“Red Teaming” is setting up an OPFOR in a thought experiment or war game. Someone wants to test the assumptions of a plan, of whatever sort this is a good way to do it.
A good Red Team will have had little or no input into formulating the plan to be tested and thus unencumbered (or less encumbered) by the assumptions of the plan.
Red Team blogging–could be a good idea. Set up a secure intranet (or better a separate network) with a Red Team that is tasked with scouring blogs and electronic media and then “posting” OPSEC and propaganda material gleaned from it to illustrate the vulnerabilities.
Or similarly, a DoD web site that usually posts news releases is subjected to the above treatment to see what potential use “the enemy” could make of material that has been considered routine for posting.
That would be an interesting use of a “Red Team”.
I work in the Communications career field in the Air Force and Red Teams are used to test a unit’s network security, with a Commander’s consent, without letting the Network Administrators know that an “attack” will be conducted.
The attack usually involves common hacking techniques and some end-user phishing attempts.