Fighting Shadows in the Dark

Understanding and Countering Coercion in Cyberspace

Quentin E. Hodgson, Logan Ma, Krystyna Marcinek, Karen Schwindt

ResearchPublished Sep 17, 2019

What is cyber coercion, and how have states used cyber operations to coerce others? Based on unclassified, open-source material, the authors of this report explore how four states — Russia, China, Iran, and North Korea — have used cyber operations, and whether that use constitutes cyber coercion.

States like Russia and North Korea appear to be more likely to have used cyber operations as a coercive tool than China and Iran. The authors also find that, contrary to what coercion theory would predict, states often do not make distinct threats with unambiguous demands for changes in behavior. Rather, states use cyber operations to try to coerce their neighbors while denying responsibility, often hiding behind proxies and without issuing clear demands. Despite the low probability of success, the authors anticipate states will continue to use and may, in fact, come to employ cyber operations more often in the future to coerce. To prepare for this outcome, the United States and its allies need to work now to develop methods to discern cyber coercion as it emerges and strategies to counter it in the future.

Key Findings

Cyber operations intended to coerce are a small subset of overall cyber operations globally

  • Espionage remains the predominant purpose of states' cyber operations.
  • Russian cyber operations appear to have had some coercive intent in Ukraine and Montenegro.
  • Chinese cyber operations show a continued focus on espionage, but potentially with some coercive intent as a secondary objective.
  • Iranian cyber operations appear more focused on retaliating against regional neighbors and the West, rather than serving a direct coercive purpose.
  • North Korea has routinely engaged in coercive acts in the physical world and sees cyber operations as another means to coerce others.
  • The assessment of these cases indicates how the threat, threat actor, and the desired change in behavior is often unclear or ambiguous, though this ambiguity does not appear to prevent countries from pursuing these coercive campaigns.

Recommendation

  • The United States and its partners need to develop a richer understanding of how cyber coercion might emerge, build systems to provide warning of impending operations, and craft strategies to deter and respond to cyber coercion.

Order a Print Copy

Format
Paperback
Page count
56 pages
List Price
$19.00
Buy link
Add to Cart

Topics

Document Details

  • Availability: Available
  • Year: 2019
  • Print Format: Paperback
  • Paperback Pages: 56
  • Paperback Price: $19.00
  • Paperback ISBN/EAN: 978-1-9774-0275-2
  • DOI: https://doi.org/10.7249/RR2961
  • Document Number: RR-2961-OSD

Citation

RAND Style Manual
Hodgson, Quentin E., Logan Ma, Krystyna Marcinek, and Karen Schwindt, Fighting Shadows in the Dark: Understanding and Countering Coercion in Cyberspace, RAND Corporation, RR-2961-OSD, 2019. As of October 10, 2024: https://www.rand.org/pubs/research_reports/RR2961.html
Chicago Manual of Style
Hodgson, Quentin E., Logan Ma, Krystyna Marcinek, and Karen Schwindt, Fighting Shadows in the Dark: Understanding and Countering Coercion in Cyberspace. Santa Monica, CA: RAND Corporation, 2019. https://www.rand.org/pubs/research_reports/RR2961.html. Also available in print form.
BibTeX RIS

This research was sponsored by the Office of the Secretary of Defense and conducted within the Cyber and Intelligence Policy Center of the RAND National Defense Research Institute, a federally funded research and development center (FFRDC) sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.

This publication is part of the RAND research report series. Research reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND research reports undergo rigorous peer review to ensure high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.