, the employment of mimicking operational strategies, is based on concepts:

Mimicking operations as a subset of military deception

Mimicking Operations is a subset of military deception.[5] From a logistics perspective the capacity to develop a deception strategy, reflects the relative capacity of the combatant to collect the resources to develop suitable deception. In the case of terrorism, an individual with few resources is likely to adapt a mimicking strategy, and seek to camouflage themselves. Whereas a more resourced team of terrorists with the backingof an organisation may be more likely to afford the resources to develop a decoy, as part of a developed deception strategy.

Notes and References

  1. Flaherty . C. J. . December 2003 . Mimicking Operations . Australian Army Journal . 1 . 2 . 11–14 .
  2. Flaherty . C. J. . 3D tactics and Information Deception . Journal of Information Warfare . September 2008 . 7 . 27 2 . 49–58 .
  3. Carlo . Kopp . Bruce . Mills . 2002 . Information Warfare And Evolution . 352–360 . 10.1.1.159.2149 .
  4. Book: Robert J. . Bunker . Charles "Sid" . Heal . 2014 . Fifth Dimensional Operations: Space-Time-Cyber Dimensionality in Conflict and War—A Terrorism Research Center Book . iuniverse .
  5. Web site: Dangerous Minds - The Relationship between Beliefs, Behaviors, and Tactics . OODA Loop . 2012-09-07 . 2014-07-15.