The passage given below is followed by four alternate summaries. Choose the option that best captures the essence of the passage.
Different from individuals, states conduct warfare operations using the DIME model— “diplomacy, information, military, and economics.” Most states do everything they can to inflict pain and confusion on their enemies before deploying the military. In fact, attacks on vectors of information are a well-worn tactic of war and usually are the first target when the charge begins. It’s common for telecom data and communications networks to be routinely monitored by governments, which is why the open data policies of the web are so concerning to many advocates of privacy and human rights. With the worldwide adoption of social media, more governments are getting involved in low-grade information warfare through the use of cyber troops. According to a study by the Oxford Internet Institute in 2020, cyber troops are “government or political party actors tasked with manipulating public opinion online.” The Oxford research group was able to identify 81 countries with active cyber troop operations
utilizing many different strategies to spread false information, including spending millions on online advertising.
Option D accurately captures the essence of the passage by summarizing the two main components of information warfare described within the DIME model. The passage emphasizes how governments engage in information warfare as part of their broader strategy, which includes routine monitoring of telecom data and communication networks.
This surveillance allows governments to control and manipulate information. In addition, the passage highlights the role of cyber troops, government-backed teams tasked with manipulating public opinion on social media using tactics such as spreading false information and targeted advertising.
Option A: This option incorrectly focuses on open data policies being used to deploy cyber troops, which the passage does not emphasize.
Option B: This misses the focus on the monitoring of telecom data and networks, which is a key part of the passage.
Option C: This is incorrect because it introduces military operations as a separate concept, whereas the passage emphasizes that military, along with diplomacy, information, and economics, is part of the DIME model. The primary focus of the passage is on information warfare and how governments use cyber troops and monitor telecom data to influence public opinion. While military actions are part of the broader DIME framework, the passage is specifically concerned with the use of information tactics, not military operations on their own.
Create a FREE account and get: