{"id":1549,"date":"2021-01-19T16:29:47","date_gmt":"2021-01-19T16:29:47","guid":{"rendered":"http:\/\/atauk.org\/?p=1549"},"modified":"2022-09-19T20:42:04","modified_gmt":"2022-09-19T20:42:04","slug":"conflict-in-the-grey-zone-nothing-new-under-the-sun-tzu","status":"publish","type":"post","link":"https:\/\/atauk.org\/index.php\/2021\/01\/19\/conflict-in-the-grey-zone-nothing-new-under-the-sun-tzu\/","title":{"rendered":"Conflict in the Grey Zone &#8211; Nothing New Under the Sun (Tzu)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1549\" class=\"elementor elementor-1549\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3bb66837 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3bb66837\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4bd98c4a\" data-id=\"4bd98c4a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d16f67c elementor-widget elementor-widget-heading\" data-id=\"d16f67c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The information revolution and the rise of social media make open societies particularly vulnerable to disinformation campaigns. This \u201cexplainer\u201d looks at this all-pervasive aspect of conflict in the \u201cgrey zone\u201d. <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16f1029 elementor-widget elementor-widget-text-editor\" data-id=\"16f1029\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote><h5 style=\"text-align: center;\"><em style=\"font-weight: inherit;\">\u00a0<\/em><strong><em style=\"font-weight: inherit;\">&#8220;The supreme art of war is to subdue the enemy without fighting&#8221; &#8211; Sun Tzu, c. 544 BC to 496 BC<\/em><\/strong><\/h5><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0ced9af elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0ced9af\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-73cbef2\" data-id=\"73cbef2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f90d442 elementor-widget elementor-widget-text-editor\" data-id=\"6f90d442\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At the end of November 2020, it was widely reported that a British army information warfare unit was helping to counter online \u201cantivax\u201d propaganda.<\/p><p><span style=\"font-style: inherit; font-weight: inherit;\">This might seem like an odd task for the British army, but it is, in fact, part of an invisible conflict taking place in the so-called \u201cgrey zone\u201d where unfriendly nations try to weaken and undermine their perceived adversaries\u2019 societies and institutions.<\/span><\/p><p><span style=\"font-size: 15px;\">The methods used include political interference, disinformation and propaganda, cyberattacks, hacking, espionage, bribery, and economic incentives or disincentives.<\/span><span style=\"font-size: 15px;\">\u00a0 <\/span><span style=\"font-size: 15px;\">Each of these \u201ctools\u201d is tailored to suit the victim\u2019s national circumstances, and they can be used in conjunction with \u2013 or as preparation for &#8211; covert or overt military actions.<\/span><\/p><p><span style=\"font-size: 15px;\">For the most part, they are carefully calibrated to keep below the threshold that might trigger an armed response, and they are usually conducted in\u00a0 way that provides an element of deniability.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8abfeb3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8abfeb3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-38af3ac\" data-id=\"38af3ac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-132ac61 elementor-widget elementor-widget-heading\" data-id=\"132ac61\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Grey zone or Hybrid?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0b39fe elementor-widget elementor-widget-text-editor\" data-id=\"c0b39fe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>The terms \u201cgrey zone\u201d and \u201chybrid\u201d are frequently used interchangeably to describe aggression by any or all means short of military combat, and there are learned arguments about the distinctions between the two.\u00a0 One, which is as good as any, is that \u201cgrey zone\u201d operations take place primarily in the political domain, while \u201chybrid operations\u201d suggest the involvement of a more traditional &#8211; overt or covert \u2013 military aspect.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-26badf2\" data-id=\"26badf2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb5ff03 elementor-widget elementor-widget-text-editor\" data-id=\"cb5ff03\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The idea of conflict in the grey zone is far from new, and many tried and tested techniques from yesteryear are still in the playbook, but these are now joined by powerful new techniques which exploit the tools of the information revolution, and the diversity and openness of western societies.<\/p>\n<p>Hardly a day goes by without reports of Russian or Chinese efforts to interfere in elections, steal commercial or government secrets, spread disinformation, or amplify and exaggerate disagreements on social media.<\/p>\n<p>Businesses and governments now take it for granted that their information systems will be targeted by hackers, intent upon stealing intellectual property and secrets, and social media are systematically used and abused by foreign \u201ctroll factories\u201d.<\/p>\n<p>The spreading of disinformation is one of the favoured grey zone techniques being employed to inflame tensions within open societies, and to undermine confidence in their governments, political systems, institutions, and beliefs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-f63a8ff elementor-widget elementor-widget-text-editor\" data-id=\"f63a8ff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The most obvious means of disseminating disinformation is through traditional public media outlets: television, radio, print or internet-based written media.\u00a0 Both Russia and China fund media channels aimed at mainly western audiences and which consistently underline, exaggerate and invent stories about political and societal disfunction in the West.\u00a0 Coverage is relentlessly focused on western governments\u2019 failures, tensions arising from immigration and religious differences, political corruption, rampant crime, etc.\u00a0 Western institutions are invariably portrayed negatively. For instance, NATO is presented as being aggressive and dangerous at one moment, and then weak and incompetent the next.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2f5b042 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2f5b042\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f521de5\" data-id=\"f521de5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01c9434 elementor-widget elementor-widget-text-editor\" data-id=\"01c9434\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Such outlets also try to \u201ccrowd out\u201d uncomfortable stories with alternatives, often supported by obscure, fringe, or self-proclaimed western \u201cexperts\u201d.\u00a0 For instance, RT and Sputnik \u2013 both controlled and well funded by the Russian government \u2013 produced many stories intended to confuse the circumstances surrounding the poisoning of Sergei Skripal and his daughter by Russian operatives in 2018.\u00a0 In fact, an <a href=\"https:\/\/www.kcl.ac.uk\/policy-institute\/research-analysis\/weaponising-news\">analysis<\/a> by King\u2019s College\u2019s Centre for the Study of Media, Communication and Power identified 138 separate narratives about the case in coverage by RT and Sputnik in the four weeks following the incident.\u00a0 These included: the event was a hoax; that it was a pretext intended to interfere with the forthcoming Russia Presidential election or Russia\u2019s hosting of the World Cup; that the United Kingdom\u2019s government had no evidence to support its accusations of Russian involvement; that the poisoning stemmed from drug use by the Skripals; that the perpetrators could have been criminals who Mr Skripal had crossed; and that Yulia Skripal was being detained against her will.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-32e04fd\" data-id=\"32e04fd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e6be37 elementor-widget elementor-widget-heading\" data-id=\"7e6be37\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Misinformation and Disinformation<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddd6212 elementor-widget elementor-widget-text-editor\" data-id=\"ddd6212\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Misinformation and disinformation are similar in that both refer to false information. Misinformation is incorrect information that can arise all too easily from mistakes, misinterpretation, misunderstanding and even misrepresentation.\u00a0 It\u2019s an unfortunate fact of life and the human condition.<\/em><\/p>\n<p><em>Disinformation, however, is false information which is created deliberately with the intention to mislead or cause harm.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fbe8eb4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fbe8eb4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-262cb5f\" data-id=\"262cb5f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fd655b elementor-widget elementor-widget-text-editor\" data-id=\"7fd655b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These kinds of \u201calternative facts\u201d enable a legitimate story to be dismissed by government spokesmen as just one possibility among many others, and they present a dilemma to responsible journalists whose instincts are to present both sides of a story.<\/p>\n<p>Social media provides another highly effective vehicle for disinformation campaigns.<\/p>\n<p>Even without malign interference, social media has a polarizing effect.\u00a0 The influence of mainstream media has waned as people turn increasingly to social media where they can select from the vast array of content providers available.\u00a0 Users join like-minded groups which act as an echo-chamber for opinions.\u00a0 At the same time, the algorithms intended to keep users engaged \u2013 and therefore raising revenue from advertising \u2013 keep offering additional content calculated to appeal to the users.\u00a0 And underlying all this is the natural \u201cconfirmation bias\u201d, the tendency to believe items which confirm rather than challenge one\u2019s own views<\/p>\n<p>This has the effect of strengthening views and nudging people into areas where they are less likely to encounter different perspectives.\u00a0 Consequently, in an environment largely separated from the social checks and balances which help to civilize face-to-face interactions, opinions become more extreme.<\/p>\n<p>All this is fertile ground for fuelling divisions and polarizing opinions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-afbd2c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"afbd2c1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-93c0409\" data-id=\"93c0409\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0e37ba elementor-widget elementor-widget-text-editor\" data-id=\"f0e37ba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>\u201cOur authoritarian rivals see the strategic context as a continuous struggle in which non-military and military instruments are used unconstrained by any distinction between peace and war. These regimes believe that they are already engaged in an intense form of conflict that is predominantly political rather than kinetic. Their strategy of \u2018political warfare\u2019 is designed to undermine cohesion, to erode economic, political and social resilience, and to compete for strategic advantage in key regions of the world.<\/em><\/p>\n<p><em>&#8220;Their goal is to win without going to war: to achieve their objectives by breaking our willpower, using attacks below the threshold that would prompt a war-fighting response. These attacks on our way of life from authoritarian rivals and extremist ideologies are remarkably difficult to defeat without undermining the very freedoms we want to protect. We are exposed through our openness.\u201d<\/em><\/p>\n<p><em>Chief of the Defence Staff, General Sir Nick Carter in a <a href=\"https:\/\/www.gov.uk\/government\/speeches\/chief-of-the-defence-staff-general-sir-nick-carter-launches-the-integrated-operating-concept\">speech<\/a> launching the Integrated Operating Concept, September 2020<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8000f8\" data-id=\"f8000f8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bca77a elementor-widget elementor-widget-text-editor\" data-id=\"7bca77a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As a result, foreign agencies infiltrate social media on a huge scale using human operatives, and \u201cbots\u201d which can mimic human users to spread and amplify messages.<\/p>\n<p>There are endless examples of this phenomenon.<\/p>\n<p>One is the \u201cLisa case\u201d in Germany in 2016.\u00a0 According to a story that was widely circulated in Russia and in Germany, Lisa, a thirteen-year-old Russian-German girl, was raped by migrants.\u00a0 This story \u2013 naturally \u2013 provoked outrage, and it also succeeded in stoking up sensitivities about Germany\u2019s decision to take in of thousands of refugees from the conflict in Syria.\u00a0 The story provoked demonstrations by the Russian-German community and by far-right groups, and it raised diplomatic tensions between Russia and Germany.\u00a0 But the story was false: Lisa had been staying with a friend.<\/p>\n<p>In the Baltic States, there is a constant barrage of disinformation about NATO forces, such as fake stories about offences committed against the local population, and even reports that NATO is planning to deploy nuclear weapons there.<\/p>\n<p>One social media disinformation campaign has been particularly well documented: the extraordinary effort to interfere in the 2016 Presidential election campaign in the United States.<\/p>\n<p>Russia operated thousands of fake Facebook, Twitter, Instagram, YouTube, and Tumblr accounts and used these to amplify divisions and encourage their followers to move to more extreme positions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d820bb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d820bb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8474ca1\" data-id=\"8474ca1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d0d9b6 elementor-widget elementor-widget-text-editor\" data-id=\"2d0d9b6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In addition, Russian intelligence agencies stole hundreds of thousands of emails and documents related to the Democratic campaign, and leaked these in an effort to undermine the campaign.<\/p>\n<p>And the United States is by no means the only target of these actions.<\/p>\n<p>In 2015, during the run-up to France\u2019s Presidential election, thousands of emails from Emmanuel Macron\u2019s campaign were stolen and then placed on a file-sharing site, and a cyberattack on the German parliament shut down part of its network and obtained data and emails from several members of parliament, including the Chancellor, Angela Merkel.<\/p>\n<p class=\"MsoNormal\">Of course, foreign powers do not infiltrate computer systems just to find information that might be used to discredit an organization or individual: espionage is an ancient profession, and cyberespionage is another key feature of grey-zone operations.<\/p>\n<p>Two examples serve to illustrate the phenomenon.<\/p>\n<p>In 2018, Dutch officials thwarted an attempt to launch a cyberattack against the Organization for the Prohibition of Chemical Weapons (OPCW) in the Hague.\u00a0 At the time, the OPCW was investigating the Skripals\u2019 poisoning by a chemical weapons agent.<\/p>\n<p>In late 2020, a remarkably extensive cyberespionage case came to light when it was discovered that the IT networks of potentially thousands of government departments and commercial bodies had been compromised, mainly in the United States.\u00a0 Hackers had inserted malicious code into an update of widely used network management software.\u00a0 The code remained inert for a while and then reported its location to its controllers, who could then choose to exploit it.\u00a0 It appears that the code was activated only where it had found its way into \u201chigh-value\u201d facilities.\u00a0 These included sites within the Departments of State, Homeland Security, Energy, Justice, Defense, and Commerce and the National Nuclear Security Administration.\u00a0 Several sites in the United Kingdom were also reportedly affected, including the National Health Service, and the Home Office.<\/p>\n<p>In this case, the main motive for the attack is likely to have been espionage, with the discovery of anything useful for disinformation purposes being a bonus.<\/p>\n<p>Cyber operations can also cause degradation, disruption or destruction in the physical domain, and some experts reserve the term \u201ccyberattack\u201d specifically for such cases. \u00a0These can be used as part of a more traditional military conflict, or to intimidate an adversary, or undermine public confidence in them.<\/p>\n<p>One notable example occurred in 2007 when, following a diplomatic argument with Russia about a Soviet war memorial, Estonia suffered a cyberattack which had national repercussions, disrupting government, financial and media systems for days.<\/p>\n<p>Also in 2017, a cyberattack targeted against Ukraine inflicted widespread disruption on some government departments and business.\u00a0 The malware spread beyond Ukraine, causing huge losses of data in affected companies all over the globe.\u00a0 One victim was the Danish shipping company, Maersk which estimated the costs of the related losses to be between $250 million and $300 million.<\/p>\n<p>Global losses due to this one attack &#8211; which irretrievably erased data on affected computer systems \u2013 have been estimated at $10 billion.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-619bd33\" data-id=\"619bd33\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f9c0383 elementor-widget elementor-widget-text-editor\" data-id=\"f9c0383\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><em>Election Interference:\u00a0<\/em><\/strong><em>extracts from the\u00a0<a href=\"https:\/\/www.justice.gov\/storage\/report.pdf\">Mueller report<\/a>\u00a0on the Investigation into Russian Interference in the 2016 Presidential Election.<\/em><\/p>\n<p><em>\u00a0<\/em><em>Russia\u2019s Internet Research Agency, the IRA, \u201cconducted social media operations targeted at large U.S. audiences with the goal of sowing discord in the U.S. political system\u2026.<\/em><\/p>\n<p><em>\u00a0<\/em><em>\u2026Using fictitious U.S. personas, IRA employees operated social media accounts and group pages designed to attract U.S. audiences. These groups and accounts, which addressed divisive U.S. political and social issues, falsely claimed to be controlled by U.S. activists. Over time, these social media accounts became a means to reach large U.S. audiences\u2026<\/em><\/p>\n<p><em>\u00a0<\/em><em>\u2026By the end of the 2016 U.S. election, the IRA had the ability to reach millions of U.S persons through their social media accounts. Multiple IRA-controlled Facebook groups and Instagram accounts had hundreds of thousands of U.S. participants. IRA-controlled Twitter accounts separately had tens of thousands of followers, including multiple U.S. political figures who retweeted IRA-created content\u2026<\/em><\/p>\n<p><em>\u00a0<\/em><em>\u2026the IRA began to create larger social media groups or public social media pages that claimed (falsely) to be affiliated with U.S. political and grassroots organizations\u2026 More commonly, the IRA created accounts in the names of fictitious U.S. organizations and grassroots groups and used these accounts to pose as antiimmigration groups, Tea Party activists, Black Lives Matter protestors, and other U.S. social and political activists.<\/em><\/p>\n<p><em>\u00a0<\/em><em>\u2026IRA Facebook groups\u2026 covered a range of political issues and included purported conservative groups (with names such as &#8220;Being Patriotic,&#8221; &#8220;Stop All Immigrants,&#8221; &#8220;Secured Borders,&#8221; and &#8220;Tea Party News&#8221;), purported Black social justice groups (&#8220;Black Matters,&#8221; &#8220;Blacktivist, &#8221; and &#8220;Don&#8217;t Shoot Us&#8221;), LGBTQ groups (&#8220;LGBT United&#8221;), and religious groups (&#8220;United Muslims of America&#8221;).<\/em><\/p>\n<p><em>\u00a0<\/em><em>\u2026Collectively, the IRA&#8217;s social media accounts reached tens of millions of U.S. persons. Individual IRA social media accounts attracted hundreds of thousands of followers. For example, at the time they were deactivated by Facebook in mid-2017, the IRA&#8217;s &#8220;United Muslims of America&#8221; Facebook group had over 300,000 followers, the &#8220;Don&#8217;t Shoot Us&#8221; Facebook group had over 250,000 followers, the &#8220;Being Patriotic&#8221; Facebook group had over 200,000 followers, and the &#8220;Secured Borders&#8221; Facebook group had over 130,000 followers. According to Facebook, in total the IRA-controlled accounts made over 80,000 posts before their deactivation in August 2017, and these posts reached at least 29 million U.S persons and &#8220;may have reached an estimated 126 million people.&#8221;<\/em><\/p>\n<p><em>\u2026units of the Russian Federation&#8217; s Main Intelligence Directorate of the General Staff (GRU) hacked the computers and email accounts of organizations, employees, and volunteers supporting the Clinton Campaign\u2026In total, the GRU stole hundreds of thousands of documents\u2026<\/em><\/p>\n<p><em>\u00a0<\/em><em>The release of the documents was designed and timed to interfere with the 2016 U.S. presidential election and undermine the Clinton Campaign.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e18775 elementor-widget elementor-widget-text-editor\" data-id=\"5e18775\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 15px;\">Mention must also be made of a cyberattack against Iran in 2010 when a computer virus reportedly caused almost 1,000 uranium enrichment centrifuges at the Natanz nuclear facility to spin themselves to self-destruction.\u00a0 The fingers of suspicion pointed towards Israel and the United States, but neither has claimed responsibility.<\/span><\/p>\n<p>In fact, <a href=\"https:\/\/www.gtreview.com\/magazine\/volume-18-issue-3\/middle-east-braces-cyber-warfare\/\">the prevalence of disinformation campaigns and cyberattacks is growing throughout the Middle East<\/a> as economies become increasingly digitalized.<\/p>\n<p><strong>Confronting the Grey Zone Hydra<\/strong><\/p>\n<p>While this \u201cexplainer\u201d centres on the information and disinformation aspects of the grey zone, there are many others that policy makers cannot afford to ignore.\u00a0 In fact, there is effectively no limit to an aggressor\u2019s choice of targets and methods, nor to the ingenuity with which they might be exploited. There are already many examples of cyberattacks against critical infrastructure such as power supplies, communications, air-traffic control, traffic management, health services etc,.<\/p>\n<p>Cyber warfare techniques are also used \u2013 alongside many more traditional methods &#8211; in large-scale efforts to steal intellectual property \u2013 trade secrets and technology \u2013 which can cause huge economic losses for the victims.<\/p>\n<p>Other grey zone \u201ctools in the box\u201d include old-fashioned influence-peddling and corruption, economic coercion, and diplomatic pressure.<\/p>\n<p>The problems of cyberattacks, disinformation, and \u201creal life\u201d political interference in the United Kingdom were highlighted in the report on Russia published by the UK Parliament\u2019s Intelligence and Security Committee in July 2020.\u00a0 This stated, \u201cIt is clear that Russia currently poses a significant threat to the UK on a number of fronts \u2013 from espionage to interference in democratic processes, and to serious crime.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-17c65ef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"17c65ef\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5c3b762\" data-id=\"5c3b762\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2910502 elementor-widget elementor-widget-text-editor\" data-id=\"2910502\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Responding to this and other grey zone threats requires a \u201cwhole of government\u201d approach, which in the case of the United Kingdom is the responsibility of National Security Council (NSC) which is chaired by the Prime Minister and includes key government ministers.<\/p>\n<p>Reporting to the NSC through the various government departments are many specific bodies which focus on specific aspects of threats.<\/p>\n<p>For instance, in the cyber domain, the United Kingdom\u2019s <a href=\"https:\/\/www.ncsc.gov.uk\/\">National Cyber Security Centre<\/a> (NSCS) has clear responsibilities and expertise to bring to bear. According to press reports, one area of current activity is in assisting research facilities and pharmaceutical companies defend themselves from hacking efforts by Russia, China, North Korea and Iran.\u00a0\u00a0 As it says on its website, \u201cHelping to reduce the harm from cyber security incidents in the UK\u201d.<\/p>\n<p>To assess broader hybrid threats and inform the response, the United Kingdom has created the \u201c<a href=\"https:\/\/www.mi5.gov.uk\/joint-state-threats-assessment-team\">Joint State Threats Assessment Team<\/a>\u201d (JSTAT) under the responsibility of the Home Office.\u00a0 This assesses \u201cthe national security threat posed by activities such as espionage, assassination, interference in our democracy, threats to the UK\u2019s economic security and the UK\u2019s people and assets overseas.\u201d<\/p>\n<p>Both <a href=\"https:\/\/www.nato.int\/cps\/en\/natohq\/topics_156338.htm\">NATO<\/a> and the European Union have developed plans for countering hybrid threats, and for working with each other in this area.\u00a0 Both bodies emphasize that nations themselves are primarily responsible for addressing hybrid threats, and that improving national resilience is essential.<\/p>\n<p>Considerable attention is being paid by both organizations \u2013 separately and together \u2013 to dealing with disinformation and countering cyber threats.\u00a0 The EU, for instance, has a specific <a href=\"https:\/\/euvsdisinfo.eu\/about\/\">project<\/a> to assess Russian disinformation efforts about the EU in Eastern Partnership Countries, and to explain and expose such efforts.\u00a0 It has also launched a <a href=\"https:\/\/ec.europa.eu\/info\/strategy\/priorities-2019-2024\/new-push-european-democracy\/european-democracy-action-plan_en\">European Democracy Action plan<\/a> which includes a programme to address misinformation, disinformation, and foreign interference aimed at destabilising democratic institutions and undermining the trust of citizens.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1dccd6a\" data-id=\"1dccd6a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0bbde49 elementor-widget elementor-widget-heading\" data-id=\"0bbde49\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The 2014 \"Wake-Up\" Call<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3748fa4 elementor-widget elementor-widget-text-editor\" data-id=\"3748fa4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>The United Kingdom and other western, liberal democracies were slow to recognize the scale and intensity of the threat.\u00a0 After all, they generally live alongside like-minded, cooperative neighbours who, whatever their differences, have a shared belief in democracy, liberty, and the rule of law.\u00a0 They also prefer to see international relations as being cooperative, with good relations benefiting all parties.<\/em><\/p>\n<p><em>\u00a0<\/em><em>In February 2014, Russia wrong-footed the international community by occupying Crimea in an operation which skilfully combined both guile and force.<\/em><\/p>\n<p><em>\u00a0<\/em><em>Russia\u2019s leaders claimed to have no knowledge of the \u201clittle green men\u201d popping up to \u201cprotect\u201d strategic locations in Crimea, asserting that they must be local \u201cself-defence groups\u201d who had probably bought their own uniforms and military hardware.<\/em><\/p>\n<p><em>\u00a0<\/em><em>The deception \u2013 subsequently openly admitted as such \u2013 made decision makers and the press hesitate, giving the Russian forces time to take up effectively unassailable positions before the clouds of confusion dispersed.<\/em><\/p>\n<p><em>\u00a0<\/em><em>Although there was nothing fundamentally new about the use of deception and misdirection, this operation brought the world\u2019s attention to the potential effectiveness of hybrid operations, and nations bordering upon Russia became particularly concerned that similar tactics might be employed against them.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c301b8 elementor-widget elementor-widget-text-editor\" data-id=\"5c301b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>NATO\u2019s Joint Intelligence and Security Division has a hybrid analysis branch, and NATO\u2019s Public Diplomacy Division ensures that accurate factual information about NATO is widely available in order to counter disinformation.<\/p>\n<p>NATO has also set up counter-hybrid support teams which stand ready to respond to any member\u2019s request for assistance. Both NATO and EU support the <a href=\"https:\/\/www.hybridcoe.fi\/about-us\/\">European Hybrid Centre of Excellence for Countering Hybrid Threats<\/a> which aims to help nations build a whole-of-government and whole-of-society approach to countering hybrid threats.<\/p>\n<p>So why has the British army been called upon to help address issues related to Covid-19?<\/p>\n<p>At present, Covid-19 is at the heart of a grey-zone battle.\u00a0 Both China and Russia appear to be active in promoting the whole panoply of fake stories and myths about the coronavirus and the vaccines being deployed to end the pandemic.<\/p>\n<p>The EU has a <a href=\"https:\/\/ec.europa.eu\/info\/live-work-travel-eu\/coronavirus-response\/fighting-disinformation_en\">programme<\/a> to counter coronavirus misinformation and disinformation, including that disseminated through foreign disinformation campaigns.\u00a0 Josep Borrell, the EU\u2019s High Representative \u2013 its foreign policy chief \u2013 has noted that <em>&#8220;Some foreign actors, be they state or non-state, even engage in disinformation campaigns, deliberately spreading false or misleading information\u2026.Foreign interference and disinformation harm our fight against the pandemic and our security and democracy.\u00a0 Addressing disinformation is an urgent necessity.\u201d<\/em><\/p>\n<p>Which is why in the last few months there have been headlines about the British army &#8211; and the Government Communication Headquarters (GCHQ) &#8211; getting involved in efforts to address disinformation programmes intended to discredit coronavirus vaccines.<\/p>\n<p>Their role is to help identify disinformation originating overseas and which is fuelling \u201canti-vaxx\u201d sentiments in the United Kingdom.<\/p>\n<p>In fact, this ties in well with the United Kingdom\u2019s Integrated Operating Concept, unveiled by General Sir Nick Carter, Chief of the Defence Staff at the end of October 2020.<\/p>\n<p>This forward-looking document provides an accessible summary of the evolving security landscape and how the armed forces must be adapted in order to play their part in addressing the full spectrum of today\u2019s security threats.\u00a0 It stresses the importance of working with allies and the need to ensure that the armed forces will be suitably equipped for 21<sup>st<\/sup> century combat, as well as being prepared to operate continuously to deal with competition below the threshold of war.<\/p>\n<p>General Carter has cleverly <a href=\"https:\/\/www.gov.uk\/government\/speeches\/chief-of-the-defence-staff-general-sir-nick-carters-annual-rusi-speech\">noted<\/a> that this form of warfare &#8220;perhaps turns the Clausewitzian dictum that war is an extension of politics upside down \u2013 political warfare is war by other means.&#8221;<\/p>\n<p>Or as Sun Tzu, a 5th century Chinese general and strategist, put it:\u00a0<em style=\"font-size: 15px;\">\u201cThe greatest victory is that which requires no battle.\u201d<\/em><\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcccd79 elementor-widget elementor-widget-text-editor\" data-id=\"bcccd79\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right;\">ATA UK 19 January 2021<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The information revolution and the rise of social media make open societies particularly vulnerable to disinformation campaigns. This \u201cexplainer\u201d looks at this all-pervasive aspect of conflict in the \u201cgrey zone\u201d. &nbsp;&#8220;The supreme art of war is to subdue the enemy without fighting&#8221; &#8211; Sun Tzu, c. 544 BC to 496 BC At the end of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1712,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[11],"tags":[53,51,50,52,54],"ppma_author":[23],"class_list":["post-1549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-explainers","tag-china","tag-grey-zone","tag-hybrid","tag-russia","tag-strategic"],"authors":[{"term_id":23,"user_id":2,"is_guest":0,"slug":"david","display_name":"David Hobbs","avatar_url":"https:\/\/atauk.org\/wp-content\/litespeed\/avatar\/f56c47d2d70950af82ff4169662fcce1.jpg?ver=1776453724","author_category":"","user_url":"","last_name":"Hobbs","first_name":"David","job_title":"","description":""}],"rttpg_featured_image_url":{"full":["https:\/\/atauk.org\/wp-content\/uploads\/2021\/01\/AIImage.jpg",480,320,false],"landscape":["https:\/\/atauk.org\/wp-content\/uploads\/2021\/01\/AIImage.jpg",480,320,false],"portraits":["https:\/\/atauk.org\/wp-content\/uploads\/2021\/01\/AIImage.jpg",480,320,false],"thumbnail":["https:\/\/atauk.org\/wp-content\/uploads\/2021\/01\/AIImage-150x150.jpg",150,150,true],"medium":["https:\/\/atauk.org\/wp-content\/uploads\/2021\/01\/AIImage-300x200.jpg",300,200,true],"large":["https:\/\/atauk.org\/wp-content\/uploads\/2021\/01\/AIImage.jpg",480,320,false],"1536x1536":["https:\/\/atauk.org\/wp-content\/uploads\/2021\/01\/AIImage.jpg",480,320,false],"2048x2048":["https:\/\/atauk.org\/wp-content\/uploads\/2021\/01\/AIImage.jpg",480,320,false],"xs-thumb":["https:\/\/atauk.org\/wp-content\/uploads\/2021\/01\/AIImage-64x64.jpg",64,64,true]},"rttpg_author":{"display_name":"David Hobbs","author_link":"https:\/\/atauk.org\/index.php\/author\/david\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/atauk.org\/index.php\/category\/explainers\/\" rel=\"category tag\">Explainers<\/a>","rttpg_excerpt":"The information revolution and the rise of social media make open societies particularly vulnerable to disinformation campaigns. This \u201cexplainer\u201d looks at this all-pervasive aspect of conflict in the \u201cgrey zone\u201d. &nbsp;&#8220;The supreme art of war is to subdue the enemy without fighting&#8221; &#8211; Sun Tzu, c. 544 BC to 496 BC At the end of&hellip;","_links":{"self":[{"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/posts\/1549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/comments?post=1549"}],"version-history":[{"count":91,"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/posts\/1549\/revisions"}],"predecessor-version":[{"id":5446,"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/posts\/1549\/revisions\/5446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/media\/1712"}],"wp:attachment":[{"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/media?parent=1549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/categories?post=1549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/tags?post=1549"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/atauk.org\/index.php\/wp-json\/wp\/v2\/ppma_author?post=1549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}