Information Warfare: Case Studies from the 21st Century - University of Colorado Boulder

Page created by Don Alvarez
 
CONTINUE READING
1

       Information Warfare: Case Studies from the 21st Century

                               Thesis by Jacob Andrew Clark

                                       Spring 2020

                              University of Colorado Boulder

                              Department of Political Science

                          2:00 PM March 10, 2020 in Ketchum 371

Committee: Dr. David Bearce (PSCI, Advisor), Dr. Janet Donavan (PSCI), Professor Orly Hersh

                                         (WRTG)
2

    I.   Introduction

         Over the past two decades the expansion of cyberspace as a concern of national security and

the varying tactics of information warfare that states have developed are increasingly elevating the

significance of the question: What factors explain the variability of the use of strategic psychological

cyberwarfare in the international system? The relevancy of this question is constantly increasing due

to the rapid progression of both the Internet’s technological complexity and its capacity to exercise

great influence over societies. The Arab Spring, which saw the overthrow of the brutal thirty-year

Mubarak regime in Egypt, was greatly influenced by the Egyptian protestor’s ability to share

information and organize themselves over Facebook1. The integrity of democratic elections have

been thrown into question after Russia demonstrated the ability to engineer fake online communities

to influence and enflame the public debate of the 2016 US Presidential Election. As society becomes

increasingly reliant upon the Internet and other technology, the magnitude of information warfare

and how the Internet can be used by state actors to manipulate and deceive is only going to become

more pronounced.

         Despite the relevance of such an inquiry, there is a lack of scholarly attention within the

national security space devoted to assessing the factors that could explain the varying strategies of

information warfare utilized on the international scene. The only study that even remotely addresses

this issue is a 2018 RAND study2 that instead focuses more broadly on the current and historical

practices of political warfare in the United States, Russia, Iran, and ISIS. The lack of scholarly focus

on information warfare is likely a product of an overall dearth of studies devoted to the cyber threat

1
  Rebbeca Rosen of The Atlantic has an interesting piece in 2011 that discusses Facebook’s effect on the Arab Spring:
Rosen, Rebecca J. 2011. “So, Was Facebook Responsible for the Arab Spring After All?” The Atlantic.
https://www.theatlantic.com/technology/archive/2011/09/so-was-facebook-responsible-for-the-arab-spring-after-
all/244314/ (February 29, 2020).
2Robinson, Linda et al. 2018. “Modern Political Warfare: Current Practices and Possible Responses.”
https://www.rand.org/pubs/research_reports/RR1772.html (January 13, 2020).
3

(Kello 2013). Most of the already-limited scholarship on cyberspace has focused on the CNA

(computer network attack) aspects of cyberwarfare rather than the less-exciting and more complex

considerations of how information in cyberspace can be manipulated for psychological effects that

translate into action outside of the cyber realm.

        In the following paper I will examine two independent variables – regime type and relative

military power – in a comparative case study on Russia, the People’s Republic of China, India, and the

United States that provides an explanation to this under-studied topic. I propose that the variability

in the use of strategic psychological cyberwarfare among the international system is explained by a

state’s regime type and its military power relative to its primary geopolitical rival. A state’s regime

type influences how foreign policy is developed and whether or not the opinions of public

constituencies are influential over its development. The assessment of military power relative to a

primary rival guides strategic security planning and the tools of national power that a state chooses

to exercise. Ultimately, I argue that nondemocratic states who are militarily weaker relative to their

primary geopolitical rival are more likely to utilize high degrees of strategic psychological

cyberwarfare.

        In the first section of this paper, ‘Argument,’ I elaborate on the tenants of my argument and

hypotheses within the context of both independent variables in my proposed model. In the ‘Testing’

section I will clarify how variables in the model are coded, establish case selection criteria, and layout

the predictions of my argument in Table 1.1. After Table 1.1 and before the case analysis sections I

clarify the conceptualization and operationalization of the dependent variable within the model in

the section ‘Degrees of Strategic Psychological Cyberwarfare.’ After the design of this study and my

proposed argument has been established, I will substantiate all assigned variable scores in Table 1.1

on a case-by-case basis beginning with Russia. Lastly, in the ‘Conclusion’ section I will examine the

validity of my argument based on the results from case analyses, discuss the original value provided
4

by this inquiry, and attempt to stimulate further research on this topic by discussing questions that

remain unanswered.

    II.   Argument

          In the following section I will elaborate on the central argument of this inquiry:

Nondemocratic states that are militarily weaker vis-à-vis their primary geopolitical rival are more

likely to use higher degrees of strategic psychological warfare tactics in cyberspace, or strategic

psychological cyberwarfare.

              a. Regime Type

          Simply put, regime type conceptually refers to how “democratic” as a state is. There are a

number of disagreements among scholars as to how to “democratic-ness” is empirically evaluated,

but there is general agreement on several simple metrics:

              •   Regular and free elections in which more than one party participates

              •   A popularly elected legislature

              •   Consistently-applied rules regarding the alternation of power

          There are specific intricacies of regime classification that are the subject of contemporary

debate, but for the purposes of this argument states are only democratic if they meet Cheibub,

Gandhi, and Vreeland’s3 minimalist criteria, as noted above.

          Regime type is a significant variable in this argument because classifications of regime type

determines the formulation of foreign policy and the development of statecraft. Democratic states

must engage with the concerns of their citizens in order to formulate and implement policy in both

3
 Cheibub, José Antonio, Jennifer Gandhi, and James Raymond Vreeland. 2010. “Democracy and
Dictatorship Revisited.” Public Choice 143(1/2): 67–101.
5

the domestic and foreign realms. For example, when it became public that the CIA was using

“enhanced interrogation techniques” to compel enemy combatants in the Middle East to give up

intelligence, a fierce American public backlash was a significant catalyst for ceasing the use of such a

tactic. Nondemocratic states do not have the same obstacle when it comes to policy creation, as they

can and do disregard their citizenry by implementing policies that are often antithetical to the

national will.

        Given that classifications of regime type contain implications as to how policy is formulated,

I propose that nondemocratic states are more likely to engage in higher degrees of strategic

psychological cyberwarfare. I predict that they do so for the purposes of favorable foreign policy

outcomes without the use of military force. Democratic states are unable to pursue the use of

strategic psychological cyberwarfare because citizens of democracies are not supportive of such a

policy out of fear that these capabilities will be used internally.

            b. Relative Military vis-à-vis Primary Rival

        Relative military power refers to the military power of a given state compared to that of another.

There is an emphasis on comparison because most scholars agree that absolute measures do not

provide a logical basis to make judgements about a state’s military power (Friedberg 1987). In

addition, there is significant disagreement among scholars as to which quantitative and qualitative

metrics should be included in a comparative military power analysis or if military power is capable of

being measured at all. Regardless, one school of thought believes that a nation’s power derives from

the resources at its disposal (both military and civilian), and the efficiency by which the state utilizes

those resources. This premise relies primarily on quantitative metrics like the Composite Index of

National Capability, or CINC (Correlates of War 2017), GDP per capita (Beckley 2018), and force

structure (Carafano 2014). Another school of thought believes that a nation’s power is derived from
6

historical outcomes. This theory relies primarily on qualitative measures such as strategy, the

observation of how international events play out, and other interpretive observations on a state’s

hard and soft power (Beckley 2018). Both schools of thought present valid reasoning as to why

resources or outcomes are the best measures of military power, but the qualitative judgement of

international events is outside the scope of this inquiry. Therefore, relative military power will be

recognized in terms of material resource power: CINC and GDP per capita.

        Relative military power is a significant independent variable in this theory because the results

of a relative military power analysis will guide a state’s strategic military planning. States that observe

their military power to be less than that of their primary geopolitical rival are inclined to develop

strategic and tactical asymmetric advantages over its militarily-superior rival. Vehicles of asymmetric

warfare have taken various forms throughout history, but the advent of cyberspace as a domain of

military conflict has provided an entirely new opportunity for states to devise asymmetric capabilities

(Clarke & Knake 2019). At the modern-day strategic level, some states with the necessary resources

have opted for the asymmetric strategy of incorporating concepts of psychological warfare through

cyberspace. The purpose of this strategy is primarily to destabilize an adversary’s domestic politics to

achieve foreign policy victories against a superior military without the use of force (Pashentev 2019).

        Given the fact that relative military power has implications for strategic planning, I propose

that militarily weaker states (vis-à-vis their primary rival) are more likely to incorporate strategic

psychological cyberwarfare in their asymmetric arsenal. Moreover, states that are militarily stronger

than their primary rival do not see strategic psychological cyberwarfare as a worthwhile investment

and practice. Instead, militarily stronger states focus on hardening tactical advantages and keeping

existing conventional and nuclear deterrence intact.
7

            c. Hypotheses

        Given the two separate arguments that have been provided in this section, the following

hypotheses are proposed:

        H1 – Nondemocratic states are associated with a higher degree of use of strategic

psychological cyberwarfare capabilities.

        H2 – States that are militarily weaker to their primary rival are associated with a

higher degree of use of strategic psychological cyberwarfare capabilities.

III.    Testing

        To evaluate the proposed hypotheses and argument, I will conduct a comparative case study

on the following four states: the Russian Federation, People’s Republic of China, India, and the

United States of America. A comparative case study is the ideal method of analysis for this inquiry

because the variance in strategic psychological cyberwarfare use must be evaluated empirically, and a

case study approach provides the most logical and comprehensive way to assess the questioned

variance on the international stage.

        I chose the four presented cases based on two main criteria. First, in order for states to be

eligible for selection in this study the state must have an existing infrastructure and technological

modernization requirement. Psychological cyberwarfare operations require a significant amount of

funding, existing defense infrastructure and modernized technological assets and capabilitie. Hence,

states eligible for selection in this inquiry must already have modernized technological sectors of the

economy capable of producing the cyber capabilities and existing defense infrastructure needed to

perpetuate vast schemes of psychological cyber warfare. Somalia, for example, would not be a

country worthy of analysis in this research because Somalia does not have the technological or

military capability necessary to deploy and facilitate strategic psychological cyberwarfare. Given such
8

considerations, the potential sample size of states that meet this requirement and are worthy of

analysis is rather small.

    The second requirement imposed on case selection is based on the need for variation

amongcases within each independent variable. For regime type, both a democratic and nondemocratic

case are needed. Further, different gradients and iterations of democracies and nondemocracies

should also be considered. As a result, India and the United States were selected as democracies,

while China and Russia were chosen as nondemocracies. For relative military rival, both a state that is

militarily superior and a state that is militarily weaker vis-à-vis its primary rival are required.

Additionally, states that are under different national security considerations as militarily stronger or

weaker powers should be considered. Hence, India is included as a militarily superior state because

its national security concerns are starkly different than the United States’ as a global military

superpower. Similarly, China was included as a military weaker state because its national security

concerns are much different as a rising power than Russia’s as a relatively declining power.

        As evidenced by Table 1.1, both independent variables are collinearly associated in that both

nondemocratic cases are militarily weaker powers and both democratic cases are militarily superior

powers vis-à-vis their primary geopolitical rival. I predict that collinearity exists for two reasons.

First, the existing infrastructure and technological modernization requirement imposed on case

selection relegates potential analysis to a small sample of powerful states on the international scene.

Second, that within this small sample size of powerful states, there is overlap in primary geopolitical

rivals among cases. Specifically, the People’s Republic of China and Russia identify the United States

as their primary geopolitical rival. Consequentially, both states are individually weaker militarily to

their shared primary geopolitical rival.
9

            a. Table 1.1

                                      IV1                       IV2                   DV
               Case              ‘Regime Type’         ‘Relative Military        ‘Psychological
                                                            Power’               Cyberwarfare’
              Russia             Nondemocracy           Less than Primary        High Degree of
                                                          Rival (USA)                 Use

      People’s Republic of       Nondemocracy           Less than Primary        Medium-High
             China                                        Rival (USA)            Degree of Use

               India               Democracy              Greater than           Low Degree of
                                                          Primary Rival              Use
                                                             (PAK)
         United States of          Democracy              Greater than           Medium-Low
            America                                       Primary Rival          Degree of Use
                                                             (PRC)

            b. Degrees of Strategic Psychological Cyberwarfare

        The dependent variable in this research represents the variability in the degrees of strategic

psychological cyberwarfare use within the international system. Specifically, the dependent variable is

a 4-tier categorical variable (High, Medium-High, Medium-Low, Low) that measures the degree to

which a case uses strategic psychological cyberwarfare capabilities. In addition to translating the

implications of scores on independent variables, degrees of psychological cyberwarfare use will be

predicted based on two observations that will be discussed in the following section. Before the

criteria can be established for evaluation on the dependent variable, I will clarify the term ‘strategic

psychological cyberwarfare’.

        Strategic psychological cyberwarfare is a term that is fused together from several disciplines

within the study of military conflict. The first component is the concept of psychological warfare,

which has a long history within military strategy, including writings by such famous authors as Sun
10

Tzu4. Psychological warfare is the process of using communications designed to manipulate the

minds and actions of specific entities for the purpose of winning military victories without the use of

force (Linebarger 2015). At the strategic level, psychological operations target a specific country or

the international system as a whole to influence poor decision making and promote action to the

attacker’s benefit (Pashentev 2019). The second component is the concept of cyberwarfare.

Cyberwarfare, as an academic study within the context of national security, is in its infancy and there

are no broadly recognized definitions. Regardless, Clarke and Knake describe it as follows: “Actions

by a nation state to penetrate another nation’s computers or networks for the purposes of causing

damage or disruption” (Clarke & Knake 2010). Fundamentally, the elements of strategic

psychological cyberwarfare are subcomponents in the larger concept of information warfare. Former

US DARPA Program Manager Rand Waltzman defines information warfare as the following:

“Information operations and warfare, also known as influence operations, includes the collection of

tactical information about an adversary as well as the dissemination of propaganda in pursuit of a

competitive advantage over an opponent” (Waltzman 2017: 1). Considered as a whole, the term

strategic psychological cyberwarfare refers to the use of manipulative communications through

cyberspace targeted at a specific country for the purpose of stimulating poor decision making and

internal discord on behalf of the attacked that is beneficial to the attacker.

         Now that the conceptualization of the dependent variable has been clarified, the criteria for

evaluation on the dependent variable must be established. The first criteria, and most obvious, is to

assess if a case has used or is currently using strategic psychological cyberwarfare capabilities. Are

there examples today, or in the recent past, of a case using strategic psychological cyberwarfare? If

so, the facts of the example will be considered for implications on the degree of strategic

4
 In the first chapter of Sun Tzu’s The Art of War, Tzu describes “All warfare is based on deception” (18). See MIT’s
Online Classics Archive for a translation of The Art of War: http://classics.mit.edu/Tzu/artwar.html
11

psychological cyberwarfare use. Cases with high degrees of use should contain examples where it is

abundantly clear that strategic psychological manipulation was the goal of a specific action and

cyberspace was the primary vehicle of delivery. If the goal of an example attributed to a case is

unclear or cyberspace wasn’t the primary vehicle of the example, then a case would receive a lower

degree of use that is consistent with the facts of the attributed example.

        The second criteria for evaluation on the dependent variable is to assess if any implications

from military doctrine can be drawn as to a case’s use of strategic psychological cyberwarfare.

Technological advancements in conventional, unconventional, and nuclear forces over the last 50

years have forced the majority of powerful states on the international scene to revise their military

doctrine to incorporate emerging technologies and plan for conflict of the future. Hence, an

interpretative analysis of modern military doctrine can provide a basis to draw conclusions about a

case’s use of strategic psychological cyberwarfare capabilities. Within this criterion, high degrees of

use would be attributed to a case whose military doctrine displays an embrace of strategic

psychological cyberwarfare capability because of its asymmetric potential. If implications from a

case’s military doctrine are insufficient, then a case will receive a lower designation of use that is

consistent with the implications that can be sufficiently drawn from its military doctrine.

                     i. Russia

        As clearly depicted in Table 1.1, Russia is both a nondemocratic state and a weaker military

power relative to its primary geopolitical rival in the United States. Since the beginning of the 21st

century, Russia has developed and utilized considerable cyber capability in both tactical and strategic

contexts. Tactically, Russia coordinated targeted attacks on Georgia’s government communication

infrastructure with kinetic Russian military operations during the 2008 Russia-Georgia War (White

2018). In December of 2015, Russia performed the world’s first cyberattack on another country’s
12

power grid when it hacked into three separate power distribution centers in Western Ukraine that

affected more than 220,000 people (Connell & Vogler 2016). Strategically, Russia has sought to

affirm its regional and global influence by using cyberspace as a tool to spread disinformation and

foment internal discord within an adversarial state. In 2007, Russia targeted specific distributed

denial of service (DDoS) attacks on critical Estonian websites after the Estonian government

announced the planned removal of a Soviet-era statue in early 2007. Upon the removal of the statue

massive demonstrations ensued that eventually turned violent and killed one person(Connell &

Vogler 2016). Most notably, Russia perpetrated the most comprehensive act of strategic

psychological cyberwarfare to date when it engaged in interference with the 2016 United States

presidential election. After discussing Russian’s regime type and relative military power, I will

provide an in-depth analysis of Russia’s 2016 US election interference as a clear example of the fact

that Russia utilizes a high degree of strategic psychological cyberwarfare.

        For the purposes of this inquiry, an in-depth discussion of Russian institutions is not

warranted. Frankly, there aren’t many political scientists that need convincing that Russia does not

meet modern standards to be classified as a democracy. An accredited history of election fraud and

blatant suppression of opposing political parties is enough by any scholar’s scale to disqualify Russia

as a democracy. Briefly, I will discuss how these two features of “Russian democracy” specifically

violate the recognized standards of democracy found in Cheibub, Ghandi, and Vreeland.

        Beginning with Vladimir Putin’s first electoral victory in 2000 and until his most recent

victory in 2018, there are serious questions as to the legitimacy of Russian elections. For example,

credible international organizations like the Organization for Security and Cooperation in Europe

have never been allowed to observe an election in Russia to the capacity necessary to draw valid

conclusions about legitimacy (Lukinova et al 2013). Hence, the research of independent investigators

such as Sergei Shpilkin, a well-known Russian elections analyst, are among the most credible results
13

to consider. Using data from Russia’s Central Election Commission, Shpilkin noticed more than 30

notable falsifications in specific voting precincts during Putin’s 2012 electoral victory (Schreck 2018).

Shpilkin has raised similar concerns about Putin’s victory in 2004 and Dmitri Medvedev’s victory in

2008. Beyond voting fraud, opposing political parties have been brutally suppressed in Russia.

Mikhail Kasyanov, a fierce critic of Putin and former prime minister, was removed from the ballot

for conspicuous reasons in 2008 (Lukinova et al. 2011) to pave the way for Putin’s placeholder,

Medvedev5. The Kremlin has denied all such allegations and decried them as Western propaganda,

yet it has not presented convincing evidence to the contrary. Given such considerations, Russian

elections are not deemed to be legitimate and hence do not meet the most basic criteria of

democracy: free and fair elections in which opposing parties are not deliberately excluded from

participating.

         Much like conceptualizing Russia as a nondemocracy, it is relatively obvious to most scholars

that Russia considers the United States to be its primary geopolitical rival: "Moscow undoubtedly

views the United States and its NATO partners as the principal threat to Russian security, its geo-

political ambitions, and most importantly, the Kremlin's continued hold on power" (US Office of

the Secretary of Defense 2017: 15). On that basis, I will discuss Russia’s military power relative to

the United States.

         As established earlier, two indicators will be used to assess power in terms of material

resources. The first is CINC, an index that contains data from 1816-2012 on total population, urban

population, iron and steel production, energy consumption, military personnel, and military

expenditure. CINC aggregates all six individual indicators into one value and reflects an average of a

5 Tim Horley, Anne Meng, and Mila Versteeg in partnership with the National Constitution Center published a section

of the project “The Battle for Constitution” in The Atlantic that details how the alternation of power from Putin to
Medvedev was exemplary of one of five common ways that modern autocrats have circumvented constitutional limits
on their power: https://www.theatlantic.com/ideas/archive/2020/03/new-authoritarianism/607045/
14

state’s share of the total capability in the international system that year. Using data from 2012, Russia

received a CINC score of 0.0408 to the United States’ 0.1393. This indicates that Russia had an

average access to just 4% of capability within the system in 2012 while the United States had access

to triple that at nearly 14%. There are scholars, such as Michael Beckley, who disagree with the

validity of CINC because densely populated states receive inflated capability scores, hence the

second indicator is GDP per capita, which will also be used as a power index to balance out possible

CINC inflation from population (Beckley 2018). Russia’s GDP per capita in 2018 was just

$11,288.87 (USD) while the United States’ was more than five times that at $64,794.58 (USD).

Given these two indicators, Russia is at a clear material power disadvantage to the United States and

we can conclude that Russia is militarily inferior to the United States.

        Given the analysis that has been provided on Russia thus far, my argument predicts that

Russia would exercise higher degrees of psychological cyberwarfare capability. As a nondemocracy

that is militarily inferior to its primary rival, Russia has both the need to establish asymmetric

advantages and the capacity to do so without concern to the worries of its citizens. Beyond the

observations of my argument, Russia was coded as a high degree of use on the independent variable

for two specific reasons: 1) Specific attacks on the United States, and 2) The embrace of information

warfare as an asymmetric tactic within Russian military doctrine.

        Arguably the foremost example of strategic psychological cyberwarfare is the extent to which

Russia interfered with the 2016 United States presidential election. The Russian government created

an entire government agency, the Internet Research Agency (IRA), to create troll farms on US

servers for various social media sites that specifically targeted controversial groups and topics for

exploitation within public discourse (McCombie et al. 2020). Troll farms are organized groups on

the Internet that congregate for the purpose of influencing public opinion by spreading deliberately

false information. The IRA created these entities on US servers to buy advertising space, organize
15

online and real-world rallies, and pit opposing opinions of a controversial topic against each other

(McCombie et al. 2020). While the overall electoral impact was minimal, the real effect of the

interference was the delegitimization of the US electoral system and the perception that Russia had

significant influence over American decision making. The results were a number of grand jury

indictments, a two-year special counsel investigation, and immeasurable damage to the American

political ecosystem that has only become increasingly partisan ever since. Russia’s characteristic

denial of this covert action, despite being confirmed by every US intelligence agency6, only furthered

the qualitative impact of Russian influence by creating additional confusion and public mistrust in

American institutions. Despite being one example in a long list of Russian/Soviet attempts to

subvert American public authority via the electoral system, the use of troll farms by the IRA during

the 2016 US presidential election undoubtedly rises to the required threshold for consideration as a

high use case within the first criterion of evaluation on the dependent variable.

         Like many states since the dawn of 21st century, Russia has incorporated the use of emerging

technologies like cyber within military doctrine. In fact, Aleksandr Burutin, while he was the Deputy

Chief of the General Staff to the Russian president, gave a speech in February of 2008 titled “Wars

of the Future Will Be Information Wars” (Carr 2011). Unlike the United States, Russia has come to

view cyber as a single tool within the broader category of information warfare that is exercised

across all spectrums of warfare rather than a dimension of conflict in and of itself (White 2018). This

view is predicated on the idea that the Russian government views information itself as a medium to

shape individual and collective perceptions, and cyber is tool to facilitate information superiority so

as to control the narrative in a given situation (White 2018). Russian cyber activities during the 2008

Russia-Georgia War solidify this doctrine in practice. Through Russia’s access to an army of civilian

6
 See the US Senate Select Committee on Intelligence’s investigation into Russian interference in the 2016 Election:
https://www.intelligence.senate.gov/publications/committee-findings-2017-intelligence-community-assessment
16

hackers, official Georgian government websites and communications infrastructures experienced

massive DDoS attacks that cut off their ability to communicate during the early stages of the

conflict. This gave the Russian government the ability to shape the international narrative during

that crucial juncture of the conflict and allow them to exercise qualitative superiority over the

situation (White 2018). In addition to its cyber doctrine in practice, the clear Russian embrace of

cyber as a medium of psychological manipulation and narrative control assuredly rises to the

necessary threshold for assessment as a high use case on the dependent variable.

        Based on a widely-attributed example of strategic psychological cyberwarfare capability use

and the explicit embrace of cyber as an asymmetric tool to control operational and strategic

narratives via psychological manipulation, Russia is patently assigned a high degree of use on the

dependent variable.

                    ii. China

        The People’s Republic of China (PRC) is a nondemocratic and militarily weaker power

relative to its primary geopolitical in the United States. As one of the prominent cyber powers on the

international stage, China has created and continues to operate the world’s most pervasive campaign

of cyber espionage (Carr 2011, Daniels 2017). China acknowledges the technical superiority of the

United States, and accordingly China has embraced cyberspace as a medium to make up for that

technological gap by stealing intellectual property (Carr 2011). In 2009, the Munke Center for

International Studies in Toronto released a report that attributed Chinese state hackers to malware

that was actively saving, storing, and transmitting data placed on government information

technology infrastructures in India, Taiwan, Tibet, Japan, and the United States among others back

to Chinese servers (Walton et al. 2009). To this day, China continues to penetrate the networks of

US defense agencies and contractors to steal intellectual property for technological and economic
17

gain (Carr 2011, Daniels 2017). Despite the obvious employment of considerable cyber power, the

absence of verified examples where strategic psychological cyberwarfare was utilized complicate the

strict categorization of China as a high use case on the dependent variable. Regardless, after

assessing Chinese regime type and relative military power, I will discuss how China’s embrace of an

aggressive cyber doctrine that is conducive to using strategic psychological cyberwarfare

substantiates the argument that China utilizes a medium-high degree of strategic psychological

cyberwarfare capability.

        Similar to regime type in the Russian context, the vast majority of political scientists do not

need significant persuasion that China is a nondemocracy. In fact, the PRC is the antithesis of a

democratic state by modern regime classification standards. Among many others, a one-party

political system and the absence of democratic elections are two fundamental features of Chinese

politics that classify the PRC as a nondemocracy.

        While there are several local political parties throughout China, all parties are kept under the

leadership and supremacy of the singular national party, the Chinese Communist Party or CCP

(Shigong 2010). The supremacy of the CCP over all other parties is the fundamental core of the

Chinese government largely because the CCP was the body that prevailed in the Chinese

Communist Revolution in 1949 to establish the People’s Republic of China (Shigong 2010).

Accordingly, all local political parties are nationally controlled, and their existence is affirmed only by

their cooperation with the ideology and demands of the CCP. Further, the absence of national

democratic elections prevents citizens from choosing their representation, and the only pathway for

turnover at the highest echelons of Chinese politics is promotion within the CCP (Guo 2007). Both

the existence of a single-party system and the absence of democratic elections relegate the PRC to

nondemocracy by nearly all standard criteria, including the criteria recognized in this research from
18

Chiebub, Gandhi, and Vreeland. Effectively, the CCP is able to pursue any action or measure it

wants without regard for the passions and concerns of its citizens.

        As a state that has seen its geopolitical power soar since economic integration with the

developed world in the late 1900s, China’s regional and global military power is beginning to rival

that of the United States. In summarizing a 2019 Chinese defense white paper, Anthony H.

Cordesman of the Center for Strategic and International Studies argues: “[The white paper] flags the

fact that America and China are now competing superpowers, and that China’s growing military

forces are developing to the point where they will be able to challenge the United States”

(Cordesman 2019: 1). As its established primary rival, I will discuss Chinese military power relative

to the United States.

        According to the National Material Capabilities database from the Correlates of War Project,

the PRC received a CINC score in 2012 of 0.218166 to the United States’ 0.139352. As such, the

PRC had an average access to almost 22% of capability within the international system in 2012 as

compared to the United States’ nearly 14% (Correlates of War 2017). As discussed earlier, there are

scholars that disagree with the validity of CINC to estimate capability due to the fact that highly

populated states will receive inflated capability based on high total and dense urban populations

(Beckley 2018). As the most populous country in the world with several of the largest urban

populations globally, I find it highly likely that population positively inflated PRC’s 2012 CINC

score. Material power indicators like GDP per capita that check for population (Beckley 2018)

indicate that China’s national material power is likely lower than the US: data from the World Banks

shows that China’s 2017 GDP per capita was a meager $8,826.99 (USD) to the United States’

$59,531.66 (USD).

        China’s population has historically inflated CINC scores during periods of Chinese history

where the implications of their CINC scores do not make logical sense. For example, between 1911
19

and 1949 China was largely an underdeveloped state that was dealing with civil conflict between the

nationalists and communists following the fall of the Qing dynasty while also suffering a terrible

defeat in the First Sino-Japanese War. During the same time, the Soviet Union engaged successfully

in both World Wars and emerged as one of the two major global powers in the post-WWII era.

Conventional logic would predict Soviet capability to be much higher than China’s, but from 1911-

1949 China held an average CINC score of 11.5% while the Soviets held an average score of 12.8%.

Logically, one would expect the disparity in capability between these two states to be much larger

during this time period. The small CINC disparity between Russia and China during this time period

is a testament to the fact that China’s CINC score is inflated by its exceptionally large total

population. After checking for population’s effect, it is assessed that the United States likely

exercises a material power advantage over China.

        Given the provided analysis on the independent variables within the context of China, my

argument would predict a higher degree of use on the dependent variable. Due to the likelihood that

a rising and developing China is at a smaller military disadvantage relative to the United States than

Russia is, a higher degree of use is associated with the implications drawn from China’s score on the

independent variables. However, a lower degree of higher use is warranted for two specific reasons

derived from observations performed on the dependent variable: 1) There are no attributable cyber

activities to China that can be considered an act of strategic psychological cyberwarfare, but its

extensive campaign of cyber espionage could be easily re-configured for such capabilities; and 2)

Chinese military doctrine since the 1990s has begun to embrace concepts that are consistent with the

development of strategies for the use of strategic psychological cyberwarfare.

        Currently, there are no significant studies that have proven examples of Chinese cyber

activities containing elements of strategic psychological cyberwarfare. Primarily, the PRC has tailored

its cyber capability to supplement technological and economic development via cyber espionage
20

(Carr 2011). Chinese state hackers have targeted US defense agencies and private contractors by

stealing troves of data and intellectual property critical to research and development in areas like

missile technology and naval warfare (Carr 2011). These activities may not strictly fall under

elements of strategic psychological cyberwarfare, but the PRC has effectively demonstrated the

cyber capability necessary to pursue such a strategy if desired. Interestingly enough, there are

unverified reports of Chinese-government linked social media accounts spreading targeted

disinformation campaigns through troll farms to influence the outcome of the 2020 Taiwan

presidential election (Allen-Ebrahimian 2020). Although it may be proven differently in the future, it

is assessed that China’s cyber activities do not exhibit elements of strategic psychological

cyberwarfare and do not meet the specified criteria to be considered a high-use case within the first

criterion of the dependent variable.

        Chinese military doctrine began to take note of high tech’s integration within military

operations after the United States secured an overwhelming victory in the First Gulf War against an

Iraqi force who received its arms and implements from Russia and China (Carr 2011). Chinese

military strategy accordingly adopted the concept of ‘informatization,’ which refers to the application

of information technology to command, intelligence, training, and weapons systems (Kanwal 2009).

This concept also inspired the PRC to raise an ‘army’ of private citizen hackers who can facilitate

hacking campaigns against China’s adversaries (Kanwal 2009). Interpretively, such a strategy can be

easily recalibrated to wage strategic psychological cyberwarfare via online troll farms. Broadly, the

PRC views developing capability in cyberspace as a way to level the playing field against the United

States, who exercises technological superiority over China (Kanwal 2009). Further, experts like Kate

Farriss have argued that China has embraced an increasingly broad view of information warfare to

emphasize aspects like psychological operations and deception (Carr 2011). While a lack of

significant attributable examples does not allow an evaluation of Chinese cyber doctrine in practice,
21

it is clearly understood that China is embracing military doctrine that is supportive of psychological

manipulation and deception in cyberspace.

        In addition to the fact that Chinese military doctrine is embracing cyberspace as an

asymmetric tool to facilitate operations that are deceptive and psychological in nature, the

implications drawn from the PRC contextualized within both independent variables support the

assignment of a higher degree of use on the dependent variable. However, the lack of significant

attributable examples and the fact that Chinese military disadvantages relative to the United States

are lower than that of Russia prompt the assignment of a medium-high degree of use on the

dependent variable for the People’s Republic of China.

                   iii. India

        India is a democratic state that exercises a relative military superiority over its primary rival,

Pakistan. Despite considerable conventional military capability and consistent cyber conflict with

Pakistan since 1998, India’s state cyber power is rather underdeveloped compared to other cases in

this study (Carr 2011). After discovering a Chinese variant of the Stuxnet worm on government

infrastructure and suffering multiple defacements to its most secure government website from the

Pakistan Cyber Army in 2010 (Carr 2011), India has been attempting to develop capabilities to

secure its domestic cyberspace by improving its cyber defenses (Hathaway et al. 2016). The 2013

National Cyber Security Strategy was designed to give India a visible path toward such a goal, but an

ill-defined implementation plan has delayed many of the deliverables that the 2013 strategy called for

(Hathaway et al. 2016). Currently, India is still conceptualizing how it plans to develop capabilities

and infrastructure to consolidate its cyber power. India is therefore assigned a low degree of use on

the dependent variable for India in Table 1.1 due to the absence of significant state cyber capability,

much less even utilizing capabilities with which the dependent variable is concerned.
22

        Similar in that most contemporary scholars implicitly characterize Russia and China as

nondemocracies, it is a relatively obvious reflection that India is a democratic state. Historically,

scholars point to India’s colonial experience before 1947 as catalyst for the cultivation of democratic

ideals within broad national ideology (Mehta 2012). Today India is a vibrant and competitive

parliamentary democracy whose politics are marked not by shared common interests but the ideal

that holding the state accountable is to gain access to its power and resources (Mehta 2012). The

existence of intense political competition among parties is a testament to the fact that citizens of

India are empowered to engage in national and regional politics. Institutionally, frequent competitive

elections and a constitutional separation of powers enables incumbent turnover and provides

citizens with a legitimate check on government power (Mehta 2012). Considerable voter turnout and

civilian control of the military are further indications that India meets not only broad requirements

to be a democracy but specific criteria such as that articulated by Cheibub, Gandhi, and Vreeland.

On the provided basis it is assessed that India is a democratic state whose citizens have an active

role in holding the state accountable and determining its future.

        The 1947 partition of India that resulted in the creation of the independently sovereign

Indian and Pakistani states created a lasting rivalry between the two powers who would both

eventually become armed with nuclear capabilities (Majeed 2013). Since then, on three separate

occasions the fierce India-Pakistan rivalry has resulted in full-scale war and startling nuclear

conflagration in 1998 over the historically-disputed Kashmiri peninsula (Majeed 2013). Long-lasting

disputes over territory remain and increasing Pakistani military cooperation with states India

considers to be hostile, such as China, present the most direct threat to India’s national security

(Iqbal & Amin 2016). Given that Pakistan is considered to be India’s primary rival, I will assess

India’s military power relative to Pakistan.
23

        Data from the National Material Capabilities databases suggest that India exercises a

considerable material power advantage with a 2012 CINC score of 0.0809 (8.09%) as compared to

Pakistan’s 0.0145 (1.45%) (Correlates of War 2017). According to these figures, in 2012 India had an

average access to capability within the international system that was nearly eight times higher than

that of Pakistan. Using data from the World Bank, net measures of capability reinforce the

conclusion drawn from CINC as Pakistan’s 2018 GDP per capita of $1,482.40 (USD) was

considerably lower than India’s 2018 GDP per capita at $2,010 (USD). Ultimately, scholars have

pointed to a larger economic base and a lasting three-decade expansion of military spending to be

the principal basis for India’s conventional superiority over Pakistan (Iqbal & Amin 2016).

        In considering India’s assigned score on both independent variables, I predict lower degrees

of use on the dependent variable. As a democratic and militarily superior state relative to its primary

rival, India does not have the option to bypass the passions of its citizens nor the impetus to

establish asymmetric advantages over Pakistan. Beyond the implications that be drawn from the

independent variables, the required observations made on the dependent variable substantiate

India’s assignment as a low use case for two specific reasons: 1) There are no historic or

contemporary examples of utilizing the required capabilities as India is a rather underdeveloped

cyber power; and 2) State-level efforts aimed at developing national capability have been historically

insufficient.

        Despite being a country commonly associated with modern technological advancement,

India’s national defensive and offensive cyber capabilities are significantly underdeveloped

(Hathaway et al. 2016). It goes without saying that there are no examples of India using cyber

capabilities that are the focus of this research, but there is serious question as to what cyber

capabilities India does possess. Among others, a series of cyberattacks on India’s National Security

Council and Central Bureau of Investigation in 2010 woke India’s state officials up to the reality that
24

an unsecure cyberspace contains troubling implications for domestic and national security

(Hathaway et al. 2016). Accordingly, India has set forth a broad initiative to develop cyber capability,

secure domestic cyberspace, and increase awareness: the 2013 National Cyber Security Strategy

(Hathaway et al. 2016). The 2013 strategy called for a variety of action items and goals aimed at

primarily developing India’s cyber defense and attack resiliency (Hathaway et al. 2016). Despite clear

goals and intentions, a severe lack of implementation planning blurred the lines of responsibility

between ministries and created a substantial gap between expectations and actual national readiness

to confront India’s cyber threats (Hathaway et al. 2016). One of the central demands of the 2013

strategy was to create a central coordinating body to oversee the strategy’s development (Hathaway

et al. 2016), and this concept later became the idea behind India’s sluggish and so far incomplete

creation of the Defence Cyber Agency (DCA). As of October 2019, state officials in India are still

conceptualizing how the DCA is going to function and whether or not it will cooperate or be fully

integrated with the Indian Armed Forces (Chawla 2019).

        Based on these observations it is clear that India is in the early stages of developing its state

capability in cyberspace. Combined with the fact that results in capability or doctrine development

thus far have not materialized, India’s underdeveloped cyber power requires an assignment of a low

degree of use on the dependent variable.

                   iv. United States of America

        As a democracy whose military power is substantially greater than its primary rival’s, the

United States of America is arguably the premier cyber power on the international scene in terms of

the predominance and complexity of its capabilities. Historically, the United States has focused the

core development and use of its cyber capabilities for CNA operations (Carr 2011). Unlike Russia

and China who see information warfare as an asymmetric tool, the United States has historically
25

conceptualized information warfare as a way to harden existing cyber and conventional deterrence

with adversaries (Carr 2011). In all likelihood, the most complex computer network attack ever

created was developed by the United States and implanted by Israel (Lindsay 2013). In 2010, Iranian

officials noticed malfunctions with internal computers at the Natanz uranium enrichment facility

and eventually discovered a piece of malware – which became known as Stuxnet – that was slowly

sending thousands of uranium centrifuges at Natanz into overdrive so that the centrifuges were

incapable of producing viable weapons-grade uranium (Lindsay 2013). The attack on Natanz

sparked considerable fear among the international community as to the potential for cyberattacks to

produce kinetic effects. Despite obvious capability for CNAs, there are no examples that indicate

the United States has utilized strategic psychological cyberwarfare capabilities. This data point is

further complicated by the fact that the Trump administration is re-posturing American cyber

doctrine to embrace a more offensive-minded strategy when it comes to information warfare.

Considering these conflicting observations and the implications drawn from the independent

variables, the United States was properly assigned a medium-high degree of use on the dependent

variable in Table 1.1.

        Compared to the other cases in this research, it is the most obvious that the United States

meets minimalist standards to be considered a democracy. American citizens can vote in a myriad of

local, state, and national contested elections on a consistent basis to determine their governmental

representation. Further, the succession of office takes place according to institutional guidelines.

Beyond what is obvious electorally and institutionally, the overall body of research on public opinion

in the United States supports the idea that public opinion matters in American policymaking

(Shapiro 2011). According to Shapiro, the overall takeaways of public opinion research in the US

paints “a sanguine picture of democracy” (Shapiro 2011: 999). Given that regularly occurring and

contested elections have been a historically consistent feature of American politics and research
26

indicates that public opinion plays an important role in policy formulation, it is assessed that the

United States is a democratic state that is beholden to the passions of its citizens.

         The end of the Cold War and post-9/11 engagements reorganized American strategic

thinking away from prioritizing great power competition at the top of its security agenda. However,

the rise of China is now ushering in a new American embrace of great power competition7. In his

2001 book The Tragedy of Great Power Politics John J. Mearsheimer predicted that China and the United

States are destined to be rivals because Chinese economic growth will eventually translate into

military capability that will threaten American hegemony in Asia Pacific (Mearsheimer 2001). Given

mounting economic disputes, China’s aggression in the South China Sea and opposing political

ideologies, it is assessed that the United States considers China to be its primary geopolitical rival.

         Data from the National Material Capabilities database shows that China had average access

of 0.2181 (21.81%) to capability within the international system while the United States had an

average access of 0.1393 (13.93%) in 2012 (Correlates of War 2017). This interpretation mistakenly

implies that the United States is a weaker military power than China for the same reasons provided

in the corresponding section of the China case. It is highly likely that China’s CINC scores, thereby

its military power, are inflated due to its enormous total population. The interpretation that China is

a superior military power to the United States is even more misleading when American GDP per

capita is almost six times the size of China’s (World Bank 2018). Additionally, a significant number

of scholars consider the United States to be militarily superior. According to Carr, the key filter

informing and guiding Chinese security decision-making is American military superiority (Carr

2011). Brooks argues that a significant disparity in military capability is one of the reasons why the

United States does not immediately need to substantially increase its military efforts in response to

7
  In the Introduction of The Trump Administration’s 2018 National Security Strategy the administration articulates that
renewed competition with China and Russia “require the United States to rethink the policies of the last two decades”
(2018 NSS: 3)
27

China’s economic growth (Brooks et al. 2012). Interpretively, the China threat does not

contemporarily require the United States to develop capability and strategy outside of existing

deterrence.

        Considering the observations made thus far on the United States, I predict a lower degree of

use on the dependent variable given that the United States is a democratic state who is militarily

superior to its primary geopolitical rival China. Beyond the implications that can be drawn from the

independent variables, the United States was coded as a medium-high use case on the dependent

variable based on the following observations: 1) There are no public examples of the United States

utilizing cyber capabilities whose explicit goal is strategic psychological manipulation, although the

United States has a history of using tactical psychological capabilities; and 2) The Trump

administration is embracing a cyber doctrine that creates a more aggressive American posture

toward information warfare and cyberspace more broadly.

        The United States has utilized psychological operations and information warfare in a number

of capacities since WWII. During the Cold War, the United States adopted the use of information

warfare and tactical propaganda to counter the ideological threat of Communism that registered

below acceptable thresholds of escalation (Robinson et al. 2018). The core of this effort during the

Cold War was the 1953 creation of the United States Information Agency (USIA). USIA was

dedicated to characterizing American policy and ideology in a credible and appealing light to foreign

audiences until it was disbanded in 1999 (Robinson et al. 2018). During the both Iraq wars,

information operations were largely used in a tactical capacity to undermine the authority of specific

leaders and spread disinformation (Robinson et al. 2018). For example, the United States released

photographs of Saddam Hussein in 2003 that depicted him in a broken and disorderly condition so

as to undermine his support and lend credence to Coalition claims that he had been captured

(Robinson et al. 2018). Given these examples it is quite apparent that the United States is willing to
You can also read