Visible to the public On Cyber-Enabled Information Warfare and Information OperationsConflict Detection Enabled

TitleOn Cyber-Enabled Information Warfare and Information Operations
Publication TypeJournal Article
Year of Publication2019
AuthorsHerbert Lin, Jaclynn Kerr
Journalforthcoming, Oxford Handbook of Cybersecurity
Pagination29 pages
Date PublishedAug. 13, 2017
Keywordsambiguous warfare, Cognitive Security, Cognitive Security in Cyber, cybersecurity, hybrid warfare, influence operations, information warfare
Abstract

The United States has no peer competitors in conventional military power. But its adversaries are increasingly turning to asymmetric methods for engaging in conflict. Much has been written about cyber warfare as a domain that offers many adversaries ways to counter the U.S. conventional military advantages, but for the most part, U.S. capabilities for prosecuting cyber warfare are as potent as those of any other nation. This paper advances the idea of cyber-enabled information warfare and influence operations (IWIO) as a form of conflict or confrontation to which the United States (and liberal democracies more generally) are particularly vulnerable and are not particularly potent compared to the adversaries who specialize in this form of conflict. IWIO is the deliberate use of information against an adversary to confuse, mislead, and perhaps to influence the choices and decisions that the adversary makes. IWIO is a hostile activity, or at least an activity that is conducted between two parties whose interests are not well-aligned, but it does not constitute warfare in the sense that international law or domestic institutions construe it. Cyber-enabled IWIO exploits modern communications technologies to obtain benefits afforded by high connectivity, low latency, high degrees of anonymity, insensitivity to distance and national borders, democratized access to publishing capabilities, and inexpensive production and consumption of information content. Some approaches to counter IWIO show some promise of having some modest but valuable defensive effect. But on the whole, there are no good solutions for large-scale countering of IWIO in free and democratic societies. Development of new tactics and responses is therefore needed.

URLhttps://fsi-live.s3.us-west-1.amazonaws.com/s3fs-public/cyber-enabled_influence_warfare-ssrn-v1.pdf
Citation Keynode-62617