information warfare: case studies from the 21st century
TRANSCRIPT
1
Information Warfare: Case Studies from the 21st Century
Thesis by Jacob Andrew Clark
Spring 2020
University of Colorado Boulder
Department of Political Science
2:00 PM March 10, 2020 in Ketchum 371
Committee: Dr. David Bearce (PSCI, Advisor), Dr. Janet Donavan (PSCI), Professor Orly Hersh
(WRTG)
2
I. Introduction
Over the past two decades the expansion of cyberspace as a concern of national security and
the varying tactics of information warfare that states have developed are increasingly elevating the
significance of the question: What factors explain the variability of the use of strategic psychological
cyberwarfare in the international system? The relevancy of this question is constantly increasing due
to the rapid progression of both the Internet’s technological complexity and its capacity to exercise
great influence over societies. The Arab Spring, which saw the overthrow of the brutal thirty-year
Mubarak regime in Egypt, was greatly influenced by the Egyptian protestor’s ability to share
information and organize themselves over Facebook1. The integrity of democratic elections have
been thrown into question after Russia demonstrated the ability to engineer fake online communities
to influence and enflame the public debate of the 2016 US Presidential Election. As society becomes
increasingly reliant upon the Internet and other technology, the magnitude of information warfare
and how the Internet can be used by state actors to manipulate and deceive is only going to become
more pronounced.
Despite the relevance of such an inquiry, there is a lack of scholarly attention within the
national security space devoted to assessing the factors that could explain the varying strategies of
information warfare utilized on the international scene. The only study that even remotely addresses
this issue is a 2018 RAND study2 that instead focuses more broadly on the current and historical
practices of political warfare in the United States, Russia, Iran, and ISIS. The lack of scholarly focus
on information warfare is likely a product of an overall dearth of studies devoted to the cyber threat
1 Rebbeca Rosen of The Atlantic has an interesting piece in 2011 that discusses Facebook’s effect on the Arab Spring: Rosen, Rebecca J. 2011. “So, Was Facebook Responsible for the Arab Spring After All?” The Atlantic. https://www.theatlantic.com/technology/archive/2011/09/so-was-facebook-responsible-for-the-arab-spring-after-all/244314/ (February 29, 2020). 2 Robinson, Linda et al. 2018. “Modern Political Warfare: Current Practices and Possible Responses.” https://www.rand.org/pubs/research_reports/RR1772.html (January 13, 2020).
3
(Kello 2013). Most of the already-limited scholarship on cyberspace has focused on the CNA
(computer network attack) aspects of cyberwarfare rather than the less-exciting and more complex
considerations of how information in cyberspace can be manipulated for psychological effects that
translate into action outside of the cyber realm.
In the following paper I will examine two independent variables – regime type and relative
military power – in a comparative case study on Russia, the People’s Republic of China, India, and the
United States that provides an explanation to this under-studied topic. I propose that the variability
in the use of strategic psychological cyberwarfare among the international system is explained by a
state’s regime type and its military power relative to its primary geopolitical rival. A state’s regime
type influences how foreign policy is developed and whether or not the opinions of public
constituencies are influential over its development. The assessment of military power relative to a
primary rival guides strategic security planning and the tools of national power that a state chooses
to exercise. Ultimately, I argue that nondemocratic states who are militarily weaker relative to their
primary geopolitical rival are more likely to utilize high degrees of strategic psychological
cyberwarfare.
In the first section of this paper, ‘Argument,’ I elaborate on the tenants of my argument and
hypotheses within the context of both independent variables in my proposed model. In the ‘Testing’
section I will clarify how variables in the model are coded, establish case selection criteria, and layout
the predictions of my argument in Table 1.1. After Table 1.1 and before the case analysis sections I
clarify the conceptualization and operationalization of the dependent variable within the model in
the section ‘Degrees of Strategic Psychological Cyberwarfare.’ After the design of this study and my
proposed argument has been established, I will substantiate all assigned variable scores in Table 1.1
on a case-by-case basis beginning with Russia. Lastly, in the ‘Conclusion’ section I will examine the
validity of my argument based on the results from case analyses, discuss the original value provided
4
by this inquiry, and attempt to stimulate further research on this topic by discussing questions that
remain unanswered.
II. Argument
In the following section I will elaborate on the central argument of this inquiry:
Nondemocratic states that are militarily weaker vis-à-vis their primary geopolitical rival are more
likely to use higher degrees of strategic psychological warfare tactics in cyberspace, or strategic
psychological cyberwarfare.
a. Regime Type
Simply put, regime type conceptually refers to how “democratic” as a state is. There are a
number of disagreements among scholars as to how to “democratic-ness” is empirically evaluated,
but there is general agreement on several simple metrics:
• Regular and free elections in which more than one party participates
• A popularly elected legislature
• Consistently-applied rules regarding the alternation of power
There are specific intricacies of regime classification that are the subject of contemporary
debate, but for the purposes of this argument states are only democratic if they meet Cheibub,
Gandhi, and Vreeland’s3 minimalist criteria, as noted above.
Regime type is a significant variable in this argument because classifications of regime type
determines the formulation of foreign policy and the development of statecraft. Democratic states
must engage with the concerns of their citizens in order to formulate and implement policy in both
3 Cheibub, José Antonio, Jennifer Gandhi, and James Raymond Vreeland. 2010. “Democracy and Dictatorship Revisited.” Public Choice 143(1/2): 67–101.
5
the domestic and foreign realms. For example, when it became public that the CIA was using
“enhanced interrogation techniques” to compel enemy combatants in the Middle East to give up
intelligence, a fierce American public backlash was a significant catalyst for ceasing the use of such a
tactic. Nondemocratic states do not have the same obstacle when it comes to policy creation, as they
can and do disregard their citizenry by implementing policies that are often antithetical to the
national will.
Given that classifications of regime type contain implications as to how policy is formulated,
I propose that nondemocratic states are more likely to engage in higher degrees of strategic
psychological cyberwarfare. I predict that they do so for the purposes of favorable foreign policy
outcomes without the use of military force. Democratic states are unable to pursue the use of
strategic psychological cyberwarfare because citizens of democracies are not supportive of such a
policy out of fear that these capabilities will be used internally.
b. Relative Military vis-à-vis Primary Rival
Relative military power refers to the military power of a given state compared to that of another.
There is an emphasis on comparison because most scholars agree that absolute measures do not
provide a logical basis to make judgements about a state’s military power (Friedberg 1987). In
addition, there is significant disagreement among scholars as to which quantitative and qualitative
metrics should be included in a comparative military power analysis or if military power is capable of
being measured at all. Regardless, one school of thought believes that a nation’s power derives from
the resources at its disposal (both military and civilian), and the efficiency by which the state utilizes
those resources. This premise relies primarily on quantitative metrics like the Composite Index of
National Capability, or CINC (Correlates of War 2017), GDP per capita (Beckley 2018), and force
structure (Carafano 2014). Another school of thought believes that a nation’s power is derived from
6
historical outcomes. This theory relies primarily on qualitative measures such as strategy, the
observation of how international events play out, and other interpretive observations on a state’s
hard and soft power (Beckley 2018). Both schools of thought present valid reasoning as to why
resources or outcomes are the best measures of military power, but the qualitative judgement of
international events is outside the scope of this inquiry. Therefore, relative military power will be
recognized in terms of material resource power: CINC and GDP per capita.
Relative military power is a significant independent variable in this theory because the results
of a relative military power analysis will guide a state’s strategic military planning. States that observe
their military power to be less than that of their primary geopolitical rival are inclined to develop
strategic and tactical asymmetric advantages over its militarily-superior rival. Vehicles of asymmetric
warfare have taken various forms throughout history, but the advent of cyberspace as a domain of
military conflict has provided an entirely new opportunity for states to devise asymmetric capabilities
(Clarke & Knake 2019). At the modern-day strategic level, some states with the necessary resources
have opted for the asymmetric strategy of incorporating concepts of psychological warfare through
cyberspace. The purpose of this strategy is primarily to destabilize an adversary’s domestic politics to
achieve foreign policy victories against a superior military without the use of force (Pashentev 2019).
Given the fact that relative military power has implications for strategic planning, I propose
that militarily weaker states (vis-à-vis their primary rival) are more likely to incorporate strategic
psychological cyberwarfare in their asymmetric arsenal. Moreover, states that are militarily stronger
than their primary rival do not see strategic psychological cyberwarfare as a worthwhile investment
and practice. Instead, militarily stronger states focus on hardening tactical advantages and keeping
existing conventional and nuclear deterrence intact.
7
c. Hypotheses
Given the two separate arguments that have been provided in this section, the following
hypotheses are proposed:
H1 – Nondemocratic states are associated with a higher degree of use of strategic
psychological cyberwarfare capabilities.
H2 – States that are militarily weaker to their primary rival are associated with a
higher degree of use of strategic psychological cyberwarfare capabilities.
III. Testing
To evaluate the proposed hypotheses and argument, I will conduct a comparative case study
on the following four states: the Russian Federation, People’s Republic of China, India, and the
United States of America. A comparative case study is the ideal method of analysis for this inquiry
because the variance in strategic psychological cyberwarfare use must be evaluated empirically, and a
case study approach provides the most logical and comprehensive way to assess the questioned
variance on the international stage.
I chose the four presented cases based on two main criteria. First, in order for states to be
eligible for selection in this study the state must have an existing infrastructure and technological
modernization requirement. Psychological cyberwarfare operations require a significant amount of
funding, existing defense infrastructure and modernized technological assets and capabilitie. Hence,
states eligible for selection in this inquiry must already have modernized technological sectors of the
economy capable of producing the cyber capabilities and existing defense infrastructure needed to
perpetuate vast schemes of psychological cyber warfare. Somalia, for example, would not be a
country worthy of analysis in this research because Somalia does not have the technological or
military capability necessary to deploy and facilitate strategic psychological cyberwarfare. Given such
8
considerations, the potential sample size of states that meet this requirement and are worthy of
analysis is rather small.
The second requirement imposed on case selection is based on the need for variation
amongcases within each independent variable. For regime type, both a democratic and nondemocratic
case are needed. Further, different gradients and iterations of democracies and nondemocracies
should also be considered. As a result, India and the United States were selected as democracies,
while China and Russia were chosen as nondemocracies. For relative military rival, both a state that is
militarily superior and a state that is militarily weaker vis-à-vis its primary rival are required.
Additionally, states that are under different national security considerations as militarily stronger or
weaker powers should be considered. Hence, India is included as a militarily superior state because
its national security concerns are starkly different than the United States’ as a global military
superpower. Similarly, China was included as a military weaker state because its national security
concerns are much different as a rising power than Russia’s as a relatively declining power.
As evidenced by Table 1.1, both independent variables are collinearly associated in that both
nondemocratic cases are militarily weaker powers and both democratic cases are militarily superior
powers vis-à-vis their primary geopolitical rival. I predict that collinearity exists for two reasons.
First, the existing infrastructure and technological modernization requirement imposed on case
selection relegates potential analysis to a small sample of powerful states on the international scene.
Second, that within this small sample size of powerful states, there is overlap in primary geopolitical
rivals among cases. Specifically, the People’s Republic of China and Russia identify the United States
as their primary geopolitical rival. Consequentially, both states are individually weaker militarily to
their shared primary geopolitical rival.
9
a. Table 1.1
Case
IV1 ‘Regime Type’
IV2
‘Relative Military Power’
DV ‘Psychological Cyberwarfare’
Russia Nondemocracy Less than Primary Rival (USA)
High Degree of Use
People’s Republic of China
Nondemocracy Less than Primary Rival (USA)
Medium-High Degree of Use
India Democracy Greater than Primary Rival
(PAK)
Low Degree of Use
United States of America
Democracy Greater than Primary Rival
(PRC)
Medium-Low Degree of Use
b. Degrees of Strategic Psychological Cyberwarfare
The dependent variable in this research represents the variability in the degrees of strategic
psychological cyberwarfare use within the international system. Specifically, the dependent variable is
a 4-tier categorical variable (High, Medium-High, Medium-Low, Low) that measures the degree to
which a case uses strategic psychological cyberwarfare capabilities. In addition to translating the
implications of scores on independent variables, degrees of psychological cyberwarfare use will be
predicted based on two observations that will be discussed in the following section. Before the
criteria can be established for evaluation on the dependent variable, I will clarify the term ‘strategic
psychological cyberwarfare’.
Strategic psychological cyberwarfare is a term that is fused together from several disciplines
within the study of military conflict. The first component is the concept of psychological warfare,
which has a long history within military strategy, including writings by such famous authors as Sun
10
Tzu4. Psychological warfare is the process of using communications designed to manipulate the
minds and actions of specific entities for the purpose of winning military victories without the use of
force (Linebarger 2015). At the strategic level, psychological operations target a specific country or
the international system as a whole to influence poor decision making and promote action to the
attacker’s benefit (Pashentev 2019). The second component is the concept of cyberwarfare.
Cyberwarfare, as an academic study within the context of national security, is in its infancy and there
are no broadly recognized definitions. Regardless, Clarke and Knake describe it as follows: “Actions
by a nation state to penetrate another nation’s computers or networks for the purposes of causing
damage or disruption” (Clarke & Knake 2010). Fundamentally, the elements of strategic
psychological cyberwarfare are subcomponents in the larger concept of information warfare. Former
US DARPA Program Manager Rand Waltzman defines information warfare as the following:
“Information operations and warfare, also known as influence operations, includes the collection of
tactical information about an adversary as well as the dissemination of propaganda in pursuit of a
competitive advantage over an opponent” (Waltzman 2017: 1). Considered as a whole, the term
strategic psychological cyberwarfare refers to the use of manipulative communications through
cyberspace targeted at a specific country for the purpose of stimulating poor decision making and
internal discord on behalf of the attacked that is beneficial to the attacker.
Now that the conceptualization of the dependent variable has been clarified, the criteria for
evaluation on the dependent variable must be established. The first criteria, and most obvious, is to
assess if a case has used or is currently using strategic psychological cyberwarfare capabilities. Are
there examples today, or in the recent past, of a case using strategic psychological cyberwarfare? If
so, the facts of the example will be considered for implications on the degree of strategic
4 In the first chapter of Sun Tzu’s The Art of War, Tzu describes “All warfare is based on deception” (18). See MIT’s Online Classics Archive for a translation of The Art of War: http://classics.mit.edu/Tzu/artwar.html
11
psychological cyberwarfare use. Cases with high degrees of use should contain examples where it is
abundantly clear that strategic psychological manipulation was the goal of a specific action and
cyberspace was the primary vehicle of delivery. If the goal of an example attributed to a case is
unclear or cyberspace wasn’t the primary vehicle of the example, then a case would receive a lower
degree of use that is consistent with the facts of the attributed example.
The second criteria for evaluation on the dependent variable is to assess if any implications
from military doctrine can be drawn as to a case’s use of strategic psychological cyberwarfare.
Technological advancements in conventional, unconventional, and nuclear forces over the last 50
years have forced the majority of powerful states on the international scene to revise their military
doctrine to incorporate emerging technologies and plan for conflict of the future. Hence, an
interpretative analysis of modern military doctrine can provide a basis to draw conclusions about a
case’s use of strategic psychological cyberwarfare capabilities. Within this criterion, high degrees of
use would be attributed to a case whose military doctrine displays an embrace of strategic
psychological cyberwarfare capability because of its asymmetric potential. If implications from a
case’s military doctrine are insufficient, then a case will receive a lower designation of use that is
consistent with the implications that can be sufficiently drawn from its military doctrine.
i. Russia
As clearly depicted in Table 1.1, Russia is both a nondemocratic state and a weaker military
power relative to its primary geopolitical rival in the United States. Since the beginning of the 21st
century, Russia has developed and utilized considerable cyber capability in both tactical and strategic
contexts. Tactically, Russia coordinated targeted attacks on Georgia’s government communication
infrastructure with kinetic Russian military operations during the 2008 Russia-Georgia War (White
2018). In December of 2015, Russia performed the world’s first cyberattack on another country’s
12
power grid when it hacked into three separate power distribution centers in Western Ukraine that
affected more than 220,000 people (Connell & Vogler 2016). Strategically, Russia has sought to
affirm its regional and global influence by using cyberspace as a tool to spread disinformation and
foment internal discord within an adversarial state. In 2007, Russia targeted specific distributed
denial of service (DDoS) attacks on critical Estonian websites after the Estonian government
announced the planned removal of a Soviet-era statue in early 2007. Upon the removal of the statue
massive demonstrations ensued that eventually turned violent and killed one person(Connell &
Vogler 2016). Most notably, Russia perpetrated the most comprehensive act of strategic
psychological cyberwarfare to date when it engaged in interference with the 2016 United States
presidential election. After discussing Russian’s regime type and relative military power, I will
provide an in-depth analysis of Russia’s 2016 US election interference as a clear example of the fact
that Russia utilizes a high degree of strategic psychological cyberwarfare.
For the purposes of this inquiry, an in-depth discussion of Russian institutions is not
warranted. Frankly, there aren’t many political scientists that need convincing that Russia does not
meet modern standards to be classified as a democracy. An accredited history of election fraud and
blatant suppression of opposing political parties is enough by any scholar’s scale to disqualify Russia
as a democracy. Briefly, I will discuss how these two features of “Russian democracy” specifically
violate the recognized standards of democracy found in Cheibub, Ghandi, and Vreeland.
Beginning with Vladimir Putin’s first electoral victory in 2000 and until his most recent
victory in 2018, there are serious questions as to the legitimacy of Russian elections. For example,
credible international organizations like the Organization for Security and Cooperation in Europe
have never been allowed to observe an election in Russia to the capacity necessary to draw valid
conclusions about legitimacy (Lukinova et al 2013). Hence, the research of independent investigators
such as Sergei Shpilkin, a well-known Russian elections analyst, are among the most credible results
13
to consider. Using data from Russia’s Central Election Commission, Shpilkin noticed more than 30
notable falsifications in specific voting precincts during Putin’s 2012 electoral victory (Schreck 2018).
Shpilkin has raised similar concerns about Putin’s victory in 2004 and Dmitri Medvedev’s victory in
2008. Beyond voting fraud, opposing political parties have been brutally suppressed in Russia.
Mikhail Kasyanov, a fierce critic of Putin and former prime minister, was removed from the ballot
for conspicuous reasons in 2008 (Lukinova et al. 2011) to pave the way for Putin’s placeholder,
Medvedev5. The Kremlin has denied all such allegations and decried them as Western propaganda,
yet it has not presented convincing evidence to the contrary. Given such considerations, Russian
elections are not deemed to be legitimate and hence do not meet the most basic criteria of
democracy: free and fair elections in which opposing parties are not deliberately excluded from
participating.
Much like conceptualizing Russia as a nondemocracy, it is relatively obvious to most scholars
that Russia considers the United States to be its primary geopolitical rival: "Moscow undoubtedly
views the United States and its NATO partners as the principal threat to Russian security, its geo-
political ambitions, and most importantly, the Kremlin's continued hold on power" (US Office of
the Secretary of Defense 2017: 15). On that basis, I will discuss Russia’s military power relative to
the United States.
As established earlier, two indicators will be used to assess power in terms of material
resources. The first is CINC, an index that contains data from 1816-2012 on total population, urban
population, iron and steel production, energy consumption, military personnel, and military
expenditure. CINC aggregates all six individual indicators into one value and reflects an average of a
5 Tim Horley, Anne Meng, and Mila Versteeg in partnership with the National Constitution Center published a section of the project “The Battle for Constitution” in The Atlantic that details how the alternation of power from Putin to Medvedev was exemplary of one of five common ways that modern autocrats have circumvented constitutional limits on their power: https://www.theatlantic.com/ideas/archive/2020/03/new-authoritarianism/607045/
14
state’s share of the total capability in the international system that year. Using data from 2012, Russia
received a CINC score of 0.0408 to the United States’ 0.1393. This indicates that Russia had an
average access to just 4% of capability within the system in 2012 while the United States had access
to triple that at nearly 14%. There are scholars, such as Michael Beckley, who disagree with the
validity of CINC because densely populated states receive inflated capability scores, hence the
second indicator is GDP per capita, which will also be used as a power index to balance out possible
CINC inflation from population (Beckley 2018). Russia’s GDP per capita in 2018 was just
$11,288.87 (USD) while the United States’ was more than five times that at $64,794.58 (USD).
Given these two indicators, Russia is at a clear material power disadvantage to the United States and
we can conclude that Russia is militarily inferior to the United States.
Given the analysis that has been provided on Russia thus far, my argument predicts that
Russia would exercise higher degrees of psychological cyberwarfare capability. As a nondemocracy
that is militarily inferior to its primary rival, Russia has both the need to establish asymmetric
advantages and the capacity to do so without concern to the worries of its citizens. Beyond the
observations of my argument, Russia was coded as a high degree of use on the independent variable
for two specific reasons: 1) Specific attacks on the United States, and 2) The embrace of information
warfare as an asymmetric tactic within Russian military doctrine.
Arguably the foremost example of strategic psychological cyberwarfare is the extent to which
Russia interfered with the 2016 United States presidential election. The Russian government created
an entire government agency, the Internet Research Agency (IRA), to create troll farms on US
servers for various social media sites that specifically targeted controversial groups and topics for
exploitation within public discourse (McCombie et al. 2020). Troll farms are organized groups on
the Internet that congregate for the purpose of influencing public opinion by spreading deliberately
false information. The IRA created these entities on US servers to buy advertising space, organize
15
online and real-world rallies, and pit opposing opinions of a controversial topic against each other
(McCombie et al. 2020). While the overall electoral impact was minimal, the real effect of the
interference was the delegitimization of the US electoral system and the perception that Russia had
significant influence over American decision making. The results were a number of grand jury
indictments, a two-year special counsel investigation, and immeasurable damage to the American
political ecosystem that has only become increasingly partisan ever since. Russia’s characteristic
denial of this covert action, despite being confirmed by every US intelligence agency6, only furthered
the qualitative impact of Russian influence by creating additional confusion and public mistrust in
American institutions. Despite being one example in a long list of Russian/Soviet attempts to
subvert American public authority via the electoral system, the use of troll farms by the IRA during
the 2016 US presidential election undoubtedly rises to the required threshold for consideration as a
high use case within the first criterion of evaluation on the dependent variable.
Like many states since the dawn of 21st century, Russia has incorporated the use of emerging
technologies like cyber within military doctrine. In fact, Aleksandr Burutin, while he was the Deputy
Chief of the General Staff to the Russian president, gave a speech in February of 2008 titled “Wars
of the Future Will Be Information Wars” (Carr 2011). Unlike the United States, Russia has come to
view cyber as a single tool within the broader category of information warfare that is exercised
across all spectrums of warfare rather than a dimension of conflict in and of itself (White 2018). This
view is predicated on the idea that the Russian government views information itself as a medium to
shape individual and collective perceptions, and cyber is tool to facilitate information superiority so
as to control the narrative in a given situation (White 2018). Russian cyber activities during the 2008
Russia-Georgia War solidify this doctrine in practice. Through Russia’s access to an army of civilian
6 See the US Senate Select Committee on Intelligence’s investigation into Russian interference in the 2016 Election: https://www.intelligence.senate.gov/publications/committee-findings-2017-intelligence-community-assessment
16
hackers, official Georgian government websites and communications infrastructures experienced
massive DDoS attacks that cut off their ability to communicate during the early stages of the
conflict. This gave the Russian government the ability to shape the international narrative during
that crucial juncture of the conflict and allow them to exercise qualitative superiority over the
situation (White 2018). In addition to its cyber doctrine in practice, the clear Russian embrace of
cyber as a medium of psychological manipulation and narrative control assuredly rises to the
necessary threshold for assessment as a high use case on the dependent variable.
Based on a widely-attributed example of strategic psychological cyberwarfare capability use
and the explicit embrace of cyber as an asymmetric tool to control operational and strategic
narratives via psychological manipulation, Russia is patently assigned a high degree of use on the
dependent variable.
ii. China
The People’s Republic of China (PRC) is a nondemocratic and militarily weaker power
relative to its primary geopolitical in the United States. As one of the prominent cyber powers on the
international stage, China has created and continues to operate the world’s most pervasive campaign
of cyber espionage (Carr 2011, Daniels 2017). China acknowledges the technical superiority of the
United States, and accordingly China has embraced cyberspace as a medium to make up for that
technological gap by stealing intellectual property (Carr 2011). In 2009, the Munke Center for
International Studies in Toronto released a report that attributed Chinese state hackers to malware
that was actively saving, storing, and transmitting data placed on government information
technology infrastructures in India, Taiwan, Tibet, Japan, and the United States among others back
to Chinese servers (Walton et al. 2009). To this day, China continues to penetrate the networks of
US defense agencies and contractors to steal intellectual property for technological and economic
17
gain (Carr 2011, Daniels 2017). Despite the obvious employment of considerable cyber power, the
absence of verified examples where strategic psychological cyberwarfare was utilized complicate the
strict categorization of China as a high use case on the dependent variable. Regardless, after
assessing Chinese regime type and relative military power, I will discuss how China’s embrace of an
aggressive cyber doctrine that is conducive to using strategic psychological cyberwarfare
substantiates the argument that China utilizes a medium-high degree of strategic psychological
cyberwarfare capability.
Similar to regime type in the Russian context, the vast majority of political scientists do not
need significant persuasion that China is a nondemocracy. In fact, the PRC is the antithesis of a
democratic state by modern regime classification standards. Among many others, a one-party
political system and the absence of democratic elections are two fundamental features of Chinese
politics that classify the PRC as a nondemocracy.
While there are several local political parties throughout China, all parties are kept under the
leadership and supremacy of the singular national party, the Chinese Communist Party or CCP
(Shigong 2010). The supremacy of the CCP over all other parties is the fundamental core of the
Chinese government largely because the CCP was the body that prevailed in the Chinese
Communist Revolution in 1949 to establish the People’s Republic of China (Shigong 2010).
Accordingly, all local political parties are nationally controlled, and their existence is affirmed only by
their cooperation with the ideology and demands of the CCP. Further, the absence of national
democratic elections prevents citizens from choosing their representation, and the only pathway for
turnover at the highest echelons of Chinese politics is promotion within the CCP (Guo 2007). Both
the existence of a single-party system and the absence of democratic elections relegate the PRC to
nondemocracy by nearly all standard criteria, including the criteria recognized in this research from
18
Chiebub, Gandhi, and Vreeland. Effectively, the CCP is able to pursue any action or measure it
wants without regard for the passions and concerns of its citizens.
As a state that has seen its geopolitical power soar since economic integration with the
developed world in the late 1900s, China’s regional and global military power is beginning to rival
that of the United States. In summarizing a 2019 Chinese defense white paper, Anthony H.
Cordesman of the Center for Strategic and International Studies argues: “[The white paper] flags the
fact that America and China are now competing superpowers, and that China’s growing military
forces are developing to the point where they will be able to challenge the United States”
(Cordesman 2019: 1). As its established primary rival, I will discuss Chinese military power relative
to the United States.
According to the National Material Capabilities database from the Correlates of War Project,
the PRC received a CINC score in 2012 of 0.218166 to the United States’ 0.139352. As such, the
PRC had an average access to almost 22% of capability within the international system in 2012 as
compared to the United States’ nearly 14% (Correlates of War 2017). As discussed earlier, there are
scholars that disagree with the validity of CINC to estimate capability due to the fact that highly
populated states will receive inflated capability based on high total and dense urban populations
(Beckley 2018). As the most populous country in the world with several of the largest urban
populations globally, I find it highly likely that population positively inflated PRC’s 2012 CINC
score. Material power indicators like GDP per capita that check for population (Beckley 2018)
indicate that China’s national material power is likely lower than the US: data from the World Banks
shows that China’s 2017 GDP per capita was a meager $8,826.99 (USD) to the United States’
$59,531.66 (USD).
China’s population has historically inflated CINC scores during periods of Chinese history
where the implications of their CINC scores do not make logical sense. For example, between 1911
19
and 1949 China was largely an underdeveloped state that was dealing with civil conflict between the
nationalists and communists following the fall of the Qing dynasty while also suffering a terrible
defeat in the First Sino-Japanese War. During the same time, the Soviet Union engaged successfully
in both World Wars and emerged as one of the two major global powers in the post-WWII era.
Conventional logic would predict Soviet capability to be much higher than China’s, but from 1911-
1949 China held an average CINC score of 11.5% while the Soviets held an average score of 12.8%.
Logically, one would expect the disparity in capability between these two states to be much larger
during this time period. The small CINC disparity between Russia and China during this time period
is a testament to the fact that China’s CINC score is inflated by its exceptionally large total
population. After checking for population’s effect, it is assessed that the United States likely
exercises a material power advantage over China.
Given the provided analysis on the independent variables within the context of China, my
argument would predict a higher degree of use on the dependent variable. Due to the likelihood that
a rising and developing China is at a smaller military disadvantage relative to the United States than
Russia is, a higher degree of use is associated with the implications drawn from China’s score on the
independent variables. However, a lower degree of higher use is warranted for two specific reasons
derived from observations performed on the dependent variable: 1) There are no attributable cyber
activities to China that can be considered an act of strategic psychological cyberwarfare, but its
extensive campaign of cyber espionage could be easily re-configured for such capabilities; and 2)
Chinese military doctrine since the 1990s has begun to embrace concepts that are consistent with the
development of strategies for the use of strategic psychological cyberwarfare.
Currently, there are no significant studies that have proven examples of Chinese cyber
activities containing elements of strategic psychological cyberwarfare. Primarily, the PRC has tailored
its cyber capability to supplement technological and economic development via cyber espionage
20
(Carr 2011). Chinese state hackers have targeted US defense agencies and private contractors by
stealing troves of data and intellectual property critical to research and development in areas like
missile technology and naval warfare (Carr 2011). These activities may not strictly fall under
elements of strategic psychological cyberwarfare, but the PRC has effectively demonstrated the
cyber capability necessary to pursue such a strategy if desired. Interestingly enough, there are
unverified reports of Chinese-government linked social media accounts spreading targeted
disinformation campaigns through troll farms to influence the outcome of the 2020 Taiwan
presidential election (Allen-Ebrahimian 2020). Although it may be proven differently in the future, it
is assessed that China’s cyber activities do not exhibit elements of strategic psychological
cyberwarfare and do not meet the specified criteria to be considered a high-use case within the first
criterion of the dependent variable.
Chinese military doctrine began to take note of high tech’s integration within military
operations after the United States secured an overwhelming victory in the First Gulf War against an
Iraqi force who received its arms and implements from Russia and China (Carr 2011). Chinese
military strategy accordingly adopted the concept of ‘informatization,’ which refers to the application
of information technology to command, intelligence, training, and weapons systems (Kanwal 2009).
This concept also inspired the PRC to raise an ‘army’ of private citizen hackers who can facilitate
hacking campaigns against China’s adversaries (Kanwal 2009). Interpretively, such a strategy can be
easily recalibrated to wage strategic psychological cyberwarfare via online troll farms. Broadly, the
PRC views developing capability in cyberspace as a way to level the playing field against the United
States, who exercises technological superiority over China (Kanwal 2009). Further, experts like Kate
Farriss have argued that China has embraced an increasingly broad view of information warfare to
emphasize aspects like psychological operations and deception (Carr 2011). While a lack of
significant attributable examples does not allow an evaluation of Chinese cyber doctrine in practice,
21
it is clearly understood that China is embracing military doctrine that is supportive of psychological
manipulation and deception in cyberspace.
In addition to the fact that Chinese military doctrine is embracing cyberspace as an
asymmetric tool to facilitate operations that are deceptive and psychological in nature, the
implications drawn from the PRC contextualized within both independent variables support the
assignment of a higher degree of use on the dependent variable. However, the lack of significant
attributable examples and the fact that Chinese military disadvantages relative to the United States
are lower than that of Russia prompt the assignment of a medium-high degree of use on the
dependent variable for the People’s Republic of China.
iii. India
India is a democratic state that exercises a relative military superiority over its primary rival,
Pakistan. Despite considerable conventional military capability and consistent cyber conflict with
Pakistan since 1998, India’s state cyber power is rather underdeveloped compared to other cases in
this study (Carr 2011). After discovering a Chinese variant of the Stuxnet worm on government
infrastructure and suffering multiple defacements to its most secure government website from the
Pakistan Cyber Army in 2010 (Carr 2011), India has been attempting to develop capabilities to
secure its domestic cyberspace by improving its cyber defenses (Hathaway et al. 2016). The 2013
National Cyber Security Strategy was designed to give India a visible path toward such a goal, but an
ill-defined implementation plan has delayed many of the deliverables that the 2013 strategy called for
(Hathaway et al. 2016). Currently, India is still conceptualizing how it plans to develop capabilities
and infrastructure to consolidate its cyber power. India is therefore assigned a low degree of use on
the dependent variable for India in Table 1.1 due to the absence of significant state cyber capability,
much less even utilizing capabilities with which the dependent variable is concerned.
22
Similar in that most contemporary scholars implicitly characterize Russia and China as
nondemocracies, it is a relatively obvious reflection that India is a democratic state. Historically,
scholars point to India’s colonial experience before 1947 as catalyst for the cultivation of democratic
ideals within broad national ideology (Mehta 2012). Today India is a vibrant and competitive
parliamentary democracy whose politics are marked not by shared common interests but the ideal
that holding the state accountable is to gain access to its power and resources (Mehta 2012). The
existence of intense political competition among parties is a testament to the fact that citizens of
India are empowered to engage in national and regional politics. Institutionally, frequent competitive
elections and a constitutional separation of powers enables incumbent turnover and provides
citizens with a legitimate check on government power (Mehta 2012). Considerable voter turnout and
civilian control of the military are further indications that India meets not only broad requirements
to be a democracy but specific criteria such as that articulated by Cheibub, Gandhi, and Vreeland.
On the provided basis it is assessed that India is a democratic state whose citizens have an active
role in holding the state accountable and determining its future.
The 1947 partition of India that resulted in the creation of the independently sovereign
Indian and Pakistani states created a lasting rivalry between the two powers who would both
eventually become armed with nuclear capabilities (Majeed 2013). Since then, on three separate
occasions the fierce India-Pakistan rivalry has resulted in full-scale war and startling nuclear
conflagration in 1998 over the historically-disputed Kashmiri peninsula (Majeed 2013). Long-lasting
disputes over territory remain and increasing Pakistani military cooperation with states India
considers to be hostile, such as China, present the most direct threat to India’s national security
(Iqbal & Amin 2016). Given that Pakistan is considered to be India’s primary rival, I will assess
India’s military power relative to Pakistan.
23
Data from the National Material Capabilities databases suggest that India exercises a
considerable material power advantage with a 2012 CINC score of 0.0809 (8.09%) as compared to
Pakistan’s 0.0145 (1.45%) (Correlates of War 2017). According to these figures, in 2012 India had an
average access to capability within the international system that was nearly eight times higher than
that of Pakistan. Using data from the World Bank, net measures of capability reinforce the
conclusion drawn from CINC as Pakistan’s 2018 GDP per capita of $1,482.40 (USD) was
considerably lower than India’s 2018 GDP per capita at $2,010 (USD). Ultimately, scholars have
pointed to a larger economic base and a lasting three-decade expansion of military spending to be
the principal basis for India’s conventional superiority over Pakistan (Iqbal & Amin 2016).
In considering India’s assigned score on both independent variables, I predict lower degrees
of use on the dependent variable. As a democratic and militarily superior state relative to its primary
rival, India does not have the option to bypass the passions of its citizens nor the impetus to
establish asymmetric advantages over Pakistan. Beyond the implications that be drawn from the
independent variables, the required observations made on the dependent variable substantiate
India’s assignment as a low use case for two specific reasons: 1) There are no historic or
contemporary examples of utilizing the required capabilities as India is a rather underdeveloped
cyber power; and 2) State-level efforts aimed at developing national capability have been historically
insufficient.
Despite being a country commonly associated with modern technological advancement,
India’s national defensive and offensive cyber capabilities are significantly underdeveloped
(Hathaway et al. 2016). It goes without saying that there are no examples of India using cyber
capabilities that are the focus of this research, but there is serious question as to what cyber
capabilities India does possess. Among others, a series of cyberattacks on India’s National Security
Council and Central Bureau of Investigation in 2010 woke India’s state officials up to the reality that
24
an unsecure cyberspace contains troubling implications for domestic and national security
(Hathaway et al. 2016). Accordingly, India has set forth a broad initiative to develop cyber capability,
secure domestic cyberspace, and increase awareness: the 2013 National Cyber Security Strategy
(Hathaway et al. 2016). The 2013 strategy called for a variety of action items and goals aimed at
primarily developing India’s cyber defense and attack resiliency (Hathaway et al. 2016). Despite clear
goals and intentions, a severe lack of implementation planning blurred the lines of responsibility
between ministries and created a substantial gap between expectations and actual national readiness
to confront India’s cyber threats (Hathaway et al. 2016). One of the central demands of the 2013
strategy was to create a central coordinating body to oversee the strategy’s development (Hathaway
et al. 2016), and this concept later became the idea behind India’s sluggish and so far incomplete
creation of the Defence Cyber Agency (DCA). As of October 2019, state officials in India are still
conceptualizing how the DCA is going to function and whether or not it will cooperate or be fully
integrated with the Indian Armed Forces (Chawla 2019).
Based on these observations it is clear that India is in the early stages of developing its state
capability in cyberspace. Combined with the fact that results in capability or doctrine development
thus far have not materialized, India’s underdeveloped cyber power requires an assignment of a low
degree of use on the dependent variable.
iv. United States of America
As a democracy whose military power is substantially greater than its primary rival’s, the
United States of America is arguably the premier cyber power on the international scene in terms of
the predominance and complexity of its capabilities. Historically, the United States has focused the
core development and use of its cyber capabilities for CNA operations (Carr 2011). Unlike Russia
and China who see information warfare as an asymmetric tool, the United States has historically
25
conceptualized information warfare as a way to harden existing cyber and conventional deterrence
with adversaries (Carr 2011). In all likelihood, the most complex computer network attack ever
created was developed by the United States and implanted by Israel (Lindsay 2013). In 2010, Iranian
officials noticed malfunctions with internal computers at the Natanz uranium enrichment facility
and eventually discovered a piece of malware – which became known as Stuxnet – that was slowly
sending thousands of uranium centrifuges at Natanz into overdrive so that the centrifuges were
incapable of producing viable weapons-grade uranium (Lindsay 2013). The attack on Natanz
sparked considerable fear among the international community as to the potential for cyberattacks to
produce kinetic effects. Despite obvious capability for CNAs, there are no examples that indicate
the United States has utilized strategic psychological cyberwarfare capabilities. This data point is
further complicated by the fact that the Trump administration is re-posturing American cyber
doctrine to embrace a more offensive-minded strategy when it comes to information warfare.
Considering these conflicting observations and the implications drawn from the independent
variables, the United States was properly assigned a medium-high degree of use on the dependent
variable in Table 1.1.
Compared to the other cases in this research, it is the most obvious that the United States
meets minimalist standards to be considered a democracy. American citizens can vote in a myriad of
local, state, and national contested elections on a consistent basis to determine their governmental
representation. Further, the succession of office takes place according to institutional guidelines.
Beyond what is obvious electorally and institutionally, the overall body of research on public opinion
in the United States supports the idea that public opinion matters in American policymaking
(Shapiro 2011). According to Shapiro, the overall takeaways of public opinion research in the US
paints “a sanguine picture of democracy” (Shapiro 2011: 999). Given that regularly occurring and
contested elections have been a historically consistent feature of American politics and research
26
indicates that public opinion plays an important role in policy formulation, it is assessed that the
United States is a democratic state that is beholden to the passions of its citizens.
The end of the Cold War and post-9/11 engagements reorganized American strategic
thinking away from prioritizing great power competition at the top of its security agenda. However,
the rise of China is now ushering in a new American embrace of great power competition7. In his
2001 book The Tragedy of Great Power Politics John J. Mearsheimer predicted that China and the United
States are destined to be rivals because Chinese economic growth will eventually translate into
military capability that will threaten American hegemony in Asia Pacific (Mearsheimer 2001). Given
mounting economic disputes, China’s aggression in the South China Sea and opposing political
ideologies, it is assessed that the United States considers China to be its primary geopolitical rival.
Data from the National Material Capabilities database shows that China had average access
of 0.2181 (21.81%) to capability within the international system while the United States had an
average access of 0.1393 (13.93%) in 2012 (Correlates of War 2017). This interpretation mistakenly
implies that the United States is a weaker military power than China for the same reasons provided
in the corresponding section of the China case. It is highly likely that China’s CINC scores, thereby
its military power, are inflated due to its enormous total population. The interpretation that China is
a superior military power to the United States is even more misleading when American GDP per
capita is almost six times the size of China’s (World Bank 2018). Additionally, a significant number
of scholars consider the United States to be militarily superior. According to Carr, the key filter
informing and guiding Chinese security decision-making is American military superiority (Carr
2011). Brooks argues that a significant disparity in military capability is one of the reasons why the
United States does not immediately need to substantially increase its military efforts in response to
7 In the Introduction of The Trump Administration’s 2018 National Security Strategy the administration articulates that renewed competition with China and Russia “require the United States to rethink the policies of the last two decades” (2018 NSS: 3)
27
China’s economic growth (Brooks et al. 2012). Interpretively, the China threat does not
contemporarily require the United States to develop capability and strategy outside of existing
deterrence.
Considering the observations made thus far on the United States, I predict a lower degree of
use on the dependent variable given that the United States is a democratic state who is militarily
superior to its primary geopolitical rival China. Beyond the implications that can be drawn from the
independent variables, the United States was coded as a medium-high use case on the dependent
variable based on the following observations: 1) There are no public examples of the United States
utilizing cyber capabilities whose explicit goal is strategic psychological manipulation, although the
United States has a history of using tactical psychological capabilities; and 2) The Trump
administration is embracing a cyber doctrine that creates a more aggressive American posture
toward information warfare and cyberspace more broadly.
The United States has utilized psychological operations and information warfare in a number
of capacities since WWII. During the Cold War, the United States adopted the use of information
warfare and tactical propaganda to counter the ideological threat of Communism that registered
below acceptable thresholds of escalation (Robinson et al. 2018). The core of this effort during the
Cold War was the 1953 creation of the United States Information Agency (USIA). USIA was
dedicated to characterizing American policy and ideology in a credible and appealing light to foreign
audiences until it was disbanded in 1999 (Robinson et al. 2018). During the both Iraq wars,
information operations were largely used in a tactical capacity to undermine the authority of specific
leaders and spread disinformation (Robinson et al. 2018). For example, the United States released
photographs of Saddam Hussein in 2003 that depicted him in a broken and disorderly condition so
as to undermine his support and lend credence to Coalition claims that he had been captured
(Robinson et al. 2018). Given these examples it is quite apparent that the United States is willing to
28
use information and psychological warfare tactics to achieve objectives. Despite obvious American
capability in this field, there are no contemporary reports of the United States using these
capabilities to target sovereign populations in a strategic capacity through cyberspace. On that basis
it is assessed that the United States does not meet the first set of criteria to be considered a high-use
case on the dependent variable.
American doctrine toward cyberspace has varied among Presidential administrations since
cyber became a concern of American national security. In 2009, Clarke & Knake made the case that
the Bush administration’s cyber posture was too offensive focused and needed to consider
hardening its cyber defenses (Clarke & Knake 2019). In taking stock of the Obama administration,
Clarke & Knake found that the United States had become too defensive focused in its cyber posture
and was not prioritizing a strong cyber deterrent to discourage actors from provoking cyber conflict
(Clarke & Knake 2019). After releasing the first National Cyber Strategy (NCS) in 15 years, the
Trump Administration is putting the United States on an increasingly offensive footing as it seeks to
reconceptualize how American doctrine incorporates cyber within grand strategy. Addressing cyber
more broadly, the 2018 NCS states: “Cyberspace will no longer be treated as a separate category of
policy or activity disjointed from other elements of national power” (2018 NCS: 20). Interestingly,
this policy shift is largely congruent with Russia’s view that cyberspace is a subcomponent to the
larger doctrine of information warfare rather than a discrete domain of conflict within itself (White
2018). On information warfare, the 2018 NCS stipulates that the United States will “expose and
counter the flood” of disinformation to “prevent the use of digital platforms for malign influence
operations while respecting civil rights and liberties” (2018 NCS: 21). The Trump Administration’s
embrace of a more pervasive cyber doctrine that promotes the ubiquity of cyber within the broader
American power arsenal shifts the United States’ cyber posture onto a more aggressive position.
29
A lack of attributable cases where the United States has engaged in strategic psychological
warfare implies that the United States should be characterized as a low-use case on the dependent
variable. However, the prevailing American cyber doctrine under the current administration and
numerous examples of psychological warfare being waged in the past disqualify the United States
from being strictly considered a low-use case. Therefore, to account for those disqualifying factors,
the United States requires the assignment as a medium-low use case on the dependent variable.
IV. Conclusion
Considering the comprehensive analysis that has been provided on all four cases, there are
specific results to consider on the validity of my proposed argument and model. First, the provided
case analyses substantiate the association between the two independent variables and the dependent
variable involved in this inquiry. Different scores on the independent variables resulted in unique
outcomes on the dependent variable: both nondemocratic and weaker military powers (Russia and
China) were proven to be associated with higher degrees of use on the dependent variable.
Moreover, the proposed argument that nondemocracy and weaker military power relative to a
primary geopolitical adversary are associated with higher degrees of use on the dependent variable
was proven to be true for the assessed population of cases. In applying these considerations to the
specific hypotheses proposed in sub-section ‘c’ of ‘Argument’, we are able to reject the null
hypothesis in both cases. H1 theorized the association of nondemocracies with higher degrees of use
while H2 theorized the association of weaker relative military power with higher degrees of use on
the dependent variable. Russia’s use and China’s explicit doctrinal embrace of strategic psychological
cyberwarfare validate such a revelation.
Beyond the results and implications that can be drawn within the confines of the presented
inquiry, the provided analysis of Russia, China, India, and the United States offers three comparative
30
insights on cyber capability and doctrine within the international system. First, India’s case disproves
the idea that the existence of a domestic economy with a considerably advanced information
technology sector is inherent to well-developed state cyberwarfare capability. According to the
World Bank, India is among the top 25 countries in the world for gross annual high-technology
exports: totaling $20.278B (USD) in 2018 (World Bank 2018). Yet, the analysis on India clearly
shows that its state cyber capability is considerably under developed. Second, a state’s cyber doctrine
is, among other ancillary factors, a product of historical and pragmatic decisions about the future of
information warfare. As evidenced by the Russian case, elements of Soviet statecraft continue to
dominate core aspects of its contemporary strategy toward deception and misinformation.
Pragmatically, China has chosen to facilitate mass schemes of cyber espionage to undermine
American military power by pursuing asymmetric advantages while also stealing intellectual property
to advance the greatest threat that China poses to American hegemony: its economic might. Both
historically and pragmatically, the Trump administration has chosen to reverse the complacency of
past administrations and confront the prevailing information warfare threat by endorsing a doctrine
that is increasingly symmetrical to its most concerning threats in Russia and China. Third, the
provided case analyses show that there is a disconnect between a cyber doctrine that is supportive of
using strategic psychological cyberwarfare capability and the actual deployment of those capabilities
in the international system. Both the United States’ and China’s case analyses demonstrated this
disconnect. Perhaps such a disconnect exists in specific cases because the actual process and
complexity behind using these kinds of cyber capabilities has not caught up to the more recent
development of doctrine that is supportive of its use.
Considering the results, there are several contributions that this inquiry makes that future
researchers can expand upon. First, this inquiry establishes grounds for desperately needed debate
on how comparative research in this field should be conducted and the general principles that
31
should be adhered to. To stimulate research on a specific set of capabilities based off of a limited
body of literature and scholarly agreement, this inquiry fused together previously isolated definitions
of concepts from military conflict to present and evaluate the existence of strategic psychological
cyberwarfare in the international system. The creation of this specific term will allow future scholars
to continue to map out and differentiate between separate categories of information warfare in
cyberspace. Additionally, this inquiry substantiated the association of two independent variables with
unique outcomes on a case’s use of strategic psychological cyberwarfare. Future scholars should
consider additional variables that can further explain the variance between different gradations of
higher or lower use. Second, this inquiry demonstrated the ability to conduct comprehensive
qualitative analysis. Now that the theoretical groundwork of research design in this field has been
established, future scholars should consider constructing quantitative research designs to analyze a
greater population of cases and use statistical inference for further authentication of substantive
observations. Lastly, this inquiry demonstrated the association of weaker relative military power via
material resources with lower degrees of strategic psychological cyberwarfare activity. Future
scholars should consider including additional measures of relative military power like the
comparison of force structures or an analysis of power as outcomes between cases.
In addition to the contributions that are valuable to future research, this inquiry provides
several points of value for policymakers who need to understand the rapidly developing and chaotic
intersection of information warfare and cyberspace. Policymakers in the national security space have
finite resources and attention to allocate toward identifying the threat landscape in any domain. In
cyberspace, it is increasingly difficult for policymakers to navigate threat assessment because threats
materialize outside of physical space and this creates an overwhelming sense of uncertainty. This
inquiry gives policymakers two general characteristics to guide their threat assessments. The first,
nondemocratic states are more likely to use and develop strategic psychological cyberwarfare
32
capability and should therefore receive greater attention paid when forming threat assessments.
Second, relatively weaker military powers are more likely to use strategic psychological cyberwarfare
out of a need to establish asymmetric advantages and should therefore receive increasing scrutiny
when conducting threat assessments. Broadly, the results of this inquiry allow policymakers to
stratify the assessment of their information warfare and cyber threat landscapes to allocate the
proper amount of resources toward legitimate threats.
The threat that information warfare poses to national security and the integrity of democratic
processes continues to mount. Russian troll farms demonstrated the ability to create online
controversy that materialized to civilian unrest in physical space in Estonia in 2008 and even in the
United States during the 2016 presidential election. Given continued time and ability to refine these
capabilities, the rapid global progression of information technology will have a compounding effect
on how powerful strategic psychological cyberwarfare is in creating corresponding effects in physical
space. Just weeks ago, the US House Intelligence Committee received a classified briefing from
intelligence officials indicating that Russia is planning to interfere with the 2020 US presidential
election8. Even though we are in the mere infancy of the digital age, there is ample evidence that
information warfare in cyberspace has the capacity to cause a significant disturbance to the
international community. State policy makers in and outside the national security space need to
recognize the severity of the threat that information warfare in cyberspace poses and stimulate the
growth of research in this field before our understanding of the threat cannot catch up to its
magnitude and complexity.
8 See CBS News Article: https://www.cbsnews.com/news/russian-election-interference-intelligence-officials-warned-lawmakers-2020/
33
References (APSA)
Allen-Ebrahimian, Bethany. 2020. “China Steps up Political Interference Ahead of Taiwan’s Elections.” Axios. https://www.axios.com/china-disinformation-taiwan-presidential-election-0f66ae16-0140-4c84-a833-bf5653cecf85.html (February 24, 2020).
Beckley, Michael. 2018. “The Power of Nations: Measuring What Matters.” International
Security 43(2): 7–44. Brooks, Stephen G., G. John Ikenberry, and William C. Wohlforth. 2012. “Don’t Come
Home, America: The Case against Retrenchment.” International Security 37(3): 7–51. Carafano, James Jay. 2014. “Measuring Military Power.” Strategic Studies Quarterly 8(3): 11–18. Carr, Jeffrey. 2011. Inside Cyber Warfare: Mapping the Cyber Underworld. 2nd ed. O’Reilly Media,
Inc. Chawla, Gunjan. 2019. “India’s New Defence Cyber Agency—II: Balancing Constitutional
Constraints and Covert Ops?” Medianama. https://www.medianama.com/2019/10/223-india-defence-cyber-agency-part-2/ (February 25, 2020).
Cheibub, José Antonio, Jennifer Gandhi, and James Raymond Vreeland. 2010. “Democracy
and Dictatorship Revisited.” Public Choice 143(1/2): 67–101. Clarke, Richard A., and Robert K. Knake. 2010. Cyber War: The Next Threat to National Security
and What To Do About It. Harper Collins. Clarke, Richard A., and Robert K. Knake. 2019. The Fifth Domain: Defending Our Country, Our
Companies, and Ourselves in the Age of Cyber Threats. Penguin Press. Connell, Michael, and Sarah Vogler. 2016. Russia’s Approach to Cyber Warfare. Center for Naval
Analyses: US Office of Chief of Naval Operations. https://apps.dtic.mil/dtic/tr/fulltext/u2/1019062.pdf.
Cordes, Nancy et al. 2020. “Intel Officials Warned Lawmakers Russia Trying to Interfere in
2020 Election.” CBS News. https://www.cbsnews.com/news/russian-election-interference-intelligence-officials-warned-lawmakers-2020/ (March 1, 2020).
Cordesman, Anthony H. 2019. An Open Strategic Challenge to the United States, But One Which
Does Not Have to Lead to Conflict. Center for Strategic & International Studies. https://www.csis.org/analysis/chinas-new-2019-defense-white-paper.
34
Correlates of War. 2017. “National Material Capabilities (v5.0).” https://correlatesofwar.org/data-sets/national-material-capabilities (January 31, 2020).
Daniels, Jeff. 2017. “Chinese Theft of Sensitive US Military Technology Is Still a ‘huge
Problem,’ Says Defense Analyst.” CNBC. https://www.cnbc.com/2017/11/08/chinese-theft-of-sensitive-us-military-technology-still-huge-problem.html (March 4, 2020).
Defense Intelligence Agency. 2017. Russia Military Power | Building a Military to Support Great
Power Ambitions. US Department of Defense. https://permanent.access.gpo.gov/gpo82226/Russia%20Military%20Power%20Report%202017.pdf.
Friedberg, Aaron L. 1987. “The Assessment of Military Power: A Review Essay” eds. Tom
Gervasi, William T. Lee, and Richard F. Staar. International Security 12(3): 190–202. Guo, Gang. 2007. “Retrospective Economic Accountability under Authoritarianism:
Evidence from China.” Political Research Quarterly 60(3): 378–90. Hathaway, Melissa et al. 2016. India’s Cyber Readiness At A Glance. Potomac Institute for
Policy Studies. Horley, Tim, Anne Meng, and Mila Versteeg. 2020. “The World Is Experiencing a New
Form of Autocracy.” The Atlantic. https://www.theatlantic.com/ideas/archive/2020/03/new-authoritarianism/607045/ (March 5, 2020).
Iqbal, Muhammed Zubair, and Musarat Amin. 2016. “Vacillation between Soft and Hard
Balancing: China-Pakistan versus Indo-US Stategies.” Strategic Studies 36(1): 74–91. Kello, Lucas. 2013. “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft.”
International Security 38(2): 7–40. Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Security Studies 22(3): 365–
404. Linebarger, Paul M. A. 2015. Psychological Warfare. San Francisco, California: Hauraki
Publishing. http://ebookcentral.proquest.com/lib/ucb/detail.action?docID=4807757 (October 25, 2019).
Lukinova, Evgeniya, Myagkov Mikhail, and Ordeshook Peter C. 2011. “Metastasised Fraud
in Russia’s 2008 Presidential Election.” Europe-Asia Studies 63(4): 603–21.
35
McCombie, Stephen, Allon J. Uhlmann, and Sarah Morrison. 2020. “The US 2016 Presidential Election & Russia’s Troll Farms.” Intelligence and National Security 35(1): 95–114.
Mearsheimer, John J. 2001. The Tragedy of Great Power Politics. W. W. Norton & Company.
https://www.amazon.com/Tragedy-Great-Power-Politics-Updated/dp/0393349276 (February 26, 2020).
Mehta, Pratap Bhanu. 2012. “State and Democracy in India.” Polish Sociological Review 2(178):
203–25. Office of the Secretary of Defense. 2019. Annual Report to Congress: Military and Security
Developments Involving the People’s Republic of China 2019. US Department of Defense. https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdf.
Pashentsev, Evgeny. 2019. “Destabilization of Unstable Dynamic Social Equilibriums
Through High-Tech Strategic Psychological Warfare.” In International Conference on Cyber Warfare and Security, Reading, United Kingdom: Academic Conferences International Limited, 322-328,IX. http://search.proquest.com/docview/2198532072/abstract/614A56FB39A40E4PQ/1 (October 22, 2019).
Robinson, Linda et al. 2018. Modern Political Warfare: Current Practices and Possible Responses.
RAND Corporation. Research Report. https://www.rand.org/pubs/research_reports/RR1772.html (January 13, 2020).
Rosen, Rebecca J. 2011. “So, Was Facebook Responsible for the Arab Spring After All?” The
Atlantic. https://www.theatlantic.com/technology/archive/2011/09/so-was-facebook-responsible-for-the-arab-spring-after-all/244314/ (February 29, 2020).
Schreck, Carl. 2018. “Seeing ‘Churov’s Saw’: Russian Researcher Says Putin May Have
Received 10 Million Fraudulent Votes.” Radio Free Europe. https://www.rferl.org/a/russia-election-fraud-10-million-votes-researcher-churovs-saw-putin/29111554.html (January 30, 2020).
Shapiro, Robert Y. 2011. “Public Opinion and American Democracy.” The Public Opinion
Quarterly 75(5): 982–1017. Shigong, Jiang. 2010. “Written and Unwritten Constitutions: A New Approach to the Study
of Constitutional Government in China.” Modern China 36(1): 12–46.
36
Trump, Donald J. 2017. National Security Strategy of the United States of America. Washington D.C.: The White House. https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.
Trump, Donald J. 2018. National Cyber Strategy of the United States of America. Washington D.C.:
The White House. https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf.
Walton, Greg et al. 2009. Tracking GhostNet: Investigating a Cyber Espionage Network. Munke
Center for International Studies: University of Toronto. http://www.nartv.org/mirror/ghostnet.pdf. Waltzman, Rand. 2017. (United States Senate) The Weaponization of Information: The Need for
Cognitive Security. RAND Corporation. https://www.rand.org/pubs/testimonies/CT473.html (February 25, 2020).
White, Sarah P. 2018. Understanding Cyberwarfare: Lessons from the Russia-Georgia War. Modern
Warfare Institute at West Point. https://mwi.usma.edu/understanding-cyberwarfare-lessons-russia-georgia-war/ (November 6, 2019).
World Bank. “GDP per Capita (Current US$).” The World Bank.
https://data.worldbank.org/indicator/NY.GDP.PCAP.CD (January 31, 2020). World Bank. “High-Technology Exports (Current US$).” The World Bank.
https://data.worldbank.org/indicator/TX.VAL.TECH.CD (March 5, 2020).