For information on how we process your data, read our Privacy Policy
Thank you. We will email you when this book is available to order
You must sign in to add this item to your wishlist. Please sign in or create an account
Technology-enabled influence operations, including disinformation, will likely figure prominently in adversary efforts to impede U.S. crisis response and alliance management in high-risk, high-impact scenarios under a nuclear shadow. Both Russia and China recognize their conventional military disadvantage vis-à-vis conflict with the United States. As a result, both nations use sub-conventional tactics and operations to support their preferred strategies for achieving favorable outcomes while attempting to limit escalation risks. Such strategies include an array of activities loosely identified as influence operations, focused on using and manipulating information in covert, deniable, or obscure ways to shape the strategic environment.
This report presents eight scenarios—four focused on Russia and four focused on China—that invite potential escalation risks and demonstrate how the tools and tactics of influence operations could be employed to challenge detection, response, and crisis management. It explores a range of potential escalatory pathways and destabilizing consequences if adversary influence operations engage strategic interests and targets in high-risk scenarios and identifies key takeaways and recommendations for policymakers to better identify and defend against adversary influence operations.
Published | Jan 12 2022 |
---|---|
Format | Ebook (PDF) |
Edition | 1st |
Extent | 72 |
ISBN | 9798765193570 |
Imprint | Center for Strategic & International Studies |
Series | CSIS Reports |
Publisher | Bloomsbury Publishing |
Your School account is not valid for the Canada site. You have been logged out of your account.
You are on the Canada site. Would you like to go to the United States site?
Error message.