in an Oxford Handbook of Cybersecurity, 2018 Forthcoming
29 Pages Posted: 11 Aug 2017 Last revised: 14 Aug 2017
Date Written: August 8, 2017
The United States has no peer competitors in conventional military power. But its adversaries are increasingly turning to asymmetric methods for engaging in conflict. Much has been written about cyber warfare as a domain that offers many adversaries ways to counter the U.S. conventional military advantages, but for the most part, U.S. capabilities for prosecuting cyber warfare are as potent as those of any other nation. This paper advances the idea of cyber-enabled information/influence warfare and manipulation (IIWAM) as a form of conflict or confrontation to which the United States (and liberal democracies more generally) are particularly vulnerable and are not particularly potent compared to the adversaries who specialize in this form of conflict. IIWAM is the deliberate use of information against an adversary to confuse, mislead, and perhaps to influence the choices and decisions that the adversary makes. IIWAM is a hostile activity, or at least an activity that is conducted between two parties whose interests are not well-aligned, but it does not constitute warfare in the sense that international law or domestic institutions construe it. Cyber-enabled IIWAM exploits modern communications technologies to obtain benefits afforded by high connectivity, low latency, high degrees of anonymity, insensitivity to distance and national borders, democratized access to publishing capabilities, and inexpensive production and consumption of information content. Some approaches to counter IIWAM show some promise of having some modest but valuable defensive effect. But on the whole, there are no good solutions for large-scale countering of IIWAM in free and democratic societies. Development of new tactics and responses is therefore needed.
Keywords: cybersecurity, information warfare, influence operations, hybrid warfare, ambiguous warfare
Suggested Citation: Suggested Citation
Lin, Herbert S. and Kerr, Jaclyn, On Cyber-Enabled Information/Influence Warfare and Manipulation (August 8, 2017). in an Oxford Handbook of Cybersecurity, 2018 Forthcoming. Available at SSRN: https://ssrn.com/abstract=3015680