浪花直播

Hybrid War and National Security: NATO, the US, and the West

Computer Hacker with images of computer code overlaid

In early September 2024, the US Department of Justice (DOJ) reported that it had disrupted thirty-two internet domains operated by a Russian government鈥揹irected disinformation campaign known as 鈥.鈥 The two-year campaign  Americans and Europeans with a combination of false domain names and cloned websites, and targeted cyber-generated social media.  

That same month, the DOJ indicted two Russian nationals for 鈥渃onspiracy to violate the Foreign Agents Registration Act (FARA) and conspiracy to commit money laundering鈥 for a Russian state-directed and state-controlled media company based in . In the DOJ brief, Attorney General Merrick Garland charged the two U.S.-based agents with conducting a 鈥 that Deputy Attorney General Lisa Monaco said was intended to 鈥渋llegally manipulate American public opinion by sowing discord and division.鈥 

The threat of Russia cyberattacks directed at the West is intensifying, somewhat resembling the nonkinetic methods of hybrid warfare  during the Kremlin鈥檚 2014 annexation of Crimea.

Danish defense minister Troels Lund Poulson highlighted the unprecedented number and range of cyberattacks against his nation at the 2024 region-wide NORDEFCO meeting. (The Nordic Defense Cooperation is a defense alliance and includes Denmark, Finland, Iceland, Norway, and Sweden.) The minister announced that Denmark鈥檚 Centre for Cyber Security (CFCS) had  owing to increasing Russian cyber-threats. 鈥淚ncreasingly,鈥 he said, 鈥渨e see a Russia that is willing to challenge NATO countries through sabotage, influencing campaigns, and cyberattacks.鈥  

Russia鈥檚 Toolkit

Russia has practiced a hybrid strategy of political-military warfare throughout its history. It has adapted this strategy to contemporary times by leveraging technology, culture, and asymmetric tactics to escalate geopolitical tensions, seeking to assemble just the right combination of these to achieve the desired effect. 

The rapid evolution and scaling up of technological tools, including social media and AI, have enabled Russia to continually exploit weaknesses in critical infrastructure. One powerful feature of these hybrid attacks is their psychological aspect. The distributed information flows disrupt democratic decision-making by calling into question generally accepted societal principles while advancing alternative realities. Gaps in technology and disagreements among allies provide adversaries with opportunities to use nonkinetic actions to achieve strategic goals. 

One example of this strategy in action was on view in 2019, when NATO deployed a 鈥渃ounter hybrid support team鈥 in Montenegro  Russia鈥檚 hybrid challenges. But in 2022 Montenegro suffered a cyberattack that 鈥 the government鈥檚 digital infrastructure,鈥 and the defense minister, Rasko Konjevic, placed the responsibility on Russia. Membership in NATO, the FBI鈥檚 rapid-response cyber-action team, the UK, and France helped Montenegro recover, build a stronger cyber-capability, and withstand further Russian pressure. Montenegro went on to form a Western-backed government.

What makes hybrid wars hard to defeat is the fact that they have no forward presence or front lines and  operate in 鈥溾 and 鈥済ray zones.鈥 With the advent of the internet, smart phones, artificial intelligence, and interconnected digital networks, physical national borders provide only partial defense. In the constantly moving cyber-domain, the concept of peace does not exist. 鈥淭he instruments or tools employed or fused together to unleash hybrid wars are often difficult to discern, attribute, or corroborate,鈥  Arsalan Bilal of NATO Review. This opens the door to 鈥減lausible deniability鈥 related to under-the-radar disruptions, which can be both ongoing and timed for future impacts. 

In its invasion of Ukraine, the Kremlin has extensively employed electronic warfare,  jamming GPS signals and satellite-based navigation systems. The Estonian minister of foreign affairs, Margus Tsahkna, said Russia鈥檚 hybrid warfare has forced the country鈥檚 largest airport to close, while pointing out that the Kremlin鈥檚 jamming also impacts civilian infrastructure in neighboring Latvia, Lithuania, and sites in Finland, Poland, and Germany. 

Information War and Lawfare

Special Counsel Robert Mueller concluded in 2018 that while Russia did not alter actual votes in the 2016 US presidential race, it did target voter registration in twenty-one states and spread conspiracies on social media to advance discord. In June 2023 the Kremlin  several European banking institutions, including the European Investment Bank, in retaliation for Europe鈥檚 support for Ukraine. In November of that year, Denmark suffered its largest cyberattack on record when  were shut down. In February 2024, Russian hackers  malware into servers at the embassies of Poland, Germany, and Ukraine to collect information on European and Iranian military activities. 

In a different strategy, Russia exploits its legitimate 1920 treaty-based presence in Norway鈥檚 Svalbard Archipelago to wage hybrid war through lawfare. It has mounted a threat to Norway鈥檚 sovereignty by challenging that country鈥檚 environmental regulations and Svalbard鈥檚 internationally recognized territorial boundaries鈥攁ctions that reflect the Kremlin鈥檚 strategy with regards to the maritime Arctic. Viewed collectively, Russia鈥檚  reveal a strategic intent to reshape global power dynamics and revise the current and shifting post-World War II rules-based order.  

Need for Integrated Capabilities

The 2024 NATO Summit highlighted the extent to which cyber-attacks have become a feature of modern conflict and expressed an intention to 鈥渟trengthen and secure allied networks, improve situational awareness, heighten cooperation and interoperability,鈥 and implement cyberspace as an operational domain. A central question in the unfolding discussion is whether a cyberattack against a NATO nation might trigger the mutual defense guarantee of Article 5.  have sufficient cyber and related capabilities to prevent, respond to, or protect from a cyberattack, which brings the alliance and its individual member nations into 鈥.鈥 As Russia, China, and other adversaries burrow deeper into cyberspace鈥檚 critical infrastructure, the West鈥檚 security and resilience alliance must deepen its own  as dual-use and unconventional presence by adversaries unfold.

There is a growing sense that the West must forge a tight integration of capabilities in the cyber domain along with strengthening trust and interoperability among the allies to ensure deeper collaboration, commercial and policy gaps notwithstanding. Only in this way could the United States and its allies prevail against their common adversaries in the rapidly changing landscape of hybrid war. 

The opinions expressed in this article are those solely of the author and do not reflect the views of the Kennan Institute.

Author

Kennan Institute

The Kennan Institute is the premier US center for advanced research on Eurasia and the oldest and largest regional program at the Woodrow 浪花直播 International Center for Scholars. The Kennan Institute is committed to improving American understanding of Russia, Ukraine, Central Asia, the South Caucasus, and the surrounding region through research and exchange.   Read more

Kennan Institute