Skip to main content

Deterrence in the 21st century: Index

Deterrence in the 21st century
Index
    • Notifications
    • Privacy
  • Project HomeDeterrence in the 21st Century
  • Projects
  • Learn more about Manifold

Notes

Show the following:

  • Annotations
  • Resources
Search within:

Adjust appearance:

  • font
    Font style
  • color scheme
  • Margins
table of contents
  1. Contents
  2. Foreword
  3. Preface
    1. Introduction
  4. Section I Deterrence as an Evolving Concept
    1. 1 Deterrence Is Always about Information: A New Framework for Understanding
    2. 2 Nuclear Crisis Management for the Information Age
    3. 3 Deterrence by De-legitimization in the Information Environment: Concept, Theory, and Practice
  5. Section II Wider Strategic Context and Experiences
    1. 4 Understanding Russia’s Approaches to Information Warfare
    2. 5 The Evolution of China’s Information Exploitation of COVID-19
    3. 6 Deterrence in the Gaza Conflict: Hamas Case Study Analysis
    4. 7 Resilience as a Framework for Deterrence in the Information Age: Lessons Learned from Israel about Information and Influence Operations
  6. Section III Canada’s Context
    1. 8 Deterrence and Strategic Disinformation: An Overview of Canada’s Responses
    2. 9 Exit, Voice, or Loyalty? Functional Engagement as Cyber Strategy for Middle Power Statecraft
  7. Section IV Emerging Tools and Approaches
    1. 10 Digital Tribalism and Ontological Insecurity: Manipulating Identities in the Information Environment
    2. 11 Deterrence for Online Radicalization and Recruitment in the Twenty-First Century
    3. 12 Assessing Influence in Target Audiences that Won’t Say or Don’t Know How Much They Have Been Influenced
    4. Conclusion
    5. Afterword
    6. Postface
  8. List of Abbreviations
  9. About the Authors
  10. Index

Index

Note to reader:

Names using the definite article al are indexed under the subsequent letter in the term, e.g. al Qaeda appears under Q, not A.

t denotes an in-text table.

Able Archer (1983), 55

Abu Ali Express (blogger), 174

Abu Ibrahim. See al Qaisi, Zuhir

action, pre-emptive, 25, 50, 57, 106, 108, 155, 202, 253, 255-57, 259, 337, 340. See also information environment

active measures, 3, 12, 85, 163, 165-66. See also KGB; Russia, information operations of

Agardh-Twetman, Henrik, 72

Ahrar al Sham, 279

Alaska, 51

Aleppo, 281

Almog, Doron, 153

al Aloul, Ibrahim, 146

alternative facts, 3, 13

alternative narratives, 73, 296, 345

American Psychological Association, 275

Amidror, Yaakov, 155-56

anocracy, 33

Antalya, 283

Antifa, 287-88

anti-Semitism, 193, 249, 290

anxiety, 30, 169, 237, 239, 245, 247-51, 259-61, 288, 332; anxiety/uncertainty management (AUM) theory, 250; economy and, 271; public health and, 271

Argentina, 213, 215

Armstrong, Michael, 158

artificial intelligence, 27, 167, 199

Aryan Nations, 288

Aryan Resistance Movement, 289

ASEAN. See Association of South East Asian Nations (ASEAN)

al Assad, Bashar, 269, 278

Association of South East Asian Nations (ASEAN), 226

asymmetric warfare, 68, 172, 194, 219

attacks, kinetic, 41-42, 164, 175, 197, 302. See also attacks, non-kinetic

attacks, non-kinetic, 86, 197, 302, 333

attitude measurement, 305-321, 322nn1–3, 344; affect-misattribution procedure (AMP), 314-15, 317, 321; direct/explicit measures, 305; error choice technique (EC), 309-10, 317, 321; evaluative priming (EP), 312-14, 317; implicit association task (IAT), 311-15, 317; indirect/implicit measures, 304, 306-311, 316-20; lost e-mail technique (LET), 307-308; lost letter technique (LLT), 307-309, 319-20; standardized behavioural assessment, 309, 320

Austin, Lloyd, 24-25

Australia, 128, 173, 177, 213, 215, 229, 277

autocracy, 33, 72, 241

al Awlaki, Anwar, 279

al Baghdadi, Abu Bakr, 294

Baghouz, 280, 282, 284, 294

Balkans, wars in (1990s), 53

ballistic missile defences (BMD), 56; NATO-Russia collaboration and, 56-57

Baltic, the, 87, 89, 92, 94, 203

Batyuk, Vladimir, 42

BBC. See British Broadcasting Corporation (BBC)

Belgium, 53, 173, 177

Bellingcat, 174, 341

belonging, need for, 237, 239-41, 244-46, 248, 250, 253, 259-61, 285, 293, 296, 298, 332. See also tribes/tribalism

Bensouda, Fatou, 154

Berlin, 45; Berlin Wall, fall of, 327

Biden, Joe, 156. See also United States

Bing, 133

Black Lives Matter, 260

blackmail, 87, 91

Blair, Bruce, 49

Blood and Honour, 294

Bloomberg, 127

BMD. See ballistic missile defences (BMD)

Bolton, John, 170

booby traps, 149-52. See also Hamas

border walls, 249

Bosnia, 53

bots, bot networks, 90, 97-100, 102, 192. See also propaganda; Twitter

Brazil, 213

Breaking the ISIS Brand Counter Narrative Project, 296

Brennan, John, 105

Brinkel, Theo, 72-75

British Broadcasting Corporation (BBC), 135, 342

Brooker, Guy, 171

Bucharest,291

Bulgaria, 342

Bulletin of the Atomic Scientists, 8

Bystrov, Mikhail, 99

Cambridge Analytica, 102, 241

Cambridge University Press, 130. See also China, information warfare of

Canada, 1, 5, 71, 81-82, 213, 215, 229, 268, 277, 283, 285, 287, 291, 304, 311-14, 328; Atlantic Canada, 295; China, threat from, 226; conspiracy theories in, 8; cyber capabilities of, 226-27; cyberspace, position in, 225; cyber threats to, 225-28; far right in, 269-71, 284-92, 294-95, 297-98; far right in rural areas, 295; functional engagement, candidate for, 227-28; functional principle, use of, 224-25, 227; internationalism of, 226; Iran, threat from, 226; ISIS, members of and, 278-84, 296-97; jihadis and, 267-69, 270, 273, 278-84, 293, 297; multilateral groups, participation in, 226; North Korea, threat from, 226; racism in, 8; Russia, threat from, 226; Sikhs in, 7; terror list of, 294; Toronto, 18, 267-68, 279; values of, 106; violent extremism in, 201, 267-68, 271, 273, 279, 284, 295, 297; white supremacists in, 269, 273, 284-92. See also Canada, Government of; Canadian Armed Forces (CAF); Canadian Security Intelligence Service (CSIS); COVID-19; disinformation, Canada and; foreign terrorist fighters (FTFs); middle powers

Canada, Government of, 9, 106; Anti-Terrorism Act, 294; Bill C-11 and, 9; Bill C-59 (An Act Respecting National Security Matters) and, 227; Consumer Privacy Protection Act, 9; Critical Elections Incident Public Protocol, 200; defence policy of (2017, Strong, Secure, Engaged), 227; Elections Modernization Act (2019), 199; narrative strategy of, 106; National Cyber Threat Assessment (2020), 226; National Security Act (2017), 203; Personal Information and Data Protection Tribunal Act, 9. See also Canadian Indo-Pacific Strategy; Digital Charter (Canadian Federal government policy)

Canadian Anti-Fraud Centre, 328-29

Canadian Armed Forces (CAF), 9, 106, 226; disinformation, response to, 10-11; EFP in Latvia and, 10, 201; influence operations and, 301, 303-304, 315, 319, 321. See also radicalization

Canadian Incidents Database, 267

Canadian Indo-Pacific Strategy, 15

Canadian Liberty Net, 288-89

Canadian Security Intelligence Service (CSIS), 6, 9, 199, 226, 294; CSIS Public Report 2020, 6-7

cancel culture, 238, 242, 260

Capitol riot (January 2021), 5, 247, 271-72, 294; conspiracy theories and, 272; role of disinformation in, 5

Caucasus, 280

CCP. See Chinese Communist Party (CCP)

censorship, 31t, 33-34, 91, 97, 120, 128-29, 132, 172, 177, 330, 345n2. See also China, People’s Republic of; Israel; Russia

Central Intelligence Agency (CIA), 105

C4ISR. See command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR)

China Daily, 133

China, information warfare of, 120, 131-34, 171, 217; academia and, 127-28; Cambridge University Press and, 130-31; categories of, 120; Central Propaganda Department (CPD) of, 126–27; definitions of, 123; “informationalization”, 120-25, 330; information operations, 120-21; cyber warfare, 120, 124; computer network operations, 120, 127; electronic warfare, 120, 124; foreign media/video game companies, purchases of, 130; hacking and, 129–30; intellectual property theft and, 122, 217; international audiences, messaging for, 130, 133; journalists, use of, 126; legal warfare, 120; media (tv/radio), use of, 121, 126; non-official media and, 126; proxies, use of, 126; psychological operations, 120; Russia, cooperation with, 135–36; space-based operations, 120, 124; state media and, 126. See also China Daily; COVID-19, Chinese disinformation about; Global Times; People’s Liberation Army (PLA); propaganda; social media; WeChat; Weibo

China, People’s Republic of, 1, 7, 9, 24-25, 40-41, 48, 57, 122, 200, 211-12, 216, 220, 226, 229, 302, 329-30, 343, 349-50; anti-Asian hysteria and, 8; Canadian official view of, 15; censorship in, 33-34, 120, 128-29, 132, 330, 345n2; Central Military Commission of, 123; corruption in, 125; COVID-19, exploitation of, 136; Djibouti, base in, 125; foreign media organizations/journalists, treatment of, 127; “Golden Shield” (firewall) of, 129, 340; “Great Firewall of China” (firewall), of 330, 345n2; “Historic Missions for the New Phase of the New Century” (2004), 123; independent media, elimination of, 128; India, relationship with, 52; Ministry of Industry and Information Technology of, 124; National Strategy for Informationalization Development for 2006 to 2020 (2005), 123; Seventeenth Party Congress of, 124; Sixteenth Party Congress of, 123; society, weaponization of, 125-26; Tenth Five-Year Plan of (2001–2005), 123; war as constant, view of, 41, 330. See also China, information warfare of; Chinese Communist Party (CCP); COVID-19, Chinese disinformation about; hacks, hacking; People’s Daily; People’s Liberation Army (PLA); Shanghai Cooperation Organisation; Taiwan; Ukraine

China Quarterly, 130-31

Chinese Communist Party (CCP), 121, 330; information, perception of, 122

Christianity, 288, 291

Church of the Creator, 291

CIA. See Central Intelligence Agency (CIA)

Citizen Lab (University of Toronto), 7

Clausewitz, Carl von, 44, 165

Clinton, Bill, 345n2

Clinton, Hillary, 86-87, 98, 101-105; QAnon and, 272. See also hacks, hacking; Russia, information operations of

Cohen, Eli, 173

Cold War, 1, 11-12, 39-42, 44-46, 48-49, 51-52, 57, 63-64, 75, 176, 194, 224, 243, 330, 334, 340; general deterrence and, 40, 52, 67; inevitability of war, belief in, 47; peace/war boundary and, 41; SIOP and, 49. See also cyber weapons; deterrence, nuclear; propaganda

Combat 18, 294

command and control systems, civil-military, 50

command, control, and communications, 49, 54, 56. See also command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR); nuclear command, control, and communication (NC3)

command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) 41, 337. See also United States; weapons, nuclear

Commonwealth, The, 226

Communications Security Establishment (CSE), 9, 199; defensive cyber operations of, 202; offensive cyber operations of, 227

communications, strategic, 10, 83-84, 105-108, 195, 201, 339-41

compellence, 63, 66-68, 196, 204

conflict termination, 56

conspiracy theories, 4, 8, 87, 103, 133-34, 271-72, 332. See also Canada; Capitol riot (January 2021); jihadis; QAnon; white supremacists

Council of Europe, 216

Council on Foreign Relations, 211

counter-intelligence, 84

counter-narratives, 7, 17, 107, 197, 201, 275, 296, 339. See also alternative narratives

counter-radicalization, 17

counterterrorism 67-68, 73, 175, 243, 267, 273, 292, 297, 334. See also social media

COVID-19 1, 7-8, 31, 175, 248, 250, 260, 271-72, 274; anti-Asian feelings and, 271; bioweapon origins and, 169, 272; Canadian political establishment and COVID-19, 272; disinformation about, 5-6, 8-10, 131-35, 168, 193, 272, 328; fraud, financial losses caused by, 328-29; hate crimes and, 271; as “infodemic”, 169; origins of, 1, 6, 8; Trump administration and, 119; US origin, rumours about, 132-33; vaccines against, 5, 170; Wuhan Seafood Market and, 132. See also COVID-19, Chinese disinformation about; Department of National Defence (DND); radicalization; Russia

COVID-19, Chinese disinformation about: attacks on credibility of other countries, 131; Canada, attacks on, 133; censorship and, 132; evolution of, 134-36; deaths, disinformation about, 136; foreign diplomats, role of, 132; Foreign Ministry, role of, 132; Fort Detrick, rumours about, 133; image of China as proactive and, 131-36; international audiences, messaging for, 132-33, 135; as largest global contributor to COVID disinformation, 119, 131; messaging, volume of, 134; nature of virus, rumours about, 132; news of outbreaks, suppression of, 131-32; role of officials in, 131; Russia, cooperation with, 135; United States, attacks on, 132-35; vaccine safety, attacks on, 5, 119, 132; viral origins, disinformation about, 6, 8, 14, 131-34; West, attacks on, 132-35; western social media content and, 132-36; Wuhan and, 132-33

CPI. See Harvard Belfer Center Cyber Power Index (CPI)

crisis management, 44-51, 335; communication, disruption of, 48-49; cyber-attacks, effect of, 48-52; disinformation during, 49-50, 54; messaging and, 45; nuclear crisis management, 39-40, 44, 49-52, 54, 335-37; signalling and, 44; time pressures and, 45-47, 49-50

Cruz, Ted, 98

Cryptic Studios, 130

CSE. See Communications Security Establishment (CSE)

CSIS. See Canadian Security Intelligence Service (CSIS)

Cuba, 46, 50. See also Cuban Missile Crisis

Cuban Missile Crisis, 12, 14, 46, 50-51

cyber-attacks, 25, 32, 46, 54, 86, 167, 169, 174, 180, 193, 203, 321, 338; attacks from cyber, 30, 31t; attacks in cyber, 29-30, 31t; attacks on cyber, 28-29, 31t, 32, 175, 342; attacks via cyber, 30-31, 31t, 33; attributes of, 43t; data attacks, 29-30; effects/impact of, 25-26, 28-34; falsely detected attacks and, 46; infrastructure attacks, 28-29, 55; Internet, attacks on, 30; NC3, attacks on, 40-42, 44, 46-50, 54, 57; obfuscation during, 28, 49-51; psychological effects of, 51; range of, 43; typology of, 28-31, 31t, 43t; undetected attacks and, 46; vulnerabilities to, 172. See also crisis management; disinformation, Canada and; hacks, hacking; Russia, information operations of; TV5 Monde, cyber-attack on; Ukraine; weapons, nuclear

cyber-bullying, 332

cyber defence, 195, 199-200, 223, 226, 343

cyber diplomacy, 223, 226

cyber escalation, 218, 228

cyber espionage, 29, 71, 211, 217, 223-24, 227

cyber-nuclear relationship, 40-43, 43t, 46-50, 333. See also crisis management

cyber operations, 32, 42, 54, 165, 197, 211, 213, 216-23, 226-29, 331, 337; defensive, 202, 227; offensive/aggressive, 32, 42, 202, 222, 226-27

cyber persistence, 213, 218-19; functional engagement and, 223-24, 229; interconnectedness and, 219; persistent engagement and, 223, 229, 343; theory of, 223, 228-29. See also cyberspace; middle powers; United States Cyber Command (USCYBERCOM)

cyber reconnaissance, 124

cyber resilience, 165, 343; defined, 165, 180

cyber security, 23, 25, 30, 96, 180, 216; approaches towards, 25, 32; cyber hygiene and, 32-33; deception and, 40, 42; D5 and, 40; liberal states and, 216. See also cyber-nuclear relationship; information security

cyber sovereignty, 216

cyberspace, 26-28, 31, 57, 197, 216-22, 225-29, 243, 329; ambiguous/multidimensional nature of, 27-28; deterrence, practicality of in, 32; environment of, 211; illiberal ideas of, 220; international law and, 216-17; operational domains, impact on, 211; persistent engagement, strategy of, 197, 213, 221-22; stability/instability of, 216, 220, 225, 227-29; tacit bargaining and, 218-21, 223-24, 229. See also Canada; norms, cyber; United States; United States Cyber Command (USCYBERCOM)

cyber-stalking, 332

cyber verification, 42

cyber warfare, 44, 48, 84, 120, 125, 168. See also China, information warfare of; Hamas; cyber-attacks

cyber weapons, 41; arms control and, 42-43; Cold War era and, 42, 50; D5 abilities and, 41

DC Leaks, 89, 102

DDOS. See distributed denial of service attacks (DDOS)

deception, deception campaigns, 40-42, 84, 120, 154, 167, 172, 176, 189, 321

deepfakes, 167, 201, 241, 251

de-escalation, 54-56, 156

defectors, 273, 276, 278, 344

Defence Research and Development Canada (DRDC), 2, 11

degrade, deny, disrupt, destroy, deceive (D5), 41, 47, 49. See also cyber security; cyber weapons; nuclear command, control, and communication (NC3)

democracy, 5, 33, 72, 191, 241, 301-302; efforts to undermine, 6, 8, 31, 72, 81-82, 105, 164, 193; promotion/defence of, 106-108; values of, 6, 83, 106, 296. See also polarization/division; tribes/tribalism

Democratic Congressional Campaign Committee, 87, 96. See also hacks, hacking

democratic deterrence (concept), 204

Democratic National Convention, 87. See also hacks, hacking

Democratic Party (US), 96, 102

democratic suasion (concept), 191, 204-205

Denmark, 173, 177, 213

Department of National Defence (DND), 1-2, 9, 11, 106, 199, 201; COVID-19 pandemic and, 9-10; disinformation, response to, 9-11; Public Affairs office of, 9. See also Defence Research and Development Canada (DRDC)

Department of Public Safety (Canada), 199, 201

de-programming, 292

de-radicalization, 12, 75, 286, 290. See also counter-narratives; de-programming; disengagement

deterrence: capabilities for, 23, 26, 32, 257, 341-42; civil, 197; classical ideas about, 11-12; communication, importance of, 23, 333, 335-36; cost-benefit analysis and, 24-26, 66, 196-97; credibility, importance of, 23, 32, 333, 336; defined, 164, 190; denunciation, as form of deterrence, 72; economic, 197-98, 203; evolution of, 63-65, 190; fear, role of, 11; function of, 23; illusion of, 197; information and, 40, 197; information operations and, 40, 58; integrated deterrence, policy of, 24-25; kinetic, 144, 197; as means to counter disinformation, 3, 11, 13, 32, 329; non-kinetic, 68, 197; normative costs and, 202, 204; norms and, 70-71, 197, 202, 334-35; passive measures and, 12; perceived risk and, 39, 333; political, 153-54, 197, 203; psychology of, 26-27, 63, 197, 334-35; punctuated/cumulative nature of, 198; retaliation, reliance on, 32; scholarship of, 63-69, 73, 243; theory-to-policy transition of, 75. See also identities; terrorism; tribes/tribalism; trust. See also individual categories of deterrence

deterrence by counter-narrative, 197

deterrence by de-legitimization, 13-14, 65-66, 68-75, 197, 202, 334, 345; different views of, in scholarship, 73-75

deterrence by denial, 12, 15, 33, 57, 68-69, 73-75, 190, 195-96, 200-201, 204, 243, 254-57, 273, 295-98, 333, 338, 340, 344; strategic, 195; technical, 195. See also resilience; tribes/tribalism

deterrence by entanglement, 197, 202

deterrence by punishment. See deterrence by retaliation

deterrence by retaliation, 12-13, 33, 57, 67-69, 73, 190, 196, 202, 243, 254, 257-58, 335. See also tribes/tribalism

deterrence, nuclear, 11-12, 14, 24, 39, 41, 43t, 44, 54, 57, 144, 165; US attacks on Japan (1945), influence of, 24

deterrence theory, 63-68, 73-75, 190, 193-98, 243, 254, 332, 334; waves of, 63-66, 68, 194; first wave, 63, 65; second wave, 63, 65; third wave, 63-64; fourth wave, 64-65, 73, 194, 252-53; fifth wave, 65, 68, 73, 194

D5. See degrade, deny, disrupt, destroy, deceive (D5)

dictators, dictatorships, 121, 241, 272

Digital Charter (Canadian Federal government policy), 9

Digital Citizen Initiative (awareness campaign), 8

digital footprints, 319

digital literacy, 2, 339

disengagement, 286, 289-90, 297

disinformation, Canada and: academic research on, 6; costs, imposition of, 201-203; cyber-attacks, capability of, 203; education/awareness and, 200; foreign retaliation and, 15; international cooperation and, 199-200, 202; monitoring and, 201; normative costs and, 202, 204; policy on, 14-15, 329; public information about, 6-7, 15; quarantine concentration camps, disinformation about, 7; resilience and, 199-202, 340, 343; responses to, 191, 198-205; scope of, 7-8; securitization of disinformation and, 201; societal resilience and, 200. See also Communications Security Establishment (CSE); social media

disinformation (general): asymmetry and, 16, 168, 172, 174, 217, 219; computational propaganda and 4; critical thinking and, 173, 175, 195, 339; cyber domain/realm and, 26-28; definitions of, 2-6, 87, 191-93; education and, 2, 195, 338-39, 344-45; far right and, 5, 8; global nature of, 179; harm caused by, 1; laundering of, 193-94; rumours and, 3; terrorists/disinformers, similarities and differences between, 13-14; trolls and, 90. See also disinformation, Canada and; misinformation

disinformation, Internet and, 1, 3-4, 7, 31, 54, 92-95, 167. See also social media

disinformation, strategic, 54, 189-90, 193-99, 202-204, 343

distributed denial of service attacks (DDOS), 86

DND. See Department of National Defence (DND)

Doorn, Cees van, 73, 75

doxing, 286-88

DRDC. See Defence Research and Development Canada (DRDC)

echo chambers, 105, 191, 242

Egypt, 147-48, 151, 157, 287

8Chan, 271

elections and election interference, 1, 31, 93-94, 224, 228, 238, 328; Canadian election (2019), 6, 8, 200; European elections (2017), 81; French election (2019), 86; Israel and, 171; North Carolina, problems in (2016), 95; Russian election (2012), 96; US Presidential election (2016), 6, 81-82, 87, 90, 93-105; vote tampering and, 94-95; voter fraud and, 101; voter suppression and, 101-102. See also Elections Canada; hacks, hacking; Internet Research Agency (IRA); Russia, information operations of; social media; United States Cyber Command (USCYBERCOM)

Elections Canada, 199

electronic warfare (EW), 55, 84, 120, 124

Empire, Roman, 349

Epic Games, 130

escalation, 39-40, 44-45, 52-53, 56, 72, 144, 147, 218, 220, 222, 228, 246, 338, 345; escalation control, 52, 56; nuclear, 243. See also cyber escalation; de-escalation

Escape Hate Counter Narrative Project, 296

espionage, 26, 28; commercial, 226; economic, 217. See also cyber espionage

Estonia, 94, 176. See also Russia

Ethiopia, 152, 279

European Council on Foreign Relations, 153

European Parliament, 153

European Union, 5, 107, 152-53, 196, 200, 217, 277; General Court of, 153; Hamas and, 153. See also Council of Europe

EW. See electronic warfare (EW)

extremism, 201, 267-68, 271, 273, 279, 282, 284, 292-95, 297-98, 332; countering, 273, 284, 292, 295-96, 298; far right, 82, 200, 243, 269-70, 273, 288, 294-95; jihadis/Islamists, 243, 273, 282, 293, 297; online content and, 271-72, 292, 296; recruitment into, 271, 273, 292-93, 295-96, 298; social media, 271; white supremacist, 270, 273, 294-95, 297. See also Canada; far right; ISIS (Islamic State); propaganda; terrorism; white supremacists

Facebook, 90, 97-104, 179, 192, 242, 247, 260, 271, 290, 298, 318

fact-checking, 4, 176, 195

fake news, 3, 13, 89-90, 97, 107, 168, 173, 199, 241, 244

false information, 3, 86, 192, 329

far left, 13

far right, 5, 8, 13, 81, 89, 200, 243, 269-73, 275, 284-98; alcohol and, 289-90, 293; music and, 270, 285, 288, 293; underestimation of, 269, 293. See also Canada; Islamophobia; Neo-Nazis; Proud Boys; social media; white supremacists

FBI. See Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI), 96

Finland, 176

First Lebanon War, 171

First World War, 45, 52

Fischerkeller, Michael, 219-20

Five Eyes, 217, 226-27

5G networks, 7, 128; conspiracies about, 170

Floyd, George, 246

Foreign Intelligence Advisory Board (US), 55-56

foreign terrorist fighters (FTFs), 268, 293; Canadian FTFs, 268-69, 273, 278-84; motivations of, 268-69, 278-79, 281-82, 284. See also ISIS (Islamic State)

Formosa. See Taiwan

4chan, 271

France, 94, 226

Freeland, Chrystia, 200

Freeman Centre for Free Communication (Harvard), 169-70

FSB, 43

FTFs. See foreign terrorist fighters (FTFs)

functional engagement. See Canada; cyber persistence; middle powers

functional principle. See Canada; middle powers

Gab, 271

Gates, Bill, 249

Gaza Reconstruction Mechanism (GRM), 150-51

Gaza Strip, 143-44, 147-48, 154, 156-59, 351; anti-tunnel barrier along, 157; Jabalia, 148; Kerem Shalom crossing, 148; Khan Yunis, 148, 157; Rafah, 148; Shati, 148; Sufa crossing, 148; tunnels in, 143, 145-51, 154, 157-58. See also Gaza Reconstruction Mechanism (GRM); Hamas, 7 October 2023 attack of

genocide, 239, 251. See also identicide

George, Alexander L., 47

Georgia, 53, 55, 86, 94. See also Russia

Gerasimov, Valery, 302. See also Russia

Germany, 53, 94, 226

Get Cyber Safe (awareness campaign), 8

Giddens, Anthony, 247-49

Gilad Shalit, abduction of, 143, 148-49

Glazebrook, George, 213

Global Affairs Canada, 9-11, 199-200; international partnerships of, 200

globalism, 242, 260

globalization, 171, 237, 243, 248, 260, 331

Global Times, 130-31, 133

Google, 96, 100, 133, 179

Greatest Story Never Told, The (documentary), 272

GRM. See Gaza Reconstruction Mechanism (GRM)

Group of Governmental Experts, 217

GRU, 95-96. See also hacks, hacking

G7, the, 199, 216, 226; G7 Rapid Response Mechanism 199-200

G20, the, 216, 226

Guccifer 2.0. See hacks, hacking

gullibility, 5

Haaretz, 175

hacks, hacking, 29, 42-43; Black Shadow (Iran), 174; Cozy Bear (Russia), 96; Democratic Congressional Campaign Committee and, 96; Democratic National Committee hack (Hillary Clinton campaign, 2016), 42-43, 86-87, 94-97; French election campaign (Emmanuel Macron, 2019), 86; Guccifer 2.0, 43; Shirbit insurance company, attack on, 174; US Department of Defense and, 96; US Internal Revenue Service and, 95; US Joint Chiefs of Staff and, 95; US Office of Personnel Management and, 129-30; US State Department and, 95; VR Systems, hack of, 95. See also China, information warfare of; Russia, information operations of; spearphishing

Hajin, 280

Halutz, Dan, 153

Hamas, 143-56, 331, 336; air capability of, 145-46, 351; army of, 146; booby traps, use of, 150, 152; civilian casualty figures and, 154-55; cruelty of, 351; cyber warfare and, 175; deterrence of Israel and, 144, 150-58, 336, 351-52; disinformation campaigns of, 144, 152, 155, 336, 351; drones and, 145-46; humanitarian supplies, use of, 151; incendiary attacks of, 145, 148, 151, 156; Iran, links with, 147; Izz ad-Din al Qassam Brigades of, 148; Jerusalem terror attack (2001) and, 148; jihadi groups, rivalry with, 158; Kibbutz Ein Hashlosha, attack on, 149; Kibbutz Erez, attack on, 149; Kibbutz Netiv HaAsara, tunnel at, 149; Kibbutz Nir Am, attack on, 149; Kibbutz Sufa, attack on, 149; kidnappings and, 143, 148-49; Mengistu, Avera, disappearance of, 152; naval forces of, 146-47, 351; Nukhba, elite unit of, 146-47, 154; psychological warfare and, 145, 149, 159; restraint, view of, 155, 159; rocket attacks of, 143, 147, 151, 155-56, 158-59; smuggling and, 148; tunnels of, 143, 145-51, 154, 157-58; warnings to Israel, 143-44. See also European Union; Gaza Strip; Gilad Shalit, abduction of; Hamas, 7 October 2023 attack of; Israel; missiles/rockets; Popular Resistance Committees

Hamas, 7 October 2023 attack of, 351-52; brutality of, 351; ISIS, comparison with, 351

Hammerskins, 290

hardening, 67, 223, 338-39

Harvard Belfer Center Cyber Power Index (CPI), 226-27

Hatay, 279

hate speech, 4, 193

Heathrow Airport, 153

Hebrew, 172, 179

Heritage Front, 291–92

Hezbollah, 16, 173, 331, 351

Hirschmann, Albert, 212

hoaxes, 4, 87, 89, 272

Ho Chi Minh, 13

Holocaust, 285

Huawei, 128

human rights, 6, 71, 106

Hungary, 249; Hungarian language, 342

Hussein, Saddam, 12, 336

hybrid threats/warfare, 26, 34, 72, 94, 163-65, 182, 194-96, 201, 226; defined, 166-67, 205n1. See also asymmetric warfare; Russia

IAF. See Israeli Air Force (IAF)

ICC. See International Criminal Court (ICC)

ICS/SCADA. See industrial control systems/supervisory control and data acquisition (ICS/SCADA)

Idaho, 288

identicide, 238-39, 241, 251-52, 258, 260; defined 251; as precursor to genocide 251

identities, 69, 192-93, 197, 238-42, 244, 247-54, 258-61, 284, 286, 290, 308-309, 332, 344; autobiographical narratives and, 239, 242, 245-46, 251, 260-61; construction of, 242, 252-53; deterrence and, 253; false/stolen, 99-100; gender, 278; Islamic, 278; loss of, 243; self-identity, 247, 249-50; weaponization of, 239, 241. See also identicide

IDF. See Israel Defence Forces (IDF)

incels, 258, 270, 297

India, 7, 52. See also China

Indochina, 13

industrial control systems/supervisory control and data acquisition (ICS/SCADA), 228

influence operations, 84, 96, 165, 167-68, 172-73, 175, 177-78, 180-81, 301-304, 315, 319, 320-21, 322n1, 334, 338-39. See also Canadian Armed Forces (CAF); social media

information environment, 2, 9, 23, 41, 65, 70-75, 90, 157, 178, 190, 193, 203, 238, 301, 327-45; behavioural norms within, 70-71, 334-35; changes in, 327, 343; geographic boundaries and, 225, 329, 343; pre-emptive actions in, 340

information inoculation, 2, 164-65

information operations, 40, 58, 81-108, 165, 238, 241, 329-30, 339-41; countering, 105-108; definitions of, 192. See also deterrence; Russia, information operations of

information pollution, 3, 90

information security, 123, 128, 216; illiberal states and, 216

information warfare. See China, information warfare of; information operations; Iran; Israel Defence Forces (IDF); People’s Liberation Army (PLA); Russia, information operations of; social media; Soviet Union

Instagram, 90, 97-98, 100, 246

integrated tactical warning and attack assessment (ITW/AA), 46

intellectual property theft, 122, 217, 228. See also China, information warfare of; cyber espionage; espionage

intelligence, military, 43, 95, 148

International Criminal Court (ICC), 144, 154

international order, 212, 215-18, 220, 225; conflict between liberal/illiberal states over 218, 220

Internet, 1, 3-4, 9, 84, 93, 97, 104-105, 107, 130, 165-67, 176, 178, 181, 228, 238, 240-41, 244, 246, 283, 301-302, 317-19, 321, 329-30, 340-41; attacks on, 28-30; Internet of Things, 30; recruitment and, for terrorism/far right, 270-71, 274, 276-77, 283, 285, 292, 298; sock-puppet websites, 87, 107; tribalism and, 240, 246; usage of, in different countries, 244; Web 2.0, 327. See also disinformation, Internet and; ISIS (Islamic State); radicalization

Internet Research Agency (IRA), 90, 97-105, 221; criminality and, 100; Project Lakhta and, 98-99; Translator Project and, 98; US Presidential election interference (2016) and, 97-105. See also Bystrov, Mikhail; social media; United States Cyber Command (USCYBERCOM)

Iraq, 12, 150, 277, 281, 290, 293, 312; jihadis in, 268, 276, 281; Kurdish autonomous region of, 150; Nineveh Plains of 150; weapons of mass destruction and, 12

Iraq-Iran War, 171

Iran, 1, 9, 147, 155, 164, 200, 211-12, 220, 226, 302, 329; bots, use of, 173; cyber deniability and, 173; deterrence of, by Israel, 164; disinformation campaigns and, 170, 173; influence operations and, 173; information operations of, 170-71; Israel, actions towards, 171, 173; nuclear weapons and, 56; proxies, use of, 164, 173, 331, 351; Stuxnet and, 30; US view of (2018), 170. See also hacks, hacking; Hamas; Hezbollah; propaganda; social media

Iron Curtain, 330

ISIS (Islamic State), 69, 102, 149-50, 158, 164, 168-70, 179, 248, 267-68, 273-84, 293, 297, 351; attacks carried out by former adherents, 268; Caliphate and, 273, 278, 282-83, 293-94, 296; emni (intelligence) of, 268, 282; Internet, role of in recruitment, 274, 276-77; recruitment of foreign members, 268-69, 273-74; resurgence of, 193; torture and, 282; wilaya of, 293; women and, 275-77, 282, 293-94. See also al Baghdadi, Abu Bakr; Breaking the ISIS Brand Counter Narrative Project; Canada; Hamas, 7 October 2023 attack of; propaganda; radicalization; social media

Islam, 74, 269, 271, 278-79, 281-84, 287, 296-97; converts to, 283; hijrah, 269; shariah law and, 69, 101, 287; Shia Islam, 170; Sunni Islam, 293; takfir ideology, 278, 284. See also identities; Islamophobia; ISIS (Islamic State)

Islamic Jihad, 158

Islamic State. See ISIS (Islamic State)

Islamophobia, 101, 193, 269, 271

Israel, 143-56, 227, 329, 331, 336, 351; arrest of officials, threats of, 153-54; Border Police of, 156; border walls of, 249; censorship and, 172, 177; Coordinator of Government Activities in the Territories and, 151; deterrence against Hamas and, 144-45, 151, 159; drones of, 145-46; Emergency Protection Regulations (British Mandate) and, 177; farmers in, 145, 156-57; Iron Dome system of, 145; Kibbutz Ein Hashlosha and, 149; Kibbutz Erez and, 149; Kibbutz Netiv HaAsara and, 149; Kibbutz Nir Am and, 149; Kibbutz Sufa and, 149; Kibbutz Zikim and, 147; LahavOr (Light Blade) system of, 156; Ministry of Agriculture and Rural Development and, 156; Ministry of Defence and, 156; Ministry of Finance and, 156; Ministry of Foreign Affairs, 151; National Cyber Security Directorate of, 171, 177-78, 183n1; 916th Division of, 147; Palestinian prisoners, release of, 148; Press Ordinance (British Mandate) and, 177; Prime Minister’s Office of, 171; reputation, attacks on, 152-54; resilience as deterrence, 168, 174, 182; settlement policy of, 154; Shayetet, 13 147. See also anti-Semitism; Iran; Israel Defence Forces (IDF); Israel, operations of

Israel Defence Forces (IDF), 143-44, 147-50, 154-55, 158, 171; information operations and, 171-72, 175; public legitimacy/trust of, 171-72, 177; Spokesperson’s Unit of, 171; training and, 178. See also Israeli Air Force (IAF); Israel, operations of

Israeli Air Force (IAF), 147

Israel, operations of: Cast Lead (2008–2009), 143, 153, 155, 171; Grapes of Wrath (1996), 171; Guardian of the Walls (2021), 143, 154-56, 158; Protective Edge (2014), 143, 147, 150, 154; Pillar of Cloud (2012), 171; Returning Echo (2012), 144

Italy, 53

ITW/AA. See integrated tactical warning and attack assessment (ITW/AA)

Itzkovich, Nahum, 156–57

Jabhat al Nusra, 280

Jaish al Muhajireen wal Ansar, 280

Japan, 24, 128, 213, 217

Jenkins, Brian, 167

Jerusalem, 143, 158-59; East Jerusalem, 154. See also terrorism

Jervis, Robert, 24, 47

jihad, 278-79; digital jihad, 294

jihadis, 267-73, 278-84, 293, 295, 297; conspiracy theories and, 271; criminality and, 270. See also Canada; Iraq; Syria

Jones, Alex, 272

Judaism, 177, 285-86, 288-90. See also anti-Semitism

Kahane, Rabbi, 288

Kennedy, John. F., 46, 50-51

Kenya, 280

KGB, 3, 166, 169. See also FSB

Khomeini, Ayatollah, 170

Khrushchev, Nikita, 46, 51

Kotev, Guy, 177

Kruglanski, Arie, 293

Kuijck, Christina van, 74-75

Kuwait, 283

Laing, R. D., 247

Latvia, 10-11; Canadian embassy in, 10, 201; NATO Enhanced Forward Presence (EFP) in, 10, 201. See also Canadian Armed Forces (CAF); Russia

Levi, Ron, 74

liberalism, 4-5; efforts to undermine, 5, 8, 13; trust in, 5, 164, 172. See also cyber security; cyberspace; democracy; information security; international order; tribes/tribalism; trust

Libicki, Martin, 51

Life After Hate, 286, 289

Lithuania, 176

Liu Xiaobo, 129

Live Journal, 90

Livni, Tzipi, 153

logic bombs, 55

Long, Jerry Mark, 68-70, 75

Lovatt, Hugh, 153

McGill University 269

McInnes, Gavin, 270

Macron, Emmanuel, 86. See also hacks, hacking

mainstream news media, 7, 92, 103, 237

Malaysia, 213, 215

malware, 86, 91, 95, 221; NotPetya, 217

Marcus Aurelius, 349

Martin, Paul, 272

martyrdom, 150, 258

Mayadeen, 280

Menzies Lyth, Isabel, 249

Mexico, 249

middle powers, 211-13, 220, 223, 229; Canada as middle power, 213, 224-25, 229; characteristics of, 213-16; functional engagement and, 223-24, 229; functional principles and, 224-25; global/international order, place in, 215-16; influence of, 215; list of, 213-14; as low-risk/high-payoff cyber targets, 225, 229; persistent engagement and, 223-24; theoretical perspectives on, 214-15; vulnerabilities of, 223. See also norms, cyber

Minassian, Alek, 270

Mishpacha, 155

misinformation, 3, 39, 87, 163, 174, 176, 191-92, 199-201, 243-44, 272, 328, 339; different from disinformation, 192, 329

missiles/rockets, 14, 41, 46, 48, 55-56, 143, 147, 151, 155-56, 158-59; Grad rockets, 143; Jupiter ballistic missiles, 46; Pershing II ballistic missiles, 55; Qassam rockets, 143. See also submarines, nuclear ballistic

Moonshot CVE, 272

Mordechai, Yoav, 151

Morsi, Mohamed, 157

Mossack Fonseca, 98

Mosul, 149–50

Mubarak, Hosni, 157

Munich, 330

Muslim Brotherhood, 143, 157. See also Hamas

mutually assured destruction, 11

Nagasaki, nuclear attack on (1945), 54

National Institute of Standards and Technology, 165, 180

National Socialist Black Metal, 289-90

NATO. See NATO Association of Canada; North Atlantic Treaty Organisation (NATO)

NATO Association of Canada, 7-8; Centre for Disinformation Studies at, 7

naturalistic decision making (NDM), 337-38; “satisficing” and, 337

Navalny, Aleksei, 97

NC3. See nuclear command, control, and communication (NC3)

NDM. See naturalistic decision making (NDM)

Neo-Nazis, 270, 294. See also Blood and Honour; Combat 18

Netanyahu, Benajmin, 155-56

Netherlands, The, 53, 213, 215, 226, 229

New York Times, 127; Caliphate (podcast), 268

Nigeria, 213

Nord Stream 2 pipeline, 29, 32

norms, behavioural, 70-71, 249. See also deterrence; information environment; norms, cyber

norms, cyber, 205n2, 212-13, 216-21, 223, 226, 228-29; middle powers and, 212, 224, 226, 228-29; multilateral efforts to enforce, 212-13, 216-18, 222-23, 228-29

North Atlantic Treaty Organisation (NATO), 10, 46, 53, 56, 81, 107, 165, 190, 196, 200, 217, 226, 304, 333; doctrine, review of (2010), 54; expansion of, 349; nuclear alliance, characterized as, 54; Tallinn Manual of, 216; threat to Russia, characterized as, 81; See also Able Archer (1983); ballistic missile defences (BMD); Latvia

North Korea, 48, 200, 211, 226, 302, 343

Norway, 213, 215

nuclear command, control, and communication (NC3), 40, 42, 57; deception of, 46; D5 effects on, 51; disinformation and, 49, 53, 57-58; trustworthiness of, 48. See also cyber-attacks; Russia; United States

nuclear crisis management. See crisis management

OAS. See Organization of American States (OAS)

Obama, Barack, 42

Olmert, Ehud, 155

ontological security/ontological security theory (OST), 237-38, 241-42, 244, 247-52, 260

open-source intelligence technologies (OSINT), 174-75, 180, 341

Order, The, 288

Organization of American States (OAS), 226

OSCE. See Organization for Security and Co-Operation in Europe (OSCE) 226

Osinga, Frans, 65

OSINT. See open-source intelligence technologies (OSINT)

OST. See ontological security/ontological security theory (OST)

othering, 237, 248

Palestine, 249

Palestinian Authority, The, 150-51

Pamment, James, 72

Panama Papers, 98. See also Putin, Vladimir

Paris, 170

Parler, 247

paternalism, 34

patience, strategic, 44

Payne, Keith B., 45

pedophilia, 179

People’s Daily, 132

People’s Liberation Army (PLA), 121-23, 128; information warfare training centre of, 123-24; Strategic Support Force (SSF) of, 124

persistent engagement. See cyber persistence; middle powers; United States

Peshmerga, 149

P5 (nuclear establishment), 52

PGS. See prompt global strike (PGS)

PhotoDNA, 179

PLA. See People’s Liberation Army (PLA)

pluralism, 82, 242

Podesta, John, 87, 96. See also hacks, hacking

Poland, 248; Law and Justice Party in, 248; Polish language, 342

polarization/division, 90, 93, 101, 103, 182, 191, 193, 245, 272

Popular Resistance Committees, 144

populism, 17, 237-38, 242, 245-46, 248, 260

Portland (Oregon), 285

post-traumatic stress disorder (PTSD), 283, 286, 290

Prigozhin, Yevgeny, 99; Concord Management and Consulting and, 99; Putin, relationship with, 99. See also Wagner Group

Privy Council, 9

Project Implicit, 316

prompt global strike (PGS), 56. See also United States

propaganda, 24, 26, 33, 87, 89, 91-93, 97, 100, 120-21, 163, 329, 339, 341, 345; bots and, 99-100; Chinese, 8, 120, 122, 126, 130-31, 330; Cold War and, 1; computational, 4; countering, 335, 339-40; extremists and, 269, 292, 295; Iranian, 170; ISIS and, 280-82, 293-94; rehabilitation of term, 339, 345n3; resistance to, 33, 73; Russian, 89, 91-93, 97, 99, 107, 166, 168

Proud Boys, 269-70, 286-88, 294-95

proxies, 4, 6, 24, 66, 85, 89, 91, 126-27, 163-64, 167, 173, 329, 331, 351. See also China, information warfare of; Iran; Russia, information operations of

pseudo-science, 4

Psychological Defence Agency (Sweden), 33

psychological operations (PSYOPS), 84, 120, 145, 149, 159, 301, 303-304, 309. See also attitude measurement; China, information warfare of; Hamas

PSYOPS. See psychological operations (PSYOPS)

PTSD. See post-traumatic stress disorder (PTSD)

Putin, Vladimir, 42, 81, 83, 96, 98, 101, 105, 349; disinformation, use of, 53, 101; nuclear threats of, 53; Panama Papers and, 98; West, approach to, 81-82. See also Prigozhin, Yevgeny; Russia, information operations of

al Qaeda, 64, 69-70, 74-75, 158, 248, 267, 279, 293; adherents/recruits of, 69-70; violence of, 69, 71

al Qaisi, Zuhir, 144

QAnon, 260, 272; international following of, 272. See also Clinton, Hillary

Quebec, 7

racism, 8, 247, 285, 290-92. See also Canada; white supremacists

radicalization, 64, 68, 75, 268, 270, 297-98, 303, 332; Canadian Armed Forces members and, 290; COVID-19, impact of, 271-72; Internet, role of and, 270-71, 273, 276-93, 296, 298, 344; reciprocal radicalization, 293; Three N model and, 293. See also counter-radicalization; de-radicalization

Radio Free Europe, 330

Radio Liberty, 330

RAND Corporation, 167, 274

ransomware, 29

Raqqa, 280, 283-84

RCMP. See Royal Canadian Mounted Police (RCMP)

recruitment into extremist groups. See Internet; ISIS (Islamic State); social media; terrorism

Reddit, 271, 318

Reimer, Ofek, 71

Reporters without Borders, 126

resilience, 5, 11, 31t, 42, 68, 143, 157, 164-65, 168, 174-82, 191, 194-96, 199, 203-205, 335, 338-40, 343-44; defined, 165, 180, 195; deterrence by denial, link with, 72, 190, 195, 333, 338, 340. See also cyber resilience; disinformation, Canada and; Israel; resilience, societal

resilience, societal, 2, 33, 73-74, 195, 200. See also disinformation, Canada and

retaliation, 12-13, 15, 23-24, 26, 32, 52, 56-57, 67, 240, 243, 253, 331; in nuclear conflict, 14, 43t, 52, 56, 67, 328. See also deterrence by retaliation

revenge porn, 179

Reyhanli, 279

Riot Games, 130

risk society, idea of, 249

Romania, 342

Rossiya Segodnya, 92. See also Simonyan, Margarita Simonova

Royal Canadian Mounted Police (RCMP), 9, 199, 201

RT, 89-92, 100, 126. See also Simonyan, Margarita Simonova

Rubio, Marco, 98

Russia, 1, 6-7, 9, 12, 24-25, 34, 40-41, 44, 48, 52, 56-57, 81, 164, 200, 211-12, 216, 220, 226, 229, 329, 349-50; censorship in, 91; disinformation about EFP in Latvia, 10, 201; disinformation about origin of COVID-19, 6-7, 135; disinformation about vaccine safety, 5, 170; Estonia, information attack on (2007), 94; Georgia, war with (2008), 53, 55, 86, 94; Gerasimov Doctrine, use of, 168; hybrid warfare, use of, 94, 168-69; intelligence services of, 6-7; Kremlin and, 97; military doctrine of, 53-54; NC3 networks and, 42; nuclear arsenal of, 41-42, 53; Putin regime of, 81-84, 88, 94, 97-98, 106, 108; security threats to, 81; strategic aims of, 81-82; war as constant, view of, 41, 85, 105, 108, 330; West, approach to, 81-83, 97, 108. See also ballistic missile defences (BMD); FSB; GRU; hacks, hacking; KGB; Putin, Vladimir; Russia, information operations of; Russian Security Council; social media; Soviet Union; terrorist attacks

Russia, information operations of, 81-107, 171, 217, 329-31; academia, influence over, 92; active measures and, 85; black outlets and, 89, 93, 331; bots, use of, 90, 93, 97, 99; China, cooperation with, 135-36; countering, recommended methods of, 105-108; cyber-attacks, use of, 86; different elements of, 84; disinformation, use of, 87, 97-98, 105-107; domestic audiences, messaging for, 91-93, 98; Donald Trump, support for, 98, 101-105, 302; election interference and, 81-82, 86-87, 90, 93-105, 221; emotional responses and, 88-89, 102; ethnic/social communities, targeting of, 101-103; as first element of, engagement with enemy, 84; grey outlets and, 89, 93, 331; hacking and, 86-87, 94-97; Hillary Clinton, attacks on, 98, 101-105; HIV/AIDS, disinformation about, 169; importance of in Russian military planning, 83; influence agents, use of, 91, 93; information-psychological type of, 84; information-technical type of, 84, 86; international audiences, messaging for, 89, 91-93, 97-98; malware, use of, 217; media (tv/radio), use of, 84, 91-93; proxies, use of, 89, 91, 331; reflexive control practices and, 85; trolls and, 85, 90-93, 97-101; truth, manipulation of/attack on, 87-89; West, attacks on and, 83-84, 92, 97-98, 105-108; white outlets and, 89, 93. See also bots, bot networks; Internet Research Agency (IRA); propaganda; Rossiya Segodnya; RT; social media; Sputnik News; Ukraine; VKontakte

Russian Security Council, 42

St Petersburg, 45, 90

St Petersburg University, 98

Sanders, Bernie, 98

Saudi Arabia, 279

Sawyer, John, 74

scapegoating, 248-49

Schneier, Bruce, 30

Schugart, Ian, 106

SDF. See Syrian Democratic Forces (SDF)

Second Lebanon War, 171

Second World War, 108, 224, 243, 327

Security and Intelligence Threats to Elections (SITE) Task Force, 9, 199; composition of, 9

Serbia, 53

settler colonialism, 239

Shabtai, Yaakov, 156

Shanghai Cooperation Organisation, 216

Sherif, Muzafer, 245; experiments of, 245-46

Simonyan, Margarita Simonova, 92

Sinai, 147, 150, 157

single integrated operational plan (SIOP), 49. See also Cold War

SIOP. See single integrated operational plan (SIOP)

situational awareness, 40, 46, 336-38

Six Day War, 155

social justice, 2, 242, 260

social media, 3, 6-7, 31, 33, 92, 167, 176, 178-79, 181, 189, 191, 238, 244, 270, 294, 297-98, 301, 316-18, 327, 329, 341, 349; #AlleyesonISIS hashtag and, 169; censorship and, 34, 297-98; Chinese information operations/disinformation campaigns and, 121, 131-36; counterterrorism and, 292; election interference and, 94-95, 97-101; fake accounts and, 97, 99, 173, 181, 339; far right and, 270-71, 297-98; influence operations and, 302; Internet Research Agency (IRA) and, 99-105; Iran and, 170, 173; ISIS, use of 169, 175, 276; personality assessment and, 319; regulation, attempts at, by Canada, 202; recruitment and, for terrorism/far right, 270, 292; Russian information operations/disinformation campaigns and, 7, 31, 84, 86-93, 97-105; super-spreaders and, 175; terrorists, use of, 270, 277; tribes/tribalism and, 246, 260; usage of in Canada, 33; as way to influence foreign audiences, 85. See also COVID-19, Chinese disinformation about; names of individual social media companies

Soros, George, 249

South Africa, 215

South Korea, 213

Soviet Union, 40, 51-52, 55, 84-85, 166, 176, 243, 336, 345n1; demise of, 52; information operations of, 330, 339-40; nuclear arsenal of, 41-42

Spain, 94, 213

spearphishing, 86, 95-96

SPSS data-analysis software, 276

Sputnik News, 89-92

Stanford University, 176

Stein, Janice Gross, 74

Stein, Jill, 102

Stop AAPI Hate, 260

Stormfront, 285

Stuxnet, 30, 57. See also Iran

submarine cables, 29

submarines, nuclear ballistic, 49

Sudan, 280

suicide, 69, 71, 150, 158, 283-84, 287, 294

Sukumar, Arun, 217

Sun Tzu, 163

Sweden, 33, 213. See also Psychological Defence Agency (Sweden)

Sweijs, Tim, 65, 71, 74, 204

Switzerland, 277

Syria, 99, 268, 274, 277, 279-81, 296, 351

Syrian Democratic Forces (SDF), 279-80, 284, 293-94; Camp al Hol of, 294

tacit bargaining. See cyberspace

Taiwan, 14, 122; as target of Chinese information campaigns, 122; “Voice of the Strait” radio and, 122

Tamimi, Ahlam, 148

Tel Aviv, 143, 158-59

Telegram, 174-75, 280

terrorism, 16, 64, 68-69, 167, 256, 258, 267; deterrence and, 66-70, 73, 75; leadership decapitation and, 258; recruitment and, 69, 74, 270-77, 282-83, 286, 290, 292-93, 295, 297-98, 302-303. See also Canada; counterterrorism; social media; terrorist attacks; war on terror. See also names of individual terrorist groups

terrorist attacks: Malaysian Airlines Flight, 17 73, 75, 174, 341; Jerusalem (2001), 148; 9/11 12, 64, 267, 297, 327; Toronto van attack (2018), 270

Thailand, 33

Tonga, 29

Toronto, 284, 286-87, 289, 292

toxic masculinity, 286

transparency, 9, 42, 177, 197, 200, 350

treaties and agreements, nuclear: New START, 53, 56; Nunn-Lugar agreement, 42; Russo-American agreement (June 2013), 42

tribes/tribalism, 237-40, 242-46, 249, 290; asymmetry and, 244; belonging and, 237, 239-41, 244-46, 248, 250, 253, 259-61; cross-national structures and, 256; defined, 237, 239, 243; destruction of, 258-59; deterrence and, 252-61; deterrence by denial and, 255-57; deterrence by punishment (retaliation) and, 257-60; digital, 237-38, 242-44, 247, 252-61; engineered, 237, 241-42, 246-47, 250, 261; liberal democracies and, 238; organic, 237, 242, 246, 258, 260; routines/routinization and, 237, 242, 260-61; US political tribalism, 245. See also Internet; social media

Trinidad, 281

Trojan Horses, 55

trolls, trolling, 4, 85, 90-91, 97-98, 100, 244; honeypots, use of, 91; troll farms/factories, 90, 97. See also bots, bot networks; disinformation (general); Russia, information operations of

Trudeau, Justin, 272

Trump, Donald, 98, 101-105, 200, 247-48; impact of, on far right, 269; influence campaigns and, 302. See also COVID-19; Russia, information operations of

trust: 176-77; deterrence and, 350; in liberal government/institutions, 2, 5, 164, 173, 189, 193, 195, 200, 335, 343; undermining of, 164. See also Israel Defence Forces (IDF)

truth: concept of, attacks on, 83-84, 87, 106; defence of, 106, 108, 200; disinformation and, 152, 166, 349; identifying, 89; manipulation, of 87; post-truth era, 3, 167; value of, 167. See also Russia, information operations of

Turkey, 53, 213, 215, 277, 279, 281

TV5 Monde, cyber-attack on, 217

Twitter, 90, 96-102, 104, 133, 136n3, 169, 174, 179, 192, 244, 246-47, 283, 318; bots and 99-100

Ukraine, 1, 10, 92, 168, 341; Chinese support for Russia and, 125, 135; Crimea, annexation of (2014), 94, 97, 125, 168; cyber-attacks on, 168, 217; Russia information operations and, 86, 168; invasion of (2022–), 1, 14, 29, 42, 53, 55-57, 94, 99, 125, 221, 349. See also United States Cyber Command (USCYBERCOM)

UN. See United Nations

United Kingdom, 81, 94, 128, 153, 226-27, 277, 304; Brexit vote of (2016), 81, 248; deterrence, interpretation of, 196. See also United Kingdom Ministry of Defence

United Kingdom Ministry of Defence, 24-25, 31

United Nations (UN), 150, 202, 213, 216, 226

United Nations High Commissioner for Refugees, 154

United States, 5, 8, 10-11, 14, 40, 44, 48, 51, 55, 57, 86, 90-91, 94, 165, 169, 173, 177, 217, 226, 228-29, 244, 256, 268, 277, 285, 295, 311-12, 336; Biden administration of, 8; Bush (George W.) administration of, 56; C4ISR systems of, 41; Congress of, 103; cyberspace, effort to gain advantage in, 220-23; Kennedy administration of, 12; military superiority vis-à-vis Russia, 53-54; Muslim travel ban and, 248-49; NC3 system of, 40, 43; nuclear arsenal of, 41-42, 53; Obama administration of, 56; PGS plans and, 56; Second Amendment rights and, 256; threat to Russia, characterized as, 81; White House, 87. See also COVID-19, Chinese disinformation about; Foreign Intelligence Advisory Board (US); United States Cyber Command (USCYBERCOM); United States Department of Defense; United States National Command Authority; United States State Department

United States Cyber Command (USCYBERCOM), 220-222; Command Vision for U.S. Cyber Command: Achieve and Maintain Cyberspace Superiority, 221-22; Cyber National Mission Force teams of, 221; elections, defense of, 221; Internet Research Agency, exposure of, 221; persistent engagement, strategy of, 221-22, 229, 343; Ukraine, partnership with, 221

United States Department of Defense, 24, 87, 96, 166; Joint Chiefs of Staff of, 87, 95. See also hacks, hacking

United States Global Engagement Center, 199

United States Information Agency 339-40

United States Internal Revenue Service 95. See also hacks, hacking

United States National Command Authority 49

United States Office of Personnel Management 129-30. See also hacks, hacking

United States State Department, 87, 95. See also hacks, hacking

US Alliance for Securing Democracy, 200

USCYBERCOM. See United States Cyber Command (USCYBERCOM)

U-2 reconnaissance aircraft, 51

Vancouver, 281, 288

Vienna, 45

Vietnam War, 149

Virilio, Paul, 182

VKontakte, 90

Voice of America, 342

Volksfront, 285

VUCA (acronym: volatile, uncertain, chaotic, and ambiguous), 349-50

Wagner Group, 99

Wall Street Journal, 101

war on terror, 12, 267

Warsaw Pact, 55

Warsaw Summit (2016), 165

Washington Post, The, 135

WeChat, 132

Weibo, 129

West Bank, 154

weapons, nuclear, 24, 34n1, 39-41, 258; air-delivery and, 53; C4ISR and, 41; cyber-attack and, 41; deployment (geographical) of, 53-54; disabling of, by cyber-attack, 48; first strikes and, 39, 42, 52, 55-57; intercontinental, 53; international arsenals and, 41-42; non-strategic, 53; rogue states and, 52; tactical, 53-54; warning systems and, 50. See also Iran; missiles/rockets; treaties and agreements, nuclear

weapons of mass destruction (WMDs), 12. See also Iraq; weapons, nuclear

WhatsApp, 169

white supremacists, 269-70, 273, 275, 284-92, 294-97; alcohol and, 289-90, 293; conspiracy theories and, 271; emboldened by far right politicians, 294-95; music and, 270, 285, 288, 293; white replacement theory, 290; women and, 291-92. See also Aryan Nations; Canada; Canadian Liberty Net; Church of the Creator; Escape Hate Counter Narrative Project; Hammerskins; Heritage Front; Life After Hate; National Socialist Black Metal; Order, The; Stormfront; Volksfront

Wiggle, Mikael, 204

WikiLeaks, 89, 96, 102

Williams, Russell, 10

WMDs. See weapons of mass destruction (WMDs)

World Health Organization, 8, 132, 134, 136, 169, 176

Wrong, Hume, 224-25

Yaalon, Moshe, 153

YNABers, 260

YouTube, 98, 100, 192, 287, 318-19

Zilincik, Samuel, 71, 74, 204

Annotate

Previous
Deterrence in the 21st Century
© 2024 Eric Ouellet, Madeleine D’Agata, and Keith Stewart
Powered by Manifold Scholarship. Learn more at
Opens in new tab or windowmanifoldapp.org