Corruption as a Mechanism for the Formation of Recruitment Vulnerability in Modern Spin War Operations
Table of contents
Share
QR
Metrics
Corruption as a Mechanism for the Formation of Recruitment Vulnerability in Modern Spin War Operations
Abstract
PII
S1991-32220000622-3-1
Publication type
Article
Status
Published
Authors
Andrei Manoilo 
Occupation: Professor at the Department of International Relations and Foreign Policy of Russia, MGIMO University; Leading Researcher, Department of Europe and America, INION RAN
Affiliation:
Moscow State Institute of International Relations (University), Ministry of Foreign Affairs of the Russian Federation
Institute of Scientific Information for Social Sciences, Russian Academy of Sciences
Address: Moscow, Russia
Edition
Pages
30-34
Abstract

The article is devoted to the study of the role of corruption and the corruption link in the formation of recruitment vulnerability of persons who are in the focus of modern information operations. Modern information operations are not PR campaigns, but operational combinations of foreign intelligence services on the channels of open telecommunication networks, which are based on the methods of classical operational and agent activities. Corruption is used by the organizers of information operations primarily with the aim of organizing recruitment approaches to the target, the end result of which is the inducement to confidential cooperation (recruitment) for dependence. Corruption is used both as a factor creating the recruitment vulnerability of the information operation target (if it is already involved in corruption schemes) and as a tool for creating such vulnerability (by involving the operation target in corruption schemes in order to form and document its individual corruption link). In recent practice, there are examples of information operations based entirely on corruption and compromising materials obtained on its basis. These are the so-called Panama Dossier of 2015—2016 and the Pandora Dossier of 2021. In these operations, officials who had personal accounts in Panamanian offshore companies, whose operations could cause a resonant scandal in the event of disclosure of information about them, became the object of operational games of foreign intelligence services. In such cases, these individuals already had a corruption link, and it only remained to make it public (by throwing compromising materials in small portions and at certain intervals). The corruption factor is also found in other information operations, such as the doping scandal with WADA, or in the second stage of the so-called Skripal case.

Keywords
information operations, criminal intelligence, corruption, security, vulnerability
Date of publication
11.09.2023
Number of purchasers
12
Views
88
Readers community rating
0.0 (0 votes)
Cite Download pdf
1

References



Additional sources and materials

1. Manoilo A. V., Petrenko A. I., Frolov D. B. State information policy in the context of information and psychological warfare. 4th ed. Moscow, 2020. (In Russ. ) 
2. Petrenko A. I. Neutralizing the intentions of psychological operations. Vestnik Moskovskogo gosudarstvennogo oblastnogo universiteta, 2021, no. 3, pp. 145—156. (In Russ. ) DOI: 10. 18384/2224-0209-2021-3-1085.

Comments

No posts found

Write a review
Translate