Conflicts between states have taken on new forms and hybrid operations play an increasingly important role in this volatile environment. Belligerent powers introduce a new model of conflict fought by proxy, across domains, and below the conventional war threshold to advance their foreign policy goals while limiting decisive responsiveness of their victim.
Given these hybrid threats, how should Western states respond? Are there any tools available Western states have that can draw red lines into blurred lines of hybrid conflict?
About this Paper
In 2014, ISIS began embarking on a massive propaganda campaign primarily aimed at foreign audiences. This campaign notably abused new social media technologies to reach millions. Responding to such a campaign is tough for Western authorities, especially as rivals like Russia were hoping to exploit any precedents the West may set. How should they respond? How can they avoid setting undesirable precedents?
This case study explores the Western countermeasures, their second-order normative effects, and a potential norm proposal for information operations. The key Western responses were strategic communication, psychological operations, and covert cyber operations. A common theme emerged from these countermeasures in the form of a normative benchmark of truthfulness for information operations: the broader the target audience and the mediums used (e.g. radio or television), the more truth is prevalent. Inversely, targeted covert influencing operations (e.g. PSYOPS and MILDEC) may leverage a higher degree of falsehoods.
About the Paper Series
This paper is part of a series that argues that the West does have one powerful tool that can help shape hybrid threat actors. That tool is international norms. Norms set international expectations of acceptable state behavior – yardsticks which the international community can leverage when calling out unscrupulous states.
But norms do not develop out of nothing. This report applies the norm lifecycle theory, which analyzes norm development from emergence to cascade and internalization, to five case studies to to better understand the real-life strategies, tools of influence, dilemmas, and trade-offs that empower state-led norm processes. The report not only considers how norms develop, but also what role they play within the counter-hybrid posture of a state, and how they, in conjunction with countermeasures, shape adversarial hybrid behavior.
This report also explores four other case studies on Russian, Chinese, and ISIS hybrid conflict actions. The case studies are published individually as a paper series and compiled in a full report with complete overview of the theoretical underpinnings of norm development and the key insights that emerge from the analysis, as well as the concluding remarks and policy recommendations. The policy recommendations explore ways for the Netherlands and its partners to help promote and enforce norms of restraint beyond classic like-minded groups of states while being cognizant of unintended consequences.
Please find an overview of the other case studies below.
- Case Study 1: Protecting Electoral Infrastructure from Russian Cyber OperationsDownload Case Study | Download Factsheet
- Case Study 2: Responding to Russian disinformation in peacetimeDownload Case Study | Download Factsheet
- Case Study 4: Responding to Chinese Economic EspionageDownload Case Study | Download Factsheet
- Case Study 5: Upholding Freedom of Navigation in the South China SeaDownload Case Study | Download Factsheet