Skip to main content

Deterrence in the 21st century: Preface

Deterrence in the 21st century
Preface
    • Notifications
    • Privacy
  • Project HomeDeterrence in the 21st Century
  • Projects
  • Learn more about Manifold

Notes

Show the following:

  • Annotations
  • Resources
Search within:

Adjust appearance:

  • font
    Font style
  • color scheme
  • Margins
table of contents
  1. Contents
  2. Foreword
  3. Preface
    1. Introduction
  4. Section I Deterrence as an Evolving Concept
    1. 1 Deterrence Is Always about Information: A New Framework for Understanding
    2. 2 Nuclear Crisis Management for the Information Age
    3. 3 Deterrence by De-legitimization in the Information Environment: Concept, Theory, and Practice
  5. Section II Wider Strategic Context and Experiences
    1. 4 Understanding Russia’s Approaches to Information Warfare
    2. 5 The Evolution of China’s Information Exploitation of COVID-19
    3. 6 Deterrence in the Gaza Conflict: Hamas Case Study Analysis
    4. 7 Resilience as a Framework for Deterrence in the Information Age: Lessons Learned from Israel about Information and Influence Operations
  6. Section III Canada’s Context
    1. 8 Deterrence and Strategic Disinformation: An Overview of Canada’s Responses
    2. 9 Exit, Voice, or Loyalty? Functional Engagement as Cyber Strategy for Middle Power Statecraft
  7. Section IV Emerging Tools and Approaches
    1. 10 Digital Tribalism and Ontological Insecurity: Manipulating Identities in the Information Environment
    2. 11 Deterrence for Online Radicalization and Recruitment in the Twenty-First Century
    3. 12 Assessing Influence in Target Audiences that Won’t Say or Don’t Know How Much They Have Been Influenced
    4. Conclusion
    5. Afterword
    6. Postface
  8. List of Abbreviations
  9. About the Authors
  10. Index

Preface

The last few years have seen an incredible increase in the proliferation of false or deceptive information through the information environment—especially through the communication channels provided by social media platforms. While not all false information is promulgated with malicious intent, state and non-state adversaries are actively exploiting the information environment to engage Canada’s military, government, public, and institutions to influence their will, attitudes, and behaviours. Several key factors have contributed to the increased importance of the information environment as an “area of operations” for our adversaries. First, engaging with target audiences is made easy when the cyber domain is leveraged to spread false information. Not only is adversaries’ reach enhanced by the high level of connectedness Western democracies have to the cyber domain, the generation and sharing of deceptive content can be done quickly and cheaply thanks to algorithms designed to create disinformation intended for online distribution (i.e., “bots”). Second, Canada and its closest allies are democracies that value and promote free speech—a quality that reduces the extent to which access to information within the cyber domain will be put under the control of governments in an effort to reduce exposures to disinformation or even hateful content. The way we use and treat the technologies designed to connect with others not only makes us vulnerable to adversary actions, it has served as an enabler for adversaries and made their operations in the information environment almost inevitable.

This book is about gathering the information Canada needs to begin the development of a framework for devising methods that discourage adversaries’ engagement with Canada’s institutions and its public. In our view, to successfully deter an actor from engaging us in the information domain, we must have adequate awareness and control of the information environment so that we can shape adversaries’ understanding of Canada’s readiness and capability to defend itself against psychological and social attempts to manipulate its various institutions.

The first step in creating this book was to hold group sessions in which the critical knowledge gaps were identified in our understanding of the factors that must be considered to discourage adversary attacks in the information environment. The gaps were translated into key issues to be addressed by the chapters. In the next step, we reached out to internationally respected experts across multiple fields to provide us with their perspectives on one or more of the key issues. The editorial team spent long hours over the past year poring over (and chasing after) proposals and manuscripts to create this book. We anticipate that it will have been worth the effort, and that this will serve as an important reference to inform the development and validation of methods and techniques to mitigate the impact of attacks in the cyber domain.

Peter Kwantes, PhD

Chief Scientist, Defence and Research and Development Canada,
Toronto Research Centre

Annotate

Next Chapter
Introduction
PreviousNext
Deterrence in the 21st Century
© 2024 Eric Ouellet, Madeleine D’Agata, and Keith Stewart
Powered by Manifold Scholarship. Learn more at
Opens in new tab or windowmanifoldapp.org