HCSS
  • News
    • BNR | De Strateeg
    • Columns
    • Draghi Report Series
    • Events
    • Podcasts
  • Publications
    • Publications
      • All Publications
    • Defence & Security
      • Behavioural Influencing in the Military Domain
      • (Nuclear) Deterrence and Arms Control
      • Hybrid Threats
      • Rethinking Fire and Manoeuvre
      • Robotic and Autonomous Systems
      • Strategic Monitor Dutch Police
      • Transnational Organised Crime
    • Geopolitics & Geo-economics
      • China in a Changing World Order
      • Europe in a Changing World Order
      • Europe in the Indo-Pacific
      • Knowledge base on Russia (RuBase)
      • PROGRESS / Strategic Monitor
      • Transatlantic Relations
    • Climate, Energy, Materials & Food
      • Climate and Security
        • International Military Council on Climate and Security (IMCCS)
        • Water, Peace & Security (WPS)
      • Critical Minerals
      • Energy Security
        • Tank Storage in Transition
      • Food Security
    • Strategic Technologies
      • Cyber Policy & Resilience
        • Global Commission on the Stability of Cyberspace (GCSC)
      • Emerging Technologies
      • Global Commission on Responsible Artificial Intelligence in the Military Domain (GC REAIM)
      • Semiconductors
      • Space
  • Dashboards
    • Dashboards
      • All Dashboards
        • GINA
    • Defence & Security
      • DAMON | Disturbances and Aggression Monitor
      • GINA | Military
      • Nuclear Timeline
    • Geopolitics & Geo-economics
      • Dutch Foreign Relations Index
      • GINA | Diplomatic
      • GINA | Economic
      • GINA | Information
    • Climate, Energy, Materials & Food
      • Agrifood Monitor
      • CRM Dashboard
    • Strategic Technologies
      • Cyber Arms Watch
      • Cyber Comparator
      • Cyber Norms Observatory
      • Cyber Transparency
  • Services
    • HCSS Boardroom
    • HCSS Datalab
    • HCSS Socio-Political Instability Survey
    • Strategic Capability Gaming
    • Studio HCSS
    • Indo-Dutch Cyber Security School 2024
    • Southern Africa-Netherlands Cyber Security School 2025
  • NATO Summit
  • GC REAIM
    • GC REAIM | Members
    • GC REAIM | Conferences
    • GC REAIM | Partners, Sponsors, Supporters
  • About HCSS
    • Contact Us
    • Our People
    • Funding & Transparency
    • Partners & Clients
    • HCSS Newsletter
    • HCSS Internship Programme
    • Press & Media Inquiries
    • Working at HCSS
    • Global Futures Foundation
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

News

New Report | From Blurred Lines to Red Lines: Countermeasures and Norms in Hybrid Conflict

September 22, 2020

Conflicts between states have taken on new forms and hybrid operations play an increasingly important role in this volatile environment. Belligerent powers introduce a new model of conflict fought by proxy, across domains, and below the conventional war threshold to advance their foreign policy goals while limiting decisive responsiveness of their victim.   

Given these hybrid threats, how should Western states respond? Are there any tools available Western states have that can draw red lines into blurred lines of hybrid conflict? 

Download the Full Report here

This paper series argues that the West does have one powerful tool that can help shape hybrid threat actors. That tool is international norms. Norms set international expectations of acceptable state behavior – yardsticks which the international community can leverage when calling out unscrupulous states.  

But norms do not develop out of nothing. This report applies the norm lifecycle theory, which analyzes norm development from emergence to cascade and internalization, to five case studies to to better understand the real-life strategies, tools of influence, dilemmas, and trade-offs that empower state-led norm processes. The report not only considers how norms develop, but also what role they play within the counter-hybrid posture of a state, and how they, in conjunction with countermeasures, shape adversarial hybrid behavior. 

As many norm entrepreneurs often seem to underestimate, the pursuit of countermeasures may lead to unintended second-order normative effects that undermine their long-term strategic interests. For instance, overt cyber pre-deployment in adversary systems can introduce a norm of mutually assured debilitated, while overt offensive cyberspace operations in response to disinformation can weaponize information in the same ways as Russia. This scenario is explored in-depth in the second case study of this report dealing with Russian disinformation campaigns. 

This report also explores four other case studies on Russian, Chinese, and ISIS hybrid conflict actions. The case studies are published individually as a paper series and compiled in a full report with complete overview of the theoretical underpinnings of norm development and the key insights that emerge from the analysis, as well as the concluding remarks and policy recommendations. The policy recommendations explore ways for the Netherlands and its partners to help promote and enforce norms of restraint beyond classic like-minded groups of states while being cognizant of unintended consequences.  

Please find an overview of the separate case studies below: 

Case Study 1: Protecting Electoral Infrastructure from Russian cyber operations

Download Case Study | Download Factsheet

Case Study 2: Responding to Russian Disinformation in Peacetime

Download Case Study | Download Factsheet

Case Study 3: Countering ISIS Propaganda in Conflict Theatres

Download Case Study | Download Factsheet

Case Study 4: Responding to Chinese Economic Espionage

Download Case Study | Download Factsheet

Case Study 5: Upholding Freedom of Navigation in the South China Sea

Download Case Study | Download Factsheet

  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail

Experts

Louk Faesen
Tim Sweijs
Alexander Klimburg

Related News

Related Content

Louk Faesen | on the role of norms and countermeasures in shaping hybrid conflict before the Council of the EU Working Party on Hybrid Threats
From Blurred Lines to Red Lines: How Countermeasures and Norms Shape Hybrid Conflict | Countering ISIS Propaganda in Conflict Theatres
From Blurred Lines to Red Lines: How Countermeasures and Norms Shape Hybrid Conflict

Office Address

  • The Hague Centre for Strategic Studies
  • Lange Voorhout 1
  • 2514 EA The Hague
  • The Netherlands

Contact Us

  • Telephone: +31(70) 318 48 40
  • E-mail: info@hcss.nl
  • IBAN NL10INGB0666328730
  • BIC INGBNL2A
  • VAT NL.8101.32.436.B01
  • Contact

Legal & Privacy

  • Disclaimer & Privacy
  • Algemene Voorwaarden (NL) 
  • Terms & Conditions (ENG) 
  • Coordinated Vulnerability Disclosure
  • Ethical Standards
  • Manual for Responsible Use of AI

Follow us

© The Hague Centre for Strategic Studies
    Link to: Webinar: “The Future of War” by Dr. Frank Hoffman Link to: Webinar: “The Future of War” by Dr. Frank Hoffman Webinar: “The Future of War” by Dr. Frank Hoffman Link to: HCSS is hiring: General Internship Link to: HCSS is hiring: General Internship HCSS is hiring: General Internship
    Scroll to top Scroll to top Scroll to top

    GDPR Consent

    Your privacy is important to us. Here you can set which consent you are allowing us with regards to the collection of general information, the placing of cookies of the collection of personal information. You can click 'Forget my settings' at the bottom of this form to revoke all given consents.

    Privacy policy | Close
    Settings

    GDPR Consent Settings

    Your privacy is important to us. Here you can set which consent you are allowing us with regards to the collection of general information, the placing of cookies of the collection of personal information. You can click 'Forget my settings' at the bottom of this form to revoke all given consents.

    Website statistics collect anonymized information about how the site is used. This information is used to optimize the website and to ensure an optimal user experience.

    View details

    Functional cookies are used to ensure the website works properly and are neccessary to make the site function. These cookies do not collect any personal data.  

    View details
    Forget my settings Deleted!