Skip to main content

Deterrence in the 21st century: List of Abbreviations

Deterrence in the 21st century
List of Abbreviations
    • Notifications
    • Privacy
  • Project HomeDeterrence in the 21st Century
  • Projects
  • Learn more about Manifold

Notes

Show the following:

  • Annotations
  • Resources
Search within:

Adjust appearance:

  • font
    Font style
  • color scheme
  • Margins
table of contents
  1. Contents
  2. Foreword
  3. Preface
    1. Introduction
  4. Section I Deterrence as an Evolving Concept
    1. 1 Deterrence Is Always about Information: A New Framework for Understanding
    2. 2 Nuclear Crisis Management for the Information Age
    3. 3 Deterrence by De-legitimization in the Information Environment: Concept, Theory, and Practice
  5. Section II Wider Strategic Context and Experiences
    1. 4 Understanding Russia’s Approaches to Information Warfare
    2. 5 The Evolution of China’s Information Exploitation of COVID-19
    3. 6 Deterrence in the Gaza Conflict: Hamas Case Study Analysis
    4. 7 Resilience as a Framework for Deterrence in the Information Age: Lessons Learned from Israel about Information and Influence Operations
  6. Section III Canada’s Context
    1. 8 Deterrence and Strategic Disinformation: An Overview of Canada’s Responses
    2. 9 Exit, Voice, or Loyalty? Functional Engagement as Cyber Strategy for Middle Power Statecraft
  7. Section IV Emerging Tools and Approaches
    1. 10 Digital Tribalism and Ontological Insecurity: Manipulating Identities in the Information Environment
    2. 11 Deterrence for Online Radicalization and Recruitment in the Twenty-First Century
    3. 12 Assessing Influence in Target Audiences that Won’t Say or Don’t Know How Much They Have Been Influenced
    4. Conclusion
    5. Afterword
    6. Postface
  8. List of Abbreviations
  9. About the Authors
  10. Index

List of Abbreviations

AAA Actor and audience analysis

AIDS Acquired immunodeficiency syndrome

AMP Affect-misattribution procedure

APA American Psychological Association

ASEAN Association of Southeast Asian Nations

AUM Anxiety/uncertainty management theory

BBC British Broadcasting Corporation

BMD Ballistic missile defense

CAF Canadian Armed Forces

CCP Chinese Communist Party

CDC Centers for Disease Control and Prevention

C4ISR Command, control, communications, computers, intelligence, surveillance, and reconnaissance

CIA Central Intelligence Agency

CIDB Canadian Incidents Database

CNO Computer network operations

COGAT Coordinator of Government Activities in the Territories (Israel)

COTS Commercial off-the-shelf

CPD Central Propaganda Department (People’s Republic of China)

CPI Cyber Power Index

CSE Communications Security Establishment

CSIS Canadian Security Intelligence Service

DCCC Democratic Congressional Campaign Committee

DDOS Distributed denial of service

D5 Degrade, deny, disrupt, destroy, deceive

DND Department of National Defence

DOD Department of Defense

DRDC Defence Research and Development Canada

EC Error choice

EFP Enhanced Forward Presence (NATO)

EP Evaluative priming

EU European Union

EW Electronic warfare

FBI Federal Bureau of Investigation

5G Fifth-generation telecommunications network

FSB Federal’naya sluzhba bezopasnosti Rossiyskoy Federatsii (Federal Security Service; Russian internal security agency)

FTF Foreign terrorist fighters

G7 Group of Seven

G20 Group of Twenty

GAC Global Affairs Canada

GGE Group of Governmental Experts

GRM Gaza Reconstruction Mechanism

GRU Glavnoye Razvedyvatelnoye Upravlenie (Main Intelligence Directorate; Soviet and Russian military intelligence)

HIV Human immunodeficiency virus

IAF Israeli Air Force

IAT Implicit association task

ICC International Criminal Court

ICS/SCADA Industrial control systems/supervisory control and data acquisition

IDF Israel Defense Forces

IE Information environment

IHL International humanitarian law

Incel Involuntary celibate

IO Information operation

IR International relations

IRA Internet Research Agency

IRB Institutional Review Board

ISIS Islamic State of Iraq and Syria

IT Information technology

ITW/AA Integrated tactical warning and attack assessment

IW Information warfare

KGB Komitet Gosudarstvennoy Bezopasnosti (Committee for State Security; Soviet internal security and foreign intelligence agency)

LET Lost email technique

LLT Lost letter technique

LW Legal warfare

MAD Mutually assured destruction

MIIT Ministry of Industry and Information Technology (People’s Republic of China)

NATO North Atlantic Treaty Organization

NCSA National Cyber Security Authority (Israel)

NC3 Nuclear command, control, and communication

NDM Naturalistic decision making

NIS New Israeli shekel

NIST National Institute of Standards

OAS Organization of American States

ODNI Office of the Director of National Intelligence

OSCE Organization for Security and Cooperation in Europe

OSINT Open-source intelligence

OST Ontological security theory

PGS Prompt global strike

PLA People’s Liberation Army (People’s Republic of China)

PRC People’s Republic of China

PRC Popular Resistance Committees (Gaza)

PSYOPS Psychological operations

QR Quick response

R&D Research and development

RCMP Royal Canadian Mounted Police

RPG Rocket-propelled grenade

RRM Rapid response mechanism

RT Russian state-controlled media organization (formerly known as Russia Today)

SCO Shanghai Cooperation Organisation

SDF Syrian Democratic Forces

SIOP Single integrated operational plan

SITE Security and Intelligence Threats to Elections

SSF Strategic Support Force

SSHRC Social Science and Humanities Research Council

START Strategic Arms Reduction Treaty

UN United Nations

UNHCR United Nations High Commissioner for Refugees

USCYBERCOM United States Cyber Command

VPN Virtual private network

VTS Voice of the Strait

VTSM Violent transnational social movements

VUCA Volatile, uncertain, chaotic, and ambiguous

WHO World Health Organization

WMD Weapons of mass destruction

Annotate

Next Chapter
About the Authors
PreviousNext
Deterrence in the 21st Century
© 2024 Eric Ouellet, Madeleine D’Agata, and Keith Stewart
Powered by Manifold Scholarship. Learn more at
Opens in new tab or windowmanifoldapp.org