Information Warfare: Case Studies from the 21st Century

36
1 Information Warfare: Case Studies from the 21 st Century Thesis by Jacob Andrew Clark Spring 2020 University of Colorado Boulder Department of Political Science 2:00 PM March 10, 2020 in Ketchum 371 Committee: Dr. David Bearce (PSCI, Advisor), Dr. Janet Donavan (PSCI), Professor Orly Hersh (WRTG)

Transcript of Information Warfare: Case Studies from the 21st Century

Page 1: Information Warfare: Case Studies from the 21st Century

1

Information Warfare: Case Studies from the 21st Century

Thesis by Jacob Andrew Clark

Spring 2020

University of Colorado Boulder

Department of Political Science

2:00 PM March 10, 2020 in Ketchum 371

Committee: Dr. David Bearce (PSCI, Advisor), Dr. Janet Donavan (PSCI), Professor Orly Hersh

(WRTG)

Page 2: Information Warfare: Case Studies from the 21st Century

2

I. Introduction

Over the past two decades the expansion of cyberspace as a concern of national security and

the varying tactics of information warfare that states have developed are increasingly elevating the

significance of the question: What factors explain the variability of the use of strategic psychological

cyberwarfare in the international system? The relevancy of this question is constantly increasing due

to the rapid progression of both the Internet’s technological complexity and its capacity to exercise

great influence over societies. The Arab Spring, which saw the overthrow of the brutal thirty-year

Mubarak regime in Egypt, was greatly influenced by the Egyptian protestor’s ability to share

information and organize themselves over Facebook1. The integrity of democratic elections have

been thrown into question after Russia demonstrated the ability to engineer fake online communities

to influence and enflame the public debate of the 2016 US Presidential Election. As society becomes

increasingly reliant upon the Internet and other technology, the magnitude of information warfare

and how the Internet can be used by state actors to manipulate and deceive is only going to become

more pronounced.

Despite the relevance of such an inquiry, there is a lack of scholarly attention within the

national security space devoted to assessing the factors that could explain the varying strategies of

information warfare utilized on the international scene. The only study that even remotely addresses

this issue is a 2018 RAND study2 that instead focuses more broadly on the current and historical

practices of political warfare in the United States, Russia, Iran, and ISIS. The lack of scholarly focus

on information warfare is likely a product of an overall dearth of studies devoted to the cyber threat

1 Rebbeca Rosen of The Atlantic has an interesting piece in 2011 that discusses Facebook’s effect on the Arab Spring: Rosen, Rebecca J. 2011. “So, Was Facebook Responsible for the Arab Spring After All?” The Atlantic. https://www.theatlantic.com/technology/archive/2011/09/so-was-facebook-responsible-for-the-arab-spring-after-all/244314/ (February 29, 2020). 2 Robinson, Linda et al. 2018. “Modern Political Warfare: Current Practices and Possible Responses.” https://www.rand.org/pubs/research_reports/RR1772.html (January 13, 2020).

Page 3: Information Warfare: Case Studies from the 21st Century

3

(Kello 2013). Most of the already-limited scholarship on cyberspace has focused on the CNA

(computer network attack) aspects of cyberwarfare rather than the less-exciting and more complex

considerations of how information in cyberspace can be manipulated for psychological effects that

translate into action outside of the cyber realm.

In the following paper I will examine two independent variables – regime type and relative

military power – in a comparative case study on Russia, the People’s Republic of China, India, and the

United States that provides an explanation to this under-studied topic. I propose that the variability

in the use of strategic psychological cyberwarfare among the international system is explained by a

state’s regime type and its military power relative to its primary geopolitical rival. A state’s regime

type influences how foreign policy is developed and whether or not the opinions of public

constituencies are influential over its development. The assessment of military power relative to a

primary rival guides strategic security planning and the tools of national power that a state chooses

to exercise. Ultimately, I argue that nondemocratic states who are militarily weaker relative to their

primary geopolitical rival are more likely to utilize high degrees of strategic psychological

cyberwarfare.

In the first section of this paper, ‘Argument,’ I elaborate on the tenants of my argument and

hypotheses within the context of both independent variables in my proposed model. In the ‘Testing’

section I will clarify how variables in the model are coded, establish case selection criteria, and layout

the predictions of my argument in Table 1.1. After Table 1.1 and before the case analysis sections I

clarify the conceptualization and operationalization of the dependent variable within the model in

the section ‘Degrees of Strategic Psychological Cyberwarfare.’ After the design of this study and my

proposed argument has been established, I will substantiate all assigned variable scores in Table 1.1

on a case-by-case basis beginning with Russia. Lastly, in the ‘Conclusion’ section I will examine the

validity of my argument based on the results from case analyses, discuss the original value provided

Page 4: Information Warfare: Case Studies from the 21st Century

4

by this inquiry, and attempt to stimulate further research on this topic by discussing questions that

remain unanswered.

II. Argument

In the following section I will elaborate on the central argument of this inquiry:

Nondemocratic states that are militarily weaker vis-à-vis their primary geopolitical rival are more

likely to use higher degrees of strategic psychological warfare tactics in cyberspace, or strategic

psychological cyberwarfare.

a. Regime Type

Simply put, regime type conceptually refers to how “democratic” as a state is. There are a

number of disagreements among scholars as to how to “democratic-ness” is empirically evaluated,

but there is general agreement on several simple metrics:

• Regular and free elections in which more than one party participates

• A popularly elected legislature

• Consistently-applied rules regarding the alternation of power

There are specific intricacies of regime classification that are the subject of contemporary

debate, but for the purposes of this argument states are only democratic if they meet Cheibub,

Gandhi, and Vreeland’s3 minimalist criteria, as noted above.

Regime type is a significant variable in this argument because classifications of regime type

determines the formulation of foreign policy and the development of statecraft. Democratic states

must engage with the concerns of their citizens in order to formulate and implement policy in both

3 Cheibub, José Antonio, Jennifer Gandhi, and James Raymond Vreeland. 2010. “Democracy and Dictatorship Revisited.” Public Choice 143(1/2): 67–101.

Page 5: Information Warfare: Case Studies from the 21st Century

5

the domestic and foreign realms. For example, when it became public that the CIA was using

“enhanced interrogation techniques” to compel enemy combatants in the Middle East to give up

intelligence, a fierce American public backlash was a significant catalyst for ceasing the use of such a

tactic. Nondemocratic states do not have the same obstacle when it comes to policy creation, as they

can and do disregard their citizenry by implementing policies that are often antithetical to the

national will.

Given that classifications of regime type contain implications as to how policy is formulated,

I propose that nondemocratic states are more likely to engage in higher degrees of strategic

psychological cyberwarfare. I predict that they do so for the purposes of favorable foreign policy

outcomes without the use of military force. Democratic states are unable to pursue the use of

strategic psychological cyberwarfare because citizens of democracies are not supportive of such a

policy out of fear that these capabilities will be used internally.

b. Relative Military vis-à-vis Primary Rival

Relative military power refers to the military power of a given state compared to that of another.

There is an emphasis on comparison because most scholars agree that absolute measures do not

provide a logical basis to make judgements about a state’s military power (Friedberg 1987). In

addition, there is significant disagreement among scholars as to which quantitative and qualitative

metrics should be included in a comparative military power analysis or if military power is capable of

being measured at all. Regardless, one school of thought believes that a nation’s power derives from

the resources at its disposal (both military and civilian), and the efficiency by which the state utilizes

those resources. This premise relies primarily on quantitative metrics like the Composite Index of

National Capability, or CINC (Correlates of War 2017), GDP per capita (Beckley 2018), and force

structure (Carafano 2014). Another school of thought believes that a nation’s power is derived from

Page 6: Information Warfare: Case Studies from the 21st Century

6

historical outcomes. This theory relies primarily on qualitative measures such as strategy, the

observation of how international events play out, and other interpretive observations on a state’s

hard and soft power (Beckley 2018). Both schools of thought present valid reasoning as to why

resources or outcomes are the best measures of military power, but the qualitative judgement of

international events is outside the scope of this inquiry. Therefore, relative military power will be

recognized in terms of material resource power: CINC and GDP per capita.

Relative military power is a significant independent variable in this theory because the results

of a relative military power analysis will guide a state’s strategic military planning. States that observe

their military power to be less than that of their primary geopolitical rival are inclined to develop

strategic and tactical asymmetric advantages over its militarily-superior rival. Vehicles of asymmetric

warfare have taken various forms throughout history, but the advent of cyberspace as a domain of

military conflict has provided an entirely new opportunity for states to devise asymmetric capabilities

(Clarke & Knake 2019). At the modern-day strategic level, some states with the necessary resources

have opted for the asymmetric strategy of incorporating concepts of psychological warfare through

cyberspace. The purpose of this strategy is primarily to destabilize an adversary’s domestic politics to

achieve foreign policy victories against a superior military without the use of force (Pashentev 2019).

Given the fact that relative military power has implications for strategic planning, I propose

that militarily weaker states (vis-à-vis their primary rival) are more likely to incorporate strategic

psychological cyberwarfare in their asymmetric arsenal. Moreover, states that are militarily stronger

than their primary rival do not see strategic psychological cyberwarfare as a worthwhile investment

and practice. Instead, militarily stronger states focus on hardening tactical advantages and keeping

existing conventional and nuclear deterrence intact.

Page 7: Information Warfare: Case Studies from the 21st Century

7

c. Hypotheses

Given the two separate arguments that have been provided in this section, the following

hypotheses are proposed:

H1 – Nondemocratic states are associated with a higher degree of use of strategic

psychological cyberwarfare capabilities.

H2 – States that are militarily weaker to their primary rival are associated with a

higher degree of use of strategic psychological cyberwarfare capabilities.

III. Testing

To evaluate the proposed hypotheses and argument, I will conduct a comparative case study

on the following four states: the Russian Federation, People’s Republic of China, India, and the

United States of America. A comparative case study is the ideal method of analysis for this inquiry

because the variance in strategic psychological cyberwarfare use must be evaluated empirically, and a

case study approach provides the most logical and comprehensive way to assess the questioned

variance on the international stage.

I chose the four presented cases based on two main criteria. First, in order for states to be

eligible for selection in this study the state must have an existing infrastructure and technological

modernization requirement. Psychological cyberwarfare operations require a significant amount of

funding, existing defense infrastructure and modernized technological assets and capabilitie. Hence,

states eligible for selection in this inquiry must already have modernized technological sectors of the

economy capable of producing the cyber capabilities and existing defense infrastructure needed to

perpetuate vast schemes of psychological cyber warfare. Somalia, for example, would not be a

country worthy of analysis in this research because Somalia does not have the technological or

military capability necessary to deploy and facilitate strategic psychological cyberwarfare. Given such

Page 8: Information Warfare: Case Studies from the 21st Century

8

considerations, the potential sample size of states that meet this requirement and are worthy of

analysis is rather small.

The second requirement imposed on case selection is based on the need for variation

amongcases within each independent variable. For regime type, both a democratic and nondemocratic

case are needed. Further, different gradients and iterations of democracies and nondemocracies

should also be considered. As a result, India and the United States were selected as democracies,

while China and Russia were chosen as nondemocracies. For relative military rival, both a state that is

militarily superior and a state that is militarily weaker vis-à-vis its primary rival are required.

Additionally, states that are under different national security considerations as militarily stronger or

weaker powers should be considered. Hence, India is included as a militarily superior state because

its national security concerns are starkly different than the United States’ as a global military

superpower. Similarly, China was included as a military weaker state because its national security

concerns are much different as a rising power than Russia’s as a relatively declining power.

As evidenced by Table 1.1, both independent variables are collinearly associated in that both

nondemocratic cases are militarily weaker powers and both democratic cases are militarily superior

powers vis-à-vis their primary geopolitical rival. I predict that collinearity exists for two reasons.

First, the existing infrastructure and technological modernization requirement imposed on case

selection relegates potential analysis to a small sample of powerful states on the international scene.

Second, that within this small sample size of powerful states, there is overlap in primary geopolitical

rivals among cases. Specifically, the People’s Republic of China and Russia identify the United States

as their primary geopolitical rival. Consequentially, both states are individually weaker militarily to

their shared primary geopolitical rival.

Page 9: Information Warfare: Case Studies from the 21st Century

9

a. Table 1.1

Case

IV1 ‘Regime Type’

IV2

‘Relative Military Power’

DV ‘Psychological Cyberwarfare’

Russia Nondemocracy Less than Primary Rival (USA)

High Degree of Use

People’s Republic of China

Nondemocracy Less than Primary Rival (USA)

Medium-High Degree of Use

India Democracy Greater than Primary Rival

(PAK)

Low Degree of Use

United States of America

Democracy Greater than Primary Rival

(PRC)

Medium-Low Degree of Use

b. Degrees of Strategic Psychological Cyberwarfare

The dependent variable in this research represents the variability in the degrees of strategic

psychological cyberwarfare use within the international system. Specifically, the dependent variable is

a 4-tier categorical variable (High, Medium-High, Medium-Low, Low) that measures the degree to

which a case uses strategic psychological cyberwarfare capabilities. In addition to translating the

implications of scores on independent variables, degrees of psychological cyberwarfare use will be

predicted based on two observations that will be discussed in the following section. Before the

criteria can be established for evaluation on the dependent variable, I will clarify the term ‘strategic

psychological cyberwarfare’.

Strategic psychological cyberwarfare is a term that is fused together from several disciplines

within the study of military conflict. The first component is the concept of psychological warfare,

which has a long history within military strategy, including writings by such famous authors as Sun

Page 10: Information Warfare: Case Studies from the 21st Century

10

Tzu4. Psychological warfare is the process of using communications designed to manipulate the

minds and actions of specific entities for the purpose of winning military victories without the use of

force (Linebarger 2015). At the strategic level, psychological operations target a specific country or

the international system as a whole to influence poor decision making and promote action to the

attacker’s benefit (Pashentev 2019). The second component is the concept of cyberwarfare.

Cyberwarfare, as an academic study within the context of national security, is in its infancy and there

are no broadly recognized definitions. Regardless, Clarke and Knake describe it as follows: “Actions

by a nation state to penetrate another nation’s computers or networks for the purposes of causing

damage or disruption” (Clarke & Knake 2010). Fundamentally, the elements of strategic

psychological cyberwarfare are subcomponents in the larger concept of information warfare. Former

US DARPA Program Manager Rand Waltzman defines information warfare as the following:

“Information operations and warfare, also known as influence operations, includes the collection of

tactical information about an adversary as well as the dissemination of propaganda in pursuit of a

competitive advantage over an opponent” (Waltzman 2017: 1). Considered as a whole, the term

strategic psychological cyberwarfare refers to the use of manipulative communications through

cyberspace targeted at a specific country for the purpose of stimulating poor decision making and

internal discord on behalf of the attacked that is beneficial to the attacker.

Now that the conceptualization of the dependent variable has been clarified, the criteria for

evaluation on the dependent variable must be established. The first criteria, and most obvious, is to

assess if a case has used or is currently using strategic psychological cyberwarfare capabilities. Are

there examples today, or in the recent past, of a case using strategic psychological cyberwarfare? If

so, the facts of the example will be considered for implications on the degree of strategic

4 In the first chapter of Sun Tzu’s The Art of War, Tzu describes “All warfare is based on deception” (18). See MIT’s Online Classics Archive for a translation of The Art of War: http://classics.mit.edu/Tzu/artwar.html

Page 11: Information Warfare: Case Studies from the 21st Century

11

psychological cyberwarfare use. Cases with high degrees of use should contain examples where it is

abundantly clear that strategic psychological manipulation was the goal of a specific action and

cyberspace was the primary vehicle of delivery. If the goal of an example attributed to a case is

unclear or cyberspace wasn’t the primary vehicle of the example, then a case would receive a lower

degree of use that is consistent with the facts of the attributed example.

The second criteria for evaluation on the dependent variable is to assess if any implications

from military doctrine can be drawn as to a case’s use of strategic psychological cyberwarfare.

Technological advancements in conventional, unconventional, and nuclear forces over the last 50

years have forced the majority of powerful states on the international scene to revise their military

doctrine to incorporate emerging technologies and plan for conflict of the future. Hence, an

interpretative analysis of modern military doctrine can provide a basis to draw conclusions about a

case’s use of strategic psychological cyberwarfare capabilities. Within this criterion, high degrees of

use would be attributed to a case whose military doctrine displays an embrace of strategic

psychological cyberwarfare capability because of its asymmetric potential. If implications from a

case’s military doctrine are insufficient, then a case will receive a lower designation of use that is

consistent with the implications that can be sufficiently drawn from its military doctrine.

i. Russia

As clearly depicted in Table 1.1, Russia is both a nondemocratic state and a weaker military

power relative to its primary geopolitical rival in the United States. Since the beginning of the 21st

century, Russia has developed and utilized considerable cyber capability in both tactical and strategic

contexts. Tactically, Russia coordinated targeted attacks on Georgia’s government communication

infrastructure with kinetic Russian military operations during the 2008 Russia-Georgia War (White

2018). In December of 2015, Russia performed the world’s first cyberattack on another country’s

Page 12: Information Warfare: Case Studies from the 21st Century

12

power grid when it hacked into three separate power distribution centers in Western Ukraine that

affected more than 220,000 people (Connell & Vogler 2016). Strategically, Russia has sought to

affirm its regional and global influence by using cyberspace as a tool to spread disinformation and

foment internal discord within an adversarial state. In 2007, Russia targeted specific distributed

denial of service (DDoS) attacks on critical Estonian websites after the Estonian government

announced the planned removal of a Soviet-era statue in early 2007. Upon the removal of the statue

massive demonstrations ensued that eventually turned violent and killed one person(Connell &

Vogler 2016). Most notably, Russia perpetrated the most comprehensive act of strategic

psychological cyberwarfare to date when it engaged in interference with the 2016 United States

presidential election. After discussing Russian’s regime type and relative military power, I will

provide an in-depth analysis of Russia’s 2016 US election interference as a clear example of the fact

that Russia utilizes a high degree of strategic psychological cyberwarfare.

For the purposes of this inquiry, an in-depth discussion of Russian institutions is not

warranted. Frankly, there aren’t many political scientists that need convincing that Russia does not

meet modern standards to be classified as a democracy. An accredited history of election fraud and

blatant suppression of opposing political parties is enough by any scholar’s scale to disqualify Russia

as a democracy. Briefly, I will discuss how these two features of “Russian democracy” specifically

violate the recognized standards of democracy found in Cheibub, Ghandi, and Vreeland.

Beginning with Vladimir Putin’s first electoral victory in 2000 and until his most recent

victory in 2018, there are serious questions as to the legitimacy of Russian elections. For example,

credible international organizations like the Organization for Security and Cooperation in Europe

have never been allowed to observe an election in Russia to the capacity necessary to draw valid

conclusions about legitimacy (Lukinova et al 2013). Hence, the research of independent investigators

such as Sergei Shpilkin, a well-known Russian elections analyst, are among the most credible results

Page 13: Information Warfare: Case Studies from the 21st Century

13

to consider. Using data from Russia’s Central Election Commission, Shpilkin noticed more than 30

notable falsifications in specific voting precincts during Putin’s 2012 electoral victory (Schreck 2018).

Shpilkin has raised similar concerns about Putin’s victory in 2004 and Dmitri Medvedev’s victory in

2008. Beyond voting fraud, opposing political parties have been brutally suppressed in Russia.

Mikhail Kasyanov, a fierce critic of Putin and former prime minister, was removed from the ballot

for conspicuous reasons in 2008 (Lukinova et al. 2011) to pave the way for Putin’s placeholder,

Medvedev5. The Kremlin has denied all such allegations and decried them as Western propaganda,

yet it has not presented convincing evidence to the contrary. Given such considerations, Russian

elections are not deemed to be legitimate and hence do not meet the most basic criteria of

democracy: free and fair elections in which opposing parties are not deliberately excluded from

participating.

Much like conceptualizing Russia as a nondemocracy, it is relatively obvious to most scholars

that Russia considers the United States to be its primary geopolitical rival: "Moscow undoubtedly

views the United States and its NATO partners as the principal threat to Russian security, its geo-

political ambitions, and most importantly, the Kremlin's continued hold on power" (US Office of

the Secretary of Defense 2017: 15). On that basis, I will discuss Russia’s military power relative to

the United States.

As established earlier, two indicators will be used to assess power in terms of material

resources. The first is CINC, an index that contains data from 1816-2012 on total population, urban

population, iron and steel production, energy consumption, military personnel, and military

expenditure. CINC aggregates all six individual indicators into one value and reflects an average of a

5 Tim Horley, Anne Meng, and Mila Versteeg in partnership with the National Constitution Center published a section of the project “The Battle for Constitution” in The Atlantic that details how the alternation of power from Putin to Medvedev was exemplary of one of five common ways that modern autocrats have circumvented constitutional limits on their power: https://www.theatlantic.com/ideas/archive/2020/03/new-authoritarianism/607045/

Page 14: Information Warfare: Case Studies from the 21st Century

14

state’s share of the total capability in the international system that year. Using data from 2012, Russia

received a CINC score of 0.0408 to the United States’ 0.1393. This indicates that Russia had an

average access to just 4% of capability within the system in 2012 while the United States had access

to triple that at nearly 14%. There are scholars, such as Michael Beckley, who disagree with the

validity of CINC because densely populated states receive inflated capability scores, hence the

second indicator is GDP per capita, which will also be used as a power index to balance out possible

CINC inflation from population (Beckley 2018). Russia’s GDP per capita in 2018 was just

$11,288.87 (USD) while the United States’ was more than five times that at $64,794.58 (USD).

Given these two indicators, Russia is at a clear material power disadvantage to the United States and

we can conclude that Russia is militarily inferior to the United States.

Given the analysis that has been provided on Russia thus far, my argument predicts that

Russia would exercise higher degrees of psychological cyberwarfare capability. As a nondemocracy

that is militarily inferior to its primary rival, Russia has both the need to establish asymmetric

advantages and the capacity to do so without concern to the worries of its citizens. Beyond the

observations of my argument, Russia was coded as a high degree of use on the independent variable

for two specific reasons: 1) Specific attacks on the United States, and 2) The embrace of information

warfare as an asymmetric tactic within Russian military doctrine.

Arguably the foremost example of strategic psychological cyberwarfare is the extent to which

Russia interfered with the 2016 United States presidential election. The Russian government created

an entire government agency, the Internet Research Agency (IRA), to create troll farms on US

servers for various social media sites that specifically targeted controversial groups and topics for

exploitation within public discourse (McCombie et al. 2020). Troll farms are organized groups on

the Internet that congregate for the purpose of influencing public opinion by spreading deliberately

false information. The IRA created these entities on US servers to buy advertising space, organize

Page 15: Information Warfare: Case Studies from the 21st Century

15

online and real-world rallies, and pit opposing opinions of a controversial topic against each other

(McCombie et al. 2020). While the overall electoral impact was minimal, the real effect of the

interference was the delegitimization of the US electoral system and the perception that Russia had

significant influence over American decision making. The results were a number of grand jury

indictments, a two-year special counsel investigation, and immeasurable damage to the American

political ecosystem that has only become increasingly partisan ever since. Russia’s characteristic

denial of this covert action, despite being confirmed by every US intelligence agency6, only furthered

the qualitative impact of Russian influence by creating additional confusion and public mistrust in

American institutions. Despite being one example in a long list of Russian/Soviet attempts to

subvert American public authority via the electoral system, the use of troll farms by the IRA during

the 2016 US presidential election undoubtedly rises to the required threshold for consideration as a

high use case within the first criterion of evaluation on the dependent variable.

Like many states since the dawn of 21st century, Russia has incorporated the use of emerging

technologies like cyber within military doctrine. In fact, Aleksandr Burutin, while he was the Deputy

Chief of the General Staff to the Russian president, gave a speech in February of 2008 titled “Wars

of the Future Will Be Information Wars” (Carr 2011). Unlike the United States, Russia has come to

view cyber as a single tool within the broader category of information warfare that is exercised

across all spectrums of warfare rather than a dimension of conflict in and of itself (White 2018). This

view is predicated on the idea that the Russian government views information itself as a medium to

shape individual and collective perceptions, and cyber is tool to facilitate information superiority so

as to control the narrative in a given situation (White 2018). Russian cyber activities during the 2008

Russia-Georgia War solidify this doctrine in practice. Through Russia’s access to an army of civilian

6 See the US Senate Select Committee on Intelligence’s investigation into Russian interference in the 2016 Election: https://www.intelligence.senate.gov/publications/committee-findings-2017-intelligence-community-assessment

Page 16: Information Warfare: Case Studies from the 21st Century

16

hackers, official Georgian government websites and communications infrastructures experienced

massive DDoS attacks that cut off their ability to communicate during the early stages of the

conflict. This gave the Russian government the ability to shape the international narrative during

that crucial juncture of the conflict and allow them to exercise qualitative superiority over the

situation (White 2018). In addition to its cyber doctrine in practice, the clear Russian embrace of

cyber as a medium of psychological manipulation and narrative control assuredly rises to the

necessary threshold for assessment as a high use case on the dependent variable.

Based on a widely-attributed example of strategic psychological cyberwarfare capability use

and the explicit embrace of cyber as an asymmetric tool to control operational and strategic

narratives via psychological manipulation, Russia is patently assigned a high degree of use on the

dependent variable.

ii. China

The People’s Republic of China (PRC) is a nondemocratic and militarily weaker power

relative to its primary geopolitical in the United States. As one of the prominent cyber powers on the

international stage, China has created and continues to operate the world’s most pervasive campaign

of cyber espionage (Carr 2011, Daniels 2017). China acknowledges the technical superiority of the

United States, and accordingly China has embraced cyberspace as a medium to make up for that

technological gap by stealing intellectual property (Carr 2011). In 2009, the Munke Center for

International Studies in Toronto released a report that attributed Chinese state hackers to malware

that was actively saving, storing, and transmitting data placed on government information

technology infrastructures in India, Taiwan, Tibet, Japan, and the United States among others back

to Chinese servers (Walton et al. 2009). To this day, China continues to penetrate the networks of

US defense agencies and contractors to steal intellectual property for technological and economic

Page 17: Information Warfare: Case Studies from the 21st Century

17

gain (Carr 2011, Daniels 2017). Despite the obvious employment of considerable cyber power, the

absence of verified examples where strategic psychological cyberwarfare was utilized complicate the

strict categorization of China as a high use case on the dependent variable. Regardless, after

assessing Chinese regime type and relative military power, I will discuss how China’s embrace of an

aggressive cyber doctrine that is conducive to using strategic psychological cyberwarfare

substantiates the argument that China utilizes a medium-high degree of strategic psychological

cyberwarfare capability.

Similar to regime type in the Russian context, the vast majority of political scientists do not

need significant persuasion that China is a nondemocracy. In fact, the PRC is the antithesis of a

democratic state by modern regime classification standards. Among many others, a one-party

political system and the absence of democratic elections are two fundamental features of Chinese

politics that classify the PRC as a nondemocracy.

While there are several local political parties throughout China, all parties are kept under the

leadership and supremacy of the singular national party, the Chinese Communist Party or CCP

(Shigong 2010). The supremacy of the CCP over all other parties is the fundamental core of the

Chinese government largely because the CCP was the body that prevailed in the Chinese

Communist Revolution in 1949 to establish the People’s Republic of China (Shigong 2010).

Accordingly, all local political parties are nationally controlled, and their existence is affirmed only by

their cooperation with the ideology and demands of the CCP. Further, the absence of national

democratic elections prevents citizens from choosing their representation, and the only pathway for

turnover at the highest echelons of Chinese politics is promotion within the CCP (Guo 2007). Both

the existence of a single-party system and the absence of democratic elections relegate the PRC to

nondemocracy by nearly all standard criteria, including the criteria recognized in this research from

Page 18: Information Warfare: Case Studies from the 21st Century

18

Chiebub, Gandhi, and Vreeland. Effectively, the CCP is able to pursue any action or measure it

wants without regard for the passions and concerns of its citizens.

As a state that has seen its geopolitical power soar since economic integration with the

developed world in the late 1900s, China’s regional and global military power is beginning to rival

that of the United States. In summarizing a 2019 Chinese defense white paper, Anthony H.

Cordesman of the Center for Strategic and International Studies argues: “[The white paper] flags the

fact that America and China are now competing superpowers, and that China’s growing military

forces are developing to the point where they will be able to challenge the United States”

(Cordesman 2019: 1). As its established primary rival, I will discuss Chinese military power relative

to the United States.

According to the National Material Capabilities database from the Correlates of War Project,

the PRC received a CINC score in 2012 of 0.218166 to the United States’ 0.139352. As such, the

PRC had an average access to almost 22% of capability within the international system in 2012 as

compared to the United States’ nearly 14% (Correlates of War 2017). As discussed earlier, there are

scholars that disagree with the validity of CINC to estimate capability due to the fact that highly

populated states will receive inflated capability based on high total and dense urban populations

(Beckley 2018). As the most populous country in the world with several of the largest urban

populations globally, I find it highly likely that population positively inflated PRC’s 2012 CINC

score. Material power indicators like GDP per capita that check for population (Beckley 2018)

indicate that China’s national material power is likely lower than the US: data from the World Banks

shows that China’s 2017 GDP per capita was a meager $8,826.99 (USD) to the United States’

$59,531.66 (USD).

China’s population has historically inflated CINC scores during periods of Chinese history

where the implications of their CINC scores do not make logical sense. For example, between 1911

Page 19: Information Warfare: Case Studies from the 21st Century

19

and 1949 China was largely an underdeveloped state that was dealing with civil conflict between the

nationalists and communists following the fall of the Qing dynasty while also suffering a terrible

defeat in the First Sino-Japanese War. During the same time, the Soviet Union engaged successfully

in both World Wars and emerged as one of the two major global powers in the post-WWII era.

Conventional logic would predict Soviet capability to be much higher than China’s, but from 1911-

1949 China held an average CINC score of 11.5% while the Soviets held an average score of 12.8%.

Logically, one would expect the disparity in capability between these two states to be much larger

during this time period. The small CINC disparity between Russia and China during this time period

is a testament to the fact that China’s CINC score is inflated by its exceptionally large total

population. After checking for population’s effect, it is assessed that the United States likely

exercises a material power advantage over China.

Given the provided analysis on the independent variables within the context of China, my

argument would predict a higher degree of use on the dependent variable. Due to the likelihood that

a rising and developing China is at a smaller military disadvantage relative to the United States than

Russia is, a higher degree of use is associated with the implications drawn from China’s score on the

independent variables. However, a lower degree of higher use is warranted for two specific reasons

derived from observations performed on the dependent variable: 1) There are no attributable cyber

activities to China that can be considered an act of strategic psychological cyberwarfare, but its

extensive campaign of cyber espionage could be easily re-configured for such capabilities; and 2)

Chinese military doctrine since the 1990s has begun to embrace concepts that are consistent with the

development of strategies for the use of strategic psychological cyberwarfare.

Currently, there are no significant studies that have proven examples of Chinese cyber

activities containing elements of strategic psychological cyberwarfare. Primarily, the PRC has tailored

its cyber capability to supplement technological and economic development via cyber espionage

Page 20: Information Warfare: Case Studies from the 21st Century

20

(Carr 2011). Chinese state hackers have targeted US defense agencies and private contractors by

stealing troves of data and intellectual property critical to research and development in areas like

missile technology and naval warfare (Carr 2011). These activities may not strictly fall under

elements of strategic psychological cyberwarfare, but the PRC has effectively demonstrated the

cyber capability necessary to pursue such a strategy if desired. Interestingly enough, there are

unverified reports of Chinese-government linked social media accounts spreading targeted

disinformation campaigns through troll farms to influence the outcome of the 2020 Taiwan

presidential election (Allen-Ebrahimian 2020). Although it may be proven differently in the future, it

is assessed that China’s cyber activities do not exhibit elements of strategic psychological

cyberwarfare and do not meet the specified criteria to be considered a high-use case within the first

criterion of the dependent variable.

Chinese military doctrine began to take note of high tech’s integration within military

operations after the United States secured an overwhelming victory in the First Gulf War against an

Iraqi force who received its arms and implements from Russia and China (Carr 2011). Chinese

military strategy accordingly adopted the concept of ‘informatization,’ which refers to the application

of information technology to command, intelligence, training, and weapons systems (Kanwal 2009).

This concept also inspired the PRC to raise an ‘army’ of private citizen hackers who can facilitate

hacking campaigns against China’s adversaries (Kanwal 2009). Interpretively, such a strategy can be

easily recalibrated to wage strategic psychological cyberwarfare via online troll farms. Broadly, the

PRC views developing capability in cyberspace as a way to level the playing field against the United

States, who exercises technological superiority over China (Kanwal 2009). Further, experts like Kate

Farriss have argued that China has embraced an increasingly broad view of information warfare to

emphasize aspects like psychological operations and deception (Carr 2011). While a lack of

significant attributable examples does not allow an evaluation of Chinese cyber doctrine in practice,

Page 21: Information Warfare: Case Studies from the 21st Century

21

it is clearly understood that China is embracing military doctrine that is supportive of psychological

manipulation and deception in cyberspace.

In addition to the fact that Chinese military doctrine is embracing cyberspace as an

asymmetric tool to facilitate operations that are deceptive and psychological in nature, the

implications drawn from the PRC contextualized within both independent variables support the

assignment of a higher degree of use on the dependent variable. However, the lack of significant

attributable examples and the fact that Chinese military disadvantages relative to the United States

are lower than that of Russia prompt the assignment of a medium-high degree of use on the

dependent variable for the People’s Republic of China.

iii. India

India is a democratic state that exercises a relative military superiority over its primary rival,

Pakistan. Despite considerable conventional military capability and consistent cyber conflict with

Pakistan since 1998, India’s state cyber power is rather underdeveloped compared to other cases in

this study (Carr 2011). After discovering a Chinese variant of the Stuxnet worm on government

infrastructure and suffering multiple defacements to its most secure government website from the

Pakistan Cyber Army in 2010 (Carr 2011), India has been attempting to develop capabilities to

secure its domestic cyberspace by improving its cyber defenses (Hathaway et al. 2016). The 2013

National Cyber Security Strategy was designed to give India a visible path toward such a goal, but an

ill-defined implementation plan has delayed many of the deliverables that the 2013 strategy called for

(Hathaway et al. 2016). Currently, India is still conceptualizing how it plans to develop capabilities

and infrastructure to consolidate its cyber power. India is therefore assigned a low degree of use on

the dependent variable for India in Table 1.1 due to the absence of significant state cyber capability,

much less even utilizing capabilities with which the dependent variable is concerned.

Page 22: Information Warfare: Case Studies from the 21st Century

22

Similar in that most contemporary scholars implicitly characterize Russia and China as

nondemocracies, it is a relatively obvious reflection that India is a democratic state. Historically,

scholars point to India’s colonial experience before 1947 as catalyst for the cultivation of democratic

ideals within broad national ideology (Mehta 2012). Today India is a vibrant and competitive

parliamentary democracy whose politics are marked not by shared common interests but the ideal

that holding the state accountable is to gain access to its power and resources (Mehta 2012). The

existence of intense political competition among parties is a testament to the fact that citizens of

India are empowered to engage in national and regional politics. Institutionally, frequent competitive

elections and a constitutional separation of powers enables incumbent turnover and provides

citizens with a legitimate check on government power (Mehta 2012). Considerable voter turnout and

civilian control of the military are further indications that India meets not only broad requirements

to be a democracy but specific criteria such as that articulated by Cheibub, Gandhi, and Vreeland.

On the provided basis it is assessed that India is a democratic state whose citizens have an active

role in holding the state accountable and determining its future.

The 1947 partition of India that resulted in the creation of the independently sovereign

Indian and Pakistani states created a lasting rivalry between the two powers who would both

eventually become armed with nuclear capabilities (Majeed 2013). Since then, on three separate

occasions the fierce India-Pakistan rivalry has resulted in full-scale war and startling nuclear

conflagration in 1998 over the historically-disputed Kashmiri peninsula (Majeed 2013). Long-lasting

disputes over territory remain and increasing Pakistani military cooperation with states India

considers to be hostile, such as China, present the most direct threat to India’s national security

(Iqbal & Amin 2016). Given that Pakistan is considered to be India’s primary rival, I will assess

India’s military power relative to Pakistan.

Page 23: Information Warfare: Case Studies from the 21st Century

23

Data from the National Material Capabilities databases suggest that India exercises a

considerable material power advantage with a 2012 CINC score of 0.0809 (8.09%) as compared to

Pakistan’s 0.0145 (1.45%) (Correlates of War 2017). According to these figures, in 2012 India had an

average access to capability within the international system that was nearly eight times higher than

that of Pakistan. Using data from the World Bank, net measures of capability reinforce the

conclusion drawn from CINC as Pakistan’s 2018 GDP per capita of $1,482.40 (USD) was

considerably lower than India’s 2018 GDP per capita at $2,010 (USD). Ultimately, scholars have

pointed to a larger economic base and a lasting three-decade expansion of military spending to be

the principal basis for India’s conventional superiority over Pakistan (Iqbal & Amin 2016).

In considering India’s assigned score on both independent variables, I predict lower degrees

of use on the dependent variable. As a democratic and militarily superior state relative to its primary

rival, India does not have the option to bypass the passions of its citizens nor the impetus to

establish asymmetric advantages over Pakistan. Beyond the implications that be drawn from the

independent variables, the required observations made on the dependent variable substantiate

India’s assignment as a low use case for two specific reasons: 1) There are no historic or

contemporary examples of utilizing the required capabilities as India is a rather underdeveloped

cyber power; and 2) State-level efforts aimed at developing national capability have been historically

insufficient.

Despite being a country commonly associated with modern technological advancement,

India’s national defensive and offensive cyber capabilities are significantly underdeveloped

(Hathaway et al. 2016). It goes without saying that there are no examples of India using cyber

capabilities that are the focus of this research, but there is serious question as to what cyber

capabilities India does possess. Among others, a series of cyberattacks on India’s National Security

Council and Central Bureau of Investigation in 2010 woke India’s state officials up to the reality that

Page 24: Information Warfare: Case Studies from the 21st Century

24

an unsecure cyberspace contains troubling implications for domestic and national security

(Hathaway et al. 2016). Accordingly, India has set forth a broad initiative to develop cyber capability,

secure domestic cyberspace, and increase awareness: the 2013 National Cyber Security Strategy

(Hathaway et al. 2016). The 2013 strategy called for a variety of action items and goals aimed at

primarily developing India’s cyber defense and attack resiliency (Hathaway et al. 2016). Despite clear

goals and intentions, a severe lack of implementation planning blurred the lines of responsibility

between ministries and created a substantial gap between expectations and actual national readiness

to confront India’s cyber threats (Hathaway et al. 2016). One of the central demands of the 2013

strategy was to create a central coordinating body to oversee the strategy’s development (Hathaway

et al. 2016), and this concept later became the idea behind India’s sluggish and so far incomplete

creation of the Defence Cyber Agency (DCA). As of October 2019, state officials in India are still

conceptualizing how the DCA is going to function and whether or not it will cooperate or be fully

integrated with the Indian Armed Forces (Chawla 2019).

Based on these observations it is clear that India is in the early stages of developing its state

capability in cyberspace. Combined with the fact that results in capability or doctrine development

thus far have not materialized, India’s underdeveloped cyber power requires an assignment of a low

degree of use on the dependent variable.

iv. United States of America

As a democracy whose military power is substantially greater than its primary rival’s, the

United States of America is arguably the premier cyber power on the international scene in terms of

the predominance and complexity of its capabilities. Historically, the United States has focused the

core development and use of its cyber capabilities for CNA operations (Carr 2011). Unlike Russia

and China who see information warfare as an asymmetric tool, the United States has historically

Page 25: Information Warfare: Case Studies from the 21st Century

25

conceptualized information warfare as a way to harden existing cyber and conventional deterrence

with adversaries (Carr 2011). In all likelihood, the most complex computer network attack ever

created was developed by the United States and implanted by Israel (Lindsay 2013). In 2010, Iranian

officials noticed malfunctions with internal computers at the Natanz uranium enrichment facility

and eventually discovered a piece of malware – which became known as Stuxnet – that was slowly

sending thousands of uranium centrifuges at Natanz into overdrive so that the centrifuges were

incapable of producing viable weapons-grade uranium (Lindsay 2013). The attack on Natanz

sparked considerable fear among the international community as to the potential for cyberattacks to

produce kinetic effects. Despite obvious capability for CNAs, there are no examples that indicate

the United States has utilized strategic psychological cyberwarfare capabilities. This data point is

further complicated by the fact that the Trump administration is re-posturing American cyber

doctrine to embrace a more offensive-minded strategy when it comes to information warfare.

Considering these conflicting observations and the implications drawn from the independent

variables, the United States was properly assigned a medium-high degree of use on the dependent

variable in Table 1.1.

Compared to the other cases in this research, it is the most obvious that the United States

meets minimalist standards to be considered a democracy. American citizens can vote in a myriad of

local, state, and national contested elections on a consistent basis to determine their governmental

representation. Further, the succession of office takes place according to institutional guidelines.

Beyond what is obvious electorally and institutionally, the overall body of research on public opinion

in the United States supports the idea that public opinion matters in American policymaking

(Shapiro 2011). According to Shapiro, the overall takeaways of public opinion research in the US

paints “a sanguine picture of democracy” (Shapiro 2011: 999). Given that regularly occurring and

contested elections have been a historically consistent feature of American politics and research

Page 26: Information Warfare: Case Studies from the 21st Century

26

indicates that public opinion plays an important role in policy formulation, it is assessed that the

United States is a democratic state that is beholden to the passions of its citizens.

The end of the Cold War and post-9/11 engagements reorganized American strategic

thinking away from prioritizing great power competition at the top of its security agenda. However,

the rise of China is now ushering in a new American embrace of great power competition7. In his

2001 book The Tragedy of Great Power Politics John J. Mearsheimer predicted that China and the United

States are destined to be rivals because Chinese economic growth will eventually translate into

military capability that will threaten American hegemony in Asia Pacific (Mearsheimer 2001). Given

mounting economic disputes, China’s aggression in the South China Sea and opposing political

ideologies, it is assessed that the United States considers China to be its primary geopolitical rival.

Data from the National Material Capabilities database shows that China had average access

of 0.2181 (21.81%) to capability within the international system while the United States had an

average access of 0.1393 (13.93%) in 2012 (Correlates of War 2017). This interpretation mistakenly

implies that the United States is a weaker military power than China for the same reasons provided

in the corresponding section of the China case. It is highly likely that China’s CINC scores, thereby

its military power, are inflated due to its enormous total population. The interpretation that China is

a superior military power to the United States is even more misleading when American GDP per

capita is almost six times the size of China’s (World Bank 2018). Additionally, a significant number

of scholars consider the United States to be militarily superior. According to Carr, the key filter

informing and guiding Chinese security decision-making is American military superiority (Carr

2011). Brooks argues that a significant disparity in military capability is one of the reasons why the

United States does not immediately need to substantially increase its military efforts in response to

7 In the Introduction of The Trump Administration’s 2018 National Security Strategy the administration articulates that renewed competition with China and Russia “require the United States to rethink the policies of the last two decades” (2018 NSS: 3)

Page 27: Information Warfare: Case Studies from the 21st Century

27

China’s economic growth (Brooks et al. 2012). Interpretively, the China threat does not

contemporarily require the United States to develop capability and strategy outside of existing

deterrence.

Considering the observations made thus far on the United States, I predict a lower degree of

use on the dependent variable given that the United States is a democratic state who is militarily

superior to its primary geopolitical rival China. Beyond the implications that can be drawn from the

independent variables, the United States was coded as a medium-high use case on the dependent

variable based on the following observations: 1) There are no public examples of the United States

utilizing cyber capabilities whose explicit goal is strategic psychological manipulation, although the

United States has a history of using tactical psychological capabilities; and 2) The Trump

administration is embracing a cyber doctrine that creates a more aggressive American posture

toward information warfare and cyberspace more broadly.

The United States has utilized psychological operations and information warfare in a number

of capacities since WWII. During the Cold War, the United States adopted the use of information

warfare and tactical propaganda to counter the ideological threat of Communism that registered

below acceptable thresholds of escalation (Robinson et al. 2018). The core of this effort during the

Cold War was the 1953 creation of the United States Information Agency (USIA). USIA was

dedicated to characterizing American policy and ideology in a credible and appealing light to foreign

audiences until it was disbanded in 1999 (Robinson et al. 2018). During the both Iraq wars,

information operations were largely used in a tactical capacity to undermine the authority of specific

leaders and spread disinformation (Robinson et al. 2018). For example, the United States released

photographs of Saddam Hussein in 2003 that depicted him in a broken and disorderly condition so

as to undermine his support and lend credence to Coalition claims that he had been captured

(Robinson et al. 2018). Given these examples it is quite apparent that the United States is willing to

Page 28: Information Warfare: Case Studies from the 21st Century

28

use information and psychological warfare tactics to achieve objectives. Despite obvious American

capability in this field, there are no contemporary reports of the United States using these

capabilities to target sovereign populations in a strategic capacity through cyberspace. On that basis

it is assessed that the United States does not meet the first set of criteria to be considered a high-use

case on the dependent variable.

American doctrine toward cyberspace has varied among Presidential administrations since

cyber became a concern of American national security. In 2009, Clarke & Knake made the case that

the Bush administration’s cyber posture was too offensive focused and needed to consider

hardening its cyber defenses (Clarke & Knake 2019). In taking stock of the Obama administration,

Clarke & Knake found that the United States had become too defensive focused in its cyber posture

and was not prioritizing a strong cyber deterrent to discourage actors from provoking cyber conflict

(Clarke & Knake 2019). After releasing the first National Cyber Strategy (NCS) in 15 years, the

Trump Administration is putting the United States on an increasingly offensive footing as it seeks to

reconceptualize how American doctrine incorporates cyber within grand strategy. Addressing cyber

more broadly, the 2018 NCS states: “Cyberspace will no longer be treated as a separate category of

policy or activity disjointed from other elements of national power” (2018 NCS: 20). Interestingly,

this policy shift is largely congruent with Russia’s view that cyberspace is a subcomponent to the

larger doctrine of information warfare rather than a discrete domain of conflict within itself (White

2018). On information warfare, the 2018 NCS stipulates that the United States will “expose and

counter the flood” of disinformation to “prevent the use of digital platforms for malign influence

operations while respecting civil rights and liberties” (2018 NCS: 21). The Trump Administration’s

embrace of a more pervasive cyber doctrine that promotes the ubiquity of cyber within the broader

American power arsenal shifts the United States’ cyber posture onto a more aggressive position.

Page 29: Information Warfare: Case Studies from the 21st Century

29

A lack of attributable cases where the United States has engaged in strategic psychological

warfare implies that the United States should be characterized as a low-use case on the dependent

variable. However, the prevailing American cyber doctrine under the current administration and

numerous examples of psychological warfare being waged in the past disqualify the United States

from being strictly considered a low-use case. Therefore, to account for those disqualifying factors,

the United States requires the assignment as a medium-low use case on the dependent variable.

IV. Conclusion

Considering the comprehensive analysis that has been provided on all four cases, there are

specific results to consider on the validity of my proposed argument and model. First, the provided

case analyses substantiate the association between the two independent variables and the dependent

variable involved in this inquiry. Different scores on the independent variables resulted in unique

outcomes on the dependent variable: both nondemocratic and weaker military powers (Russia and

China) were proven to be associated with higher degrees of use on the dependent variable.

Moreover, the proposed argument that nondemocracy and weaker military power relative to a

primary geopolitical adversary are associated with higher degrees of use on the dependent variable

was proven to be true for the assessed population of cases. In applying these considerations to the

specific hypotheses proposed in sub-section ‘c’ of ‘Argument’, we are able to reject the null

hypothesis in both cases. H1 theorized the association of nondemocracies with higher degrees of use

while H2 theorized the association of weaker relative military power with higher degrees of use on

the dependent variable. Russia’s use and China’s explicit doctrinal embrace of strategic psychological

cyberwarfare validate such a revelation.

Beyond the results and implications that can be drawn within the confines of the presented

inquiry, the provided analysis of Russia, China, India, and the United States offers three comparative

Page 30: Information Warfare: Case Studies from the 21st Century

30

insights on cyber capability and doctrine within the international system. First, India’s case disproves

the idea that the existence of a domestic economy with a considerably advanced information

technology sector is inherent to well-developed state cyberwarfare capability. According to the

World Bank, India is among the top 25 countries in the world for gross annual high-technology

exports: totaling $20.278B (USD) in 2018 (World Bank 2018). Yet, the analysis on India clearly

shows that its state cyber capability is considerably under developed. Second, a state’s cyber doctrine

is, among other ancillary factors, a product of historical and pragmatic decisions about the future of

information warfare. As evidenced by the Russian case, elements of Soviet statecraft continue to

dominate core aspects of its contemporary strategy toward deception and misinformation.

Pragmatically, China has chosen to facilitate mass schemes of cyber espionage to undermine

American military power by pursuing asymmetric advantages while also stealing intellectual property

to advance the greatest threat that China poses to American hegemony: its economic might. Both

historically and pragmatically, the Trump administration has chosen to reverse the complacency of

past administrations and confront the prevailing information warfare threat by endorsing a doctrine

that is increasingly symmetrical to its most concerning threats in Russia and China. Third, the

provided case analyses show that there is a disconnect between a cyber doctrine that is supportive of

using strategic psychological cyberwarfare capability and the actual deployment of those capabilities

in the international system. Both the United States’ and China’s case analyses demonstrated this

disconnect. Perhaps such a disconnect exists in specific cases because the actual process and

complexity behind using these kinds of cyber capabilities has not caught up to the more recent

development of doctrine that is supportive of its use.

Considering the results, there are several contributions that this inquiry makes that future

researchers can expand upon. First, this inquiry establishes grounds for desperately needed debate

on how comparative research in this field should be conducted and the general principles that

Page 31: Information Warfare: Case Studies from the 21st Century

31

should be adhered to. To stimulate research on a specific set of capabilities based off of a limited

body of literature and scholarly agreement, this inquiry fused together previously isolated definitions

of concepts from military conflict to present and evaluate the existence of strategic psychological

cyberwarfare in the international system. The creation of this specific term will allow future scholars

to continue to map out and differentiate between separate categories of information warfare in

cyberspace. Additionally, this inquiry substantiated the association of two independent variables with

unique outcomes on a case’s use of strategic psychological cyberwarfare. Future scholars should

consider additional variables that can further explain the variance between different gradations of

higher or lower use. Second, this inquiry demonstrated the ability to conduct comprehensive

qualitative analysis. Now that the theoretical groundwork of research design in this field has been

established, future scholars should consider constructing quantitative research designs to analyze a

greater population of cases and use statistical inference for further authentication of substantive

observations. Lastly, this inquiry demonstrated the association of weaker relative military power via

material resources with lower degrees of strategic psychological cyberwarfare activity. Future

scholars should consider including additional measures of relative military power like the

comparison of force structures or an analysis of power as outcomes between cases.

In addition to the contributions that are valuable to future research, this inquiry provides

several points of value for policymakers who need to understand the rapidly developing and chaotic

intersection of information warfare and cyberspace. Policymakers in the national security space have

finite resources and attention to allocate toward identifying the threat landscape in any domain. In

cyberspace, it is increasingly difficult for policymakers to navigate threat assessment because threats

materialize outside of physical space and this creates an overwhelming sense of uncertainty. This

inquiry gives policymakers two general characteristics to guide their threat assessments. The first,

nondemocratic states are more likely to use and develop strategic psychological cyberwarfare

Page 32: Information Warfare: Case Studies from the 21st Century

32

capability and should therefore receive greater attention paid when forming threat assessments.

Second, relatively weaker military powers are more likely to use strategic psychological cyberwarfare

out of a need to establish asymmetric advantages and should therefore receive increasing scrutiny

when conducting threat assessments. Broadly, the results of this inquiry allow policymakers to

stratify the assessment of their information warfare and cyber threat landscapes to allocate the

proper amount of resources toward legitimate threats.

The threat that information warfare poses to national security and the integrity of democratic

processes continues to mount. Russian troll farms demonstrated the ability to create online

controversy that materialized to civilian unrest in physical space in Estonia in 2008 and even in the

United States during the 2016 presidential election. Given continued time and ability to refine these

capabilities, the rapid global progression of information technology will have a compounding effect

on how powerful strategic psychological cyberwarfare is in creating corresponding effects in physical

space. Just weeks ago, the US House Intelligence Committee received a classified briefing from

intelligence officials indicating that Russia is planning to interfere with the 2020 US presidential

election8. Even though we are in the mere infancy of the digital age, there is ample evidence that

information warfare in cyberspace has the capacity to cause a significant disturbance to the

international community. State policy makers in and outside the national security space need to

recognize the severity of the threat that information warfare in cyberspace poses and stimulate the

growth of research in this field before our understanding of the threat cannot catch up to its

magnitude and complexity.

8 See CBS News Article: https://www.cbsnews.com/news/russian-election-interference-intelligence-officials-warned-lawmakers-2020/

Page 33: Information Warfare: Case Studies from the 21st Century

33

References (APSA)

Allen-Ebrahimian, Bethany. 2020. “China Steps up Political Interference Ahead of Taiwan’s Elections.” Axios. https://www.axios.com/china-disinformation-taiwan-presidential-election-0f66ae16-0140-4c84-a833-bf5653cecf85.html (February 24, 2020).

Beckley, Michael. 2018. “The Power of Nations: Measuring What Matters.” International

Security 43(2): 7–44. Brooks, Stephen G., G. John Ikenberry, and William C. Wohlforth. 2012. “Don’t Come

Home, America: The Case against Retrenchment.” International Security 37(3): 7–51. Carafano, James Jay. 2014. “Measuring Military Power.” Strategic Studies Quarterly 8(3): 11–18. Carr, Jeffrey. 2011. Inside Cyber Warfare: Mapping the Cyber Underworld. 2nd ed. O’Reilly Media,

Inc. Chawla, Gunjan. 2019. “India’s New Defence Cyber Agency—II: Balancing Constitutional

Constraints and Covert Ops?” Medianama. https://www.medianama.com/2019/10/223-india-defence-cyber-agency-part-2/ (February 25, 2020).

Cheibub, José Antonio, Jennifer Gandhi, and James Raymond Vreeland. 2010. “Democracy

and Dictatorship Revisited.” Public Choice 143(1/2): 67–101. Clarke, Richard A., and Robert K. Knake. 2010. Cyber War: The Next Threat to National Security

and What To Do About It. Harper Collins. Clarke, Richard A., and Robert K. Knake. 2019. The Fifth Domain: Defending Our Country, Our

Companies, and Ourselves in the Age of Cyber Threats. Penguin Press. Connell, Michael, and Sarah Vogler. 2016. Russia’s Approach to Cyber Warfare. Center for Naval

Analyses: US Office of Chief of Naval Operations. https://apps.dtic.mil/dtic/tr/fulltext/u2/1019062.pdf.

Cordes, Nancy et al. 2020. “Intel Officials Warned Lawmakers Russia Trying to Interfere in

2020 Election.” CBS News. https://www.cbsnews.com/news/russian-election-interference-intelligence-officials-warned-lawmakers-2020/ (March 1, 2020).

Cordesman, Anthony H. 2019. An Open Strategic Challenge to the United States, But One Which

Does Not Have to Lead to Conflict. Center for Strategic & International Studies. https://www.csis.org/analysis/chinas-new-2019-defense-white-paper.

Page 34: Information Warfare: Case Studies from the 21st Century

34

Correlates of War. 2017. “National Material Capabilities (v5.0).” https://correlatesofwar.org/data-sets/national-material-capabilities (January 31, 2020).

Daniels, Jeff. 2017. “Chinese Theft of Sensitive US Military Technology Is Still a ‘huge

Problem,’ Says Defense Analyst.” CNBC. https://www.cnbc.com/2017/11/08/chinese-theft-of-sensitive-us-military-technology-still-huge-problem.html (March 4, 2020).

Defense Intelligence Agency. 2017. Russia Military Power | Building a Military to Support Great

Power Ambitions. US Department of Defense. https://permanent.access.gpo.gov/gpo82226/Russia%20Military%20Power%20Report%202017.pdf.

Friedberg, Aaron L. 1987. “The Assessment of Military Power: A Review Essay” eds. Tom

Gervasi, William T. Lee, and Richard F. Staar. International Security 12(3): 190–202. Guo, Gang. 2007. “Retrospective Economic Accountability under Authoritarianism:

Evidence from China.” Political Research Quarterly 60(3): 378–90. Hathaway, Melissa et al. 2016. India’s Cyber Readiness At A Glance. Potomac Institute for

Policy Studies. Horley, Tim, Anne Meng, and Mila Versteeg. 2020. “The World Is Experiencing a New

Form of Autocracy.” The Atlantic. https://www.theatlantic.com/ideas/archive/2020/03/new-authoritarianism/607045/ (March 5, 2020).

Iqbal, Muhammed Zubair, and Musarat Amin. 2016. “Vacillation between Soft and Hard

Balancing: China-Pakistan versus Indo-US Stategies.” Strategic Studies 36(1): 74–91. Kello, Lucas. 2013. “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft.”

International Security 38(2): 7–40. Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Security Studies 22(3): 365–

404. Linebarger, Paul M. A. 2015. Psychological Warfare. San Francisco, California: Hauraki

Publishing. http://ebookcentral.proquest.com/lib/ucb/detail.action?docID=4807757 (October 25, 2019).

Lukinova, Evgeniya, Myagkov Mikhail, and Ordeshook Peter C. 2011. “Metastasised Fraud

in Russia’s 2008 Presidential Election.” Europe-Asia Studies 63(4): 603–21.

Page 35: Information Warfare: Case Studies from the 21st Century

35

McCombie, Stephen, Allon J. Uhlmann, and Sarah Morrison. 2020. “The US 2016 Presidential Election & Russia’s Troll Farms.” Intelligence and National Security 35(1): 95–114.

Mearsheimer, John J. 2001. The Tragedy of Great Power Politics. W. W. Norton & Company.

https://www.amazon.com/Tragedy-Great-Power-Politics-Updated/dp/0393349276 (February 26, 2020).

Mehta, Pratap Bhanu. 2012. “State and Democracy in India.” Polish Sociological Review 2(178):

203–25. Office of the Secretary of Defense. 2019. Annual Report to Congress: Military and Security

Developments Involving the People’s Republic of China 2019. US Department of Defense. https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdf.

Pashentsev, Evgeny. 2019. “Destabilization of Unstable Dynamic Social Equilibriums

Through High-Tech Strategic Psychological Warfare.” In International Conference on Cyber Warfare and Security, Reading, United Kingdom: Academic Conferences International Limited, 322-328,IX. http://search.proquest.com/docview/2198532072/abstract/614A56FB39A40E4PQ/1 (October 22, 2019).

Robinson, Linda et al. 2018. Modern Political Warfare: Current Practices and Possible Responses.

RAND Corporation. Research Report. https://www.rand.org/pubs/research_reports/RR1772.html (January 13, 2020).

Rosen, Rebecca J. 2011. “So, Was Facebook Responsible for the Arab Spring After All?” The

Atlantic. https://www.theatlantic.com/technology/archive/2011/09/so-was-facebook-responsible-for-the-arab-spring-after-all/244314/ (February 29, 2020).

Schreck, Carl. 2018. “Seeing ‘Churov’s Saw’: Russian Researcher Says Putin May Have

Received 10 Million Fraudulent Votes.” Radio Free Europe. https://www.rferl.org/a/russia-election-fraud-10-million-votes-researcher-churovs-saw-putin/29111554.html (January 30, 2020).

Shapiro, Robert Y. 2011. “Public Opinion and American Democracy.” The Public Opinion

Quarterly 75(5): 982–1017. Shigong, Jiang. 2010. “Written and Unwritten Constitutions: A New Approach to the Study

of Constitutional Government in China.” Modern China 36(1): 12–46.

Page 36: Information Warfare: Case Studies from the 21st Century

36

Trump, Donald J. 2017. National Security Strategy of the United States of America. Washington D.C.: The White House. https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.

Trump, Donald J. 2018. National Cyber Strategy of the United States of America. Washington D.C.:

The White House. https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf.

Walton, Greg et al. 2009. Tracking GhostNet: Investigating a Cyber Espionage Network. Munke

Center for International Studies: University of Toronto. http://www.nartv.org/mirror/ghostnet.pdf. Waltzman, Rand. 2017. (United States Senate) The Weaponization of Information: The Need for

Cognitive Security. RAND Corporation. https://www.rand.org/pubs/testimonies/CT473.html (February 25, 2020).

White, Sarah P. 2018. Understanding Cyberwarfare: Lessons from the Russia-Georgia War. Modern

Warfare Institute at West Point. https://mwi.usma.edu/understanding-cyberwarfare-lessons-russia-georgia-war/ (November 6, 2019).

World Bank. “GDP per Capita (Current US$).” The World Bank.

https://data.worldbank.org/indicator/NY.GDP.PCAP.CD (January 31, 2020). World Bank. “High-Technology Exports (Current US$).” The World Bank.

https://data.worldbank.org/indicator/TX.VAL.TECH.CD (March 5, 2020).