CSS CYBER DEFENSE Cyber Influence Operations: An Overview and Comparative Analysis Zurich, October 2019 Cyber Defense Project (CDP) Center for Security Studies (CSS), ETH Zürich Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25
[email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, Sean. (2019). Cyber Influence Operations: An Overview and Comparative Analysis, Cyberdefense Trend Analysis, Center for Security Studies (CSS), ETH Zürich. Table of Contents Executive Summary 4 1 Introduction 5 2 Summary of the Debate Around Influence Activities 6 2.1 Influence and Some Historical Examples 6 2.2 The Definition Conundrum of Influence Activities and Techniques 7 3 Cyber & Influence Operations 11 3.1 Definition and Scope of Cyber Influence Operations 11 3.2 Influence Operations and Cyber Influence Operations: Similarities and Differences 11 3.3 Potential & Strategic Implications 19 4 Comparative analysis: American and Russian Cyber Influence Operations 21 4.1 Methodology 21 4.2 Presentation of Results and Discussion 21 4.3 Additional Remarks 26 5 Conclusion 28 6 Glossary 30 7 List of Abbreviations 31 8 Bibliography 32 Cyber Influence Operations: An Overview and Comparative Analysis Executive Summary conflict, CIOs are increasingly also used in times of peace or in the context of mere rivalry.