Business Success


  • Written by Benjamin Jensen, Associate Professor of International Relations, Marine Corps University; Scholar-in-Residence, American University School of International Service

The U.S. military has the capability, the willingness and, perhaps for the first time, the official permission to preemptively engage in active cyberwarfare against foreign targets. The first known action happened as the 2018 midterm elections approached: U.S. Cyber Command[1], the part of the military that oversees cyber operations, waged a covert campaign[2] to deter Russian interference[3] in the democratic process.

It started with texts in October 2018. Russian hackers operating in the Internet Research Agency[4] – the infamous “troll factory[5]” linked to Russian intelligence, Russian private military contractors and Putin-friendly oligarchs[6] – received warnings via pop-ups, texts and emails[7] not to interfere with U.S. interests. Then, during the day of the election, the servers that connected the troll factory to the outside world went down.

As scholars who study technology[8] and international relations[9], we see that this incident reflects the new strategy for U.S. Cyber Command, called “persistent engagement[10].” It shifts Cyber Command’s priority[11] from reacting to electronic intrusions into military networks to engaging in active operations[12] that are less intense than armed conflict but still seek to stop enemies from achieving their objectives. In late 2018, the U.S. goal was to take away Russia’s ability to manipulate the midterm election, even if just briefly.

Coercion is difficult

Cyber Command’s operation against the troll factory was part of a sophisticated campaign that targeted individuals – Internet Research Agency workers – and systems – the organization’s internet connection.

In military terms, that effort generated “friction,” or difficulty for opposing forces to perform even mundane tasks. Russian hackers and trolls may wonder how a foreign government got their information, or was able to take their workplace offline. They might be worried about personal vulnerabilities, weaknesses in their own systems or even what else Cyber Command might do if they don’t stop trolling.

Our research has found that covert activities that are not as clear as armed conflict don’t always change a target’s behavior[13]. Successful coercion efforts tend to require clear signals of both capability and resolve – assurance that the defender both can respond effectively and will do so, in order to prevent the attacker from taking a desired action.

Digital operations are often the opposite – concealing that anything has happened, as well as who might have done it.

Even when a defender shows an adversary what it is capable of, there are few guarantees that deterrence will work. It is tough to force a determined aggressor to back down. Most scholarly studies of coercion – whether in the form of cyber action[14], economic sanctions[15] or limited air strikes[16] – show how hard it is to change an adversary’s behavior.

As we have found, all of these signals, digital and otherwise, are most effective[17] when used by more technologically sophisticated countries, like the U.S., who can combine them with other instruments of national power such as economic sanctions and diplomacy. Actions in the shadows can produce friction, but on their own are unlikely to change an opponent’s behavior.

Through targeted social media posts[18], Russians have amplified political fault lines in the United States. Social media makes it easy for misinformation to spread, even long after false stories are planted. There will always be “useful idiots[19]” who will circulate disinformation and misinformation.

US military steps up cyberwarfare effort What cyber service members get up to could have complicated repercussions. Chief Petty Officer Dennis Herring/U.S. Cyber Command[20]

Entering risky territory

It’s not clear that U.S. military hacking of Russian internet connections will put a damper on Putin’s global[21] information warfare[22] campaign.

It’s also not yet clear whether there will be – or even has already been – any sort of retaliation. There may be a point at which the conflict escalates, threatening the electricity grid[23], civic groups[24], private homes[25] or voting systems[26].

It’s valuable for the U.S. to introduce friction against enemies who seek to harm the American way of life. But it’s equally important to consider the potential for escalation to more widely harmful forms of conflict. This type of cyberoffensive may succeed at pushing back Russian disinformation. Or it may just be the government’s attempt to do something – anything – to convince the public it’s engaging the threat. Quick wins, like shutting down a troll factory for a few days, could produce much bigger longer-term consequences in a connected world.


  1. ^ U.S. Cyber Command (
  2. ^ waged a covert campaign (
  3. ^ Russian interference (
  4. ^ Internet Research Agency (
  5. ^ troll factory (
  6. ^ Russian intelligence, Russian private military contractors and Putin-friendly oligarchs (
  7. ^ pop-ups, texts and emails (
  8. ^ study technology (
  9. ^ international relations (
  10. ^ persistent engagement (
  11. ^ shifts Cyber Command’s priority (
  12. ^ active operations (
  13. ^ don’t always change a target’s behavior (
  14. ^ cyber action (
  15. ^ economic sanctions (
  16. ^ limited air strikes (
  17. ^ most effective (
  18. ^ targeted social media posts (
  19. ^ useful idiots (
  20. ^ Chief Petty Officer Dennis Herring/U.S. Cyber Command (
  21. ^ global (
  22. ^ information warfare (
  23. ^ electricity grid (
  24. ^ civic groups (
  25. ^ private homes (
  26. ^ voting systems (

Authors: Benjamin Jensen, Associate Professor of International Relations, Marine Corps University; Scholar-in-Residence, American University School of International Service

Read more

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more

Business Marketing