Skip to main content
Top

2021 | OriginalPaper | Chapter

The Russian Influence Strategy in Its Contested Neighbourhood

Author : Marco Marsili

Published in: The Russian Federation in Global Knowledge Warfare

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The collapse of the Soviet Union has been followed by a series of conflicts between the Russian Federation and its neighbours. Although some of these conflicts have been fought at the kinetic level, they were justified by Moscow through information warfare activities and supported by influence operations. This chapter, which includes an extensive survey of the literature on the topic, aims to investigate the hybrid warfare strategy carried out by the Russian Federation in its “sphere of influence” over the last three decades—the Baltic states (Estonia, Latvia, and Lithuania), Ukraine (Crimea and Donbass, i.e., Donetsk and Luhansk People’s Republics), Georgia (South Ossetia and Abkhazia) and Moldova (Transnistria)—and to assess the effectiveness of the Russian (dis)information strategy. The essay focuses on the nationalist discourse and the pro-Russia narrative.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
regular army is the official army of a state or country (the official armed forces).
 
2
A covert operation is a military operation intended to conceal the identity of (or allow plausible denial by) the sponsor and intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas — affecting either the internal population of a country or individuals outside it.
 
3
For a broad survey of information warfare literature, see, inter alia, Merrick et al. (2016).
 
4
See, e.g., Department of Defense, Joint Publication (JP) 1-02, Dictionary of Military and Associated Terms; U.S. Joint Chiefs of Staff, JP 3-0 on Joint Operations, JP 3-12 on Cyberspace Operations, JP 3-13 on Information Operations, JP 3-13.1 on Electronic Warfare, JP 3-13.2 on Military Information Support Operations,  JP 3-13.3 on Operations Security, JP 3-13.4 on Military Deception, JP 3-58 on MILDEC, JP 3-61 on Public Affairs and JP 5-0 on Joint Planning.
 
5
For a wide review of the literature on influence operations and techniques (propaganda, PSYOP, IW, etc.), see Cordey (2019).
 
6
For a definition of grey zone warfare, see Theohary (2018, 4).
 
7
UN General Assembly, Developments in the field of information and telecommunications in the context of international security, A/RES/53/70, 4 December 1998.
 
8
For a meaningful list of information operations, see Schreier (2015), 19–23.
 
9
For a definition of disinformation and misinformation, see Theohary (2018, 4), Arold (2016, 25–26).
 
10
For a discussion on the IIO Russian strategy, concepts and doctrine, see Arold (2016).
 
11
For a discussion on hybrid warfare Russian strategy, concepts and doctrine, see Renz and Smith (2016).
 
12
The collective volume The Crisis in Ukraine and Information Operations of the Russian Federation, edited in 2016 by Sazonov et al. provides a wide-ranging discussion on the attempts of the RF to control the neighbouring territories and analyses the information warfare and hybrid war in the context of the Ukrainian-Russian conflict.
 
13
For a discussion on the direct impact of nationalism on the likelihood of disputes, see Ciorciari and Chen Weiss (2016).
 
Literature
go back to reference Ajir, M., & Vailliant, B. (2018). Russian information warfare: Implications for deterrence theory. Strategic Studies Quarterly,12(3), 70–89. Ajir, M., & Vailliant, B. (2018). Russian information warfare: Implications for deterrence theory. Strategic Studies Quarterly,12(3), 70–89.
go back to reference Andregg, M. (2019). Ultimate causes of wars (long-term, strategic causes) and differing roles for intelligence practitioners, academics, and policy makers. Romanian Intelligence Studies Review,19–20(2018), 237–256. Andregg, M. (2019). Ultimate causes of wars (long-term, strategic causes) and differing roles for intelligence practitioners, academics, and policy makers. Romanian Intelligence Studies Review,19–20(2018), 237–256.
go back to reference Armitage, R. L., & Nye, J. S. (2007). CSIS commission on smart power: A smarter, more secure America. Washington, DC: CSIS Press. Armitage, R. L., & Nye, J. S. (2007). CSIS commission on smart power: A smarter, more secure America. Washington, DC: CSIS Press.
go back to reference Arold, U. (2016). Peculiarities of Russian information operations. Sõjateadlane,2, 16–40. Arold, U. (2016). Peculiarities of Russian information operations. Sõjateadlane,2, 16–40.
go back to reference Aspin, L. (1994). Annual Report to the President and the Congress. Washington, DC, Government Publishing Office. Aspin, L. (1994). Annual Report to the President and the Congress. Washington, DC, Government Publishing Office.
go back to reference Bakshi, B. (2018). Information warfare: Concepts and components. International Journal of Research and Analytical Reviews,5(4), 178–185. Bakshi, B. (2018). Information warfare: Concepts and components. International Journal of Research and Analytical Reviews,5(4), 178–185.
go back to reference Beehner, L. M., Collins, L. S., & Person, R. T. (2018). The fog of Russian information warfare. In M. D. Vertuli & B. S. Loudon (Eds.), Perceptions are reality: Historical case studies of information operations in large-scale combat operations (pp. 31–50). Fort Leavenworth, KS: Army University Press. Beehner, L. M., Collins, L. S., & Person, R. T. (2018). The fog of Russian information warfare. In M. D. Vertuli & B. S. Loudon (Eds.), Perceptions are reality: Historical case studies of information operations in large-scale combat operations (pp. 31–50). Fort Leavenworth, KS: Army University Press.
go back to reference Bishop, M., & Goldman, E. O. (2003). The strategy and tactics of information warfare. Contemporary Security Policy,24, 113–139.CrossRef Bishop, M., & Goldman, E. O. (2003). The strategy and tactics of information warfare. Contemporary Security Policy,24, 113–139.CrossRef
go back to reference Blank, S. (2017). Cyber war and information War à la Russe. In G. Perkovich & A. E. Levite (Eds.), Understanding cyber conflict: Fourteen analogies (pp. 81–98). Washington, DC: Georgetown University Press. Blank, S. (2017). Cyber war and information War à la Russe. In G. Perkovich & A. E. Levite (Eds.), Understanding cyber conflict: Fourteen analogies (pp. 81–98). Washington, DC: Georgetown University Press.
go back to reference Boyte, K. J. (2017). An analysis of the social-media technology, tactics, and narratives used to control. Perception in the propaganda war over Ukraine. Journal of Information Warfare, 16(1), 88–111. Boyte, K. J. (2017). An analysis of the social-media technology, tactics, and narratives used to control. Perception in the propaganda war over Ukraine. Journal of Information Warfare, 16(1), 88–111.
go back to reference Brangetto, P., & Veenendaal, M. A. (2016). Influence cyber operations: The use of cyberattacks in support of influence operations. In N. Pissanidis, H. Rõigas, & M. Veenendaal (Eds.), 8th International Conference on Cyber Conflict (pp. 113–126). Tallinn: NATO CCD COE. http://dx.doi.org/10.1109/CYCON.2016.7529430. Brangetto, P., & Veenendaal, M. A. (2016). Influence cyber operations: The use of cyberattacks in support of influence operations. In N. Pissanidis, H. Rõigas, & M. Veenendaal (Eds.), 8th International Conference on Cyber Conflict (pp. 113–126). Tallinn: NATO CCD COE. http://​dx.​doi.​org/​10.​1109/​CYCON.​2016.​7529430.
go back to reference Breslauer, G., & Dale, C. (1997). Boris Yel’tsin and the invention of a Russian nation-state. Post-Soviet Affairs,13(4), 303–332.CrossRef Breslauer, G., & Dale, C. (1997). Boris Yel’tsin and the invention of a Russian nation-state. Post-Soviet Affairs,13(4), 303–332.CrossRef
go back to reference Carr, H. (2019). Arctic sovereignty and information warfare. The Three Swords Magazine,34, 83–89. Carr, H. (2019). Arctic sovereignty and information warfare. The Three Swords Magazine,34, 83–89.
go back to reference Charles, K. B. (2016). Russia’s indirect and asymmetric methods as a response to the new western way of war. Special Operations Journal,2(1), 1–11.CrossRef Charles, K. B. (2016). Russia’s indirect and asymmetric methods as a response to the new western way of war. Special Operations Journal,2(1), 1–11.CrossRef
go back to reference Chekinov, S. G., & Bogdanov, S. A. (2013). The nature and content of a new-generation war. Military Thought, 4. Chekinov, S. G., & Bogdanov, S. A. (2013). The nature and content of a new-generation war. Military Thought, 4.
go back to reference Cilluffo, F. J., & Gergely, C. H. (1997). Information warfare and strategic terrorism. Terrorism and Political Violence,9(1), 84–94.CrossRef Cilluffo, F. J., & Gergely, C. H. (1997). Information warfare and strategic terrorism. Terrorism and Political Violence,9(1), 84–94.CrossRef
go back to reference Cohen, D., & Bar’el, O. (2017). The use of cyberwarfare in influence operations. Tel Aviv: Yuval Ne’eman Workshop for Science, Technology and Security Tel Aviv University. Cohen, D., & Bar’el, O. (2017). The use of cyberwarfare in influence operations. Tel Aviv: Yuval Ne’eman Workshop for Science, Technology and Security Tel Aviv University.
go back to reference Creţu, V., & Ardeleanu, D. (2019). The revival of the Intermarium geopolitical project—The Three Seas Initiative and Bucharest 9 Format. Romanian Intelligence Studies Review,19–20(2018), 331–344. Creţu, V., & Ardeleanu, D. (2019). The revival of the Intermarium geopolitical project—The Three Seas Initiative and Bucharest 9 Format. Romanian Intelligence Studies Review,19–20(2018), 331–344.
go back to reference Denning, D. E. (1999). Information warfare and security. New York, NY: Addison Wesley Longman. Denning, D. E. (1999). Information warfare and security. New York, NY: Addison Wesley Longman.
go back to reference Eriksson, E. A. (1999). Information warfare: Hype or reality? The Nonproliferation Review (Spring-Summer) 57–64. Eriksson, E. A. (1999). Information warfare: Hype or reality? The Nonproliferation Review (Spring-Summer) 57–64.
go back to reference Fridman, O. (2018). Russian “hybrid warfare”: Resurgence and politicization. London: Hurst and Company.CrossRef Fridman, O. (2018). Russian “hybrid warfare”: Resurgence and politicization. London: Hurst and Company.CrossRef
go back to reference Godson, R., & Wirtz, J. J. (Eds.). (2002). Strategic denial and deception: The twenty-first century challenge. New Brunswick: Transaction Publishers. Godson, R., & Wirtz, J. J. (Eds.). (2002). Strategic denial and deception: The twenty-first century challenge. New Brunswick: Transaction Publishers.
go back to reference Gorkowski, J. B. (2018). US information operations in large-scale combat operations: Challenges and implications for the future force. In M. D. Vertuli & B. S. Loudon (Eds.), Perceptions are reality: Historical case studies of information operations in large-scale combat operations (pp. 17–30). Fort Leavenworth, KS: Army University Press. Gorkowski, J. B. (2018). US information operations in large-scale combat operations: Challenges and implications for the future force. In M. D. Vertuli & B. S. Loudon (Eds.), Perceptions are reality: Historical case studies of information operations in large-scale combat operations (pp. 17–30). Fort Leavenworth, KS: Army University Press.
go back to reference Herb, G. H., & Kaplan, D. H. (2017). Scaling identities: Nationalism and territoriality. Lanham, MD: Rowman and Littlefield. Herb, G. H., & Kaplan, D. H. (2017). Scaling identities: Nationalism and territoriality. Lanham, MD: Rowman and Littlefield.
go back to reference Hollis, D. B. (2007). Why states need an international law for information operations. Lewis and Clark Law Review,11(4), 1023–1061. Hollis, D. B. (2007). Why states need an international law for information operations. Lewis and Clark Law Review,11(4), 1023–1061.
go back to reference Hutchinson, W. (2006). Information warfare and deception. Informing Science,9, 213–223.CrossRef Hutchinson, W. (2006). Information warfare and deception. Informing Science,9, 213–223.CrossRef
go back to reference Iasiello, E. J. (2017). Russia’s improved information operations: From Georgia to Crimea. Parameters,47(2), 51–63. Iasiello, E. J. (2017). Russia’s improved information operations: From Georgia to Crimea. Parameters,47(2), 51–63.
go back to reference Johnson, S. L. (1997). Major intelligence challenge: Toward a functional model of information warfare. Studies in Intelligence,1(1), 49–56. Johnson, S. L. (1997). Major intelligence challenge: Toward a functional model of information warfare. Studies in Intelligence,1(1), 49–56.
go back to reference Jones, A. (1999). Information warfare—What it is? Information Security Technical Report,4(3), 12–19.CrossRef Jones, A. (1999). Information warfare—What it is? Information Security Technical Report,4(3), 12–19.CrossRef
go back to reference Jowett, G. S., & O’Donnell, V. (2012). Propaganda and persuasion (5th ed.). London: Sage Publications. Jowett, G. S., & O’Donnell, V. (2012). Propaganda and persuasion (5th ed.). London: Sage Publications.
go back to reference Kanet, R. E. (2011). From the “new world order” to “resetting relations”: Two decades of US–Russian relations. In R. E. Kanet (Ed.), Russian foreign policy in the 21st century (pp. 204–227). London: Palgrave Macmillan. https://doi.org/10.1057/9780230293168. Kanet, R. E. (2011). From the “new world order” to “resetting relations”: Two decades of US–Russian relations. In R. E. Kanet (Ed.), Russian foreign policy in the 21st century (pp. 204–227). London: Palgrave Macmillan. https://​doi.​org/​10.​1057/​9780230293168.
go back to reference Kuehl, D. T. (2002). Information operations, information warfare, and computer network attack: Their relationship to national security in the information age. International Law Studies,76, 35–58. Kuehl, D. T. (2002). Information operations, information warfare, and computer network attack: Their relationship to national security in the information age. International Law Studies,76, 35–58.
go back to reference Larson, E. V., Darilek, R. E., Gibran, D., et al. (2009). Foundations of effective influence operations: A framework for enhancing army capabilities (MG-654-A). Santa Monica, CA: RAND Corporation. Larson, E. V., Darilek, R. E., Gibran, D., et al. (2009). Foundations of effective influence operations: A framework for enhancing army capabilities (MG-654-A). Santa Monica, CA: RAND Corporation.
go back to reference Libicki, M. C. (2007). Conquest in cyberspace: National security and information warfare. New York, NY: Cambridge University Press.CrossRef Libicki, M. C. (2007). Conquest in cyberspace: National security and information warfare. New York, NY: Cambridge University Press.CrossRef
go back to reference Malyarenko, T., & Wolff, S. (2018). The dynamics of emerging de-facto states: Eastern Ukraine in the post-Soviet space. Abingdon: Routledge. Malyarenko, T., & Wolff, S. (2018). The dynamics of emerging de-facto states: Eastern Ukraine in the post-Soviet space. Abingdon: Routledge.
go back to reference Martinus, I. (2001). Small business in the new battlefield: Government attempts at providing a secure environment. In W. Hutchinson, M. Warren, & J. Burn (Eds.), Survival in the e-conomy: 2nd Australian Information Warfare and Security Conference 2001 (pp. 12–20). Churchlands, Australia: School of Management Information Systems, Edith Cowan University. https://ro.ecu.edu.au/ecuworks/6758. Martinus, I. (2001). Small business in the new battlefield: Government attempts at providing a secure environment. In W. Hutchinson, M. Warren, & J. Burn (Eds.), Survival in the e-conomy: 2nd Australian Information Warfare and Security Conference 2001 (pp. 12–20). Churchlands, Australia: School of Management Information Systems, Edith Cowan University. https://​ro.​ecu.​edu.​au/​ecuworks/​6758.
go back to reference McGovern, E. A. (Ed.). (2003). Military Intelligence Professional Bulletin, 29(3). McGovern, E. A. (Ed.). (2003). Military Intelligence Professional Bulletin, 29(3).
go back to reference Mölder, H. (2016). The war of narratives—Putin’s challenge to international security governance in Ukraine. Sõjateadlane,2, 88–113. Mölder, H. (2016). The war of narratives—Putin’s challenge to international security governance in Ukraine. Sõjateadlane,2, 88–113.
go back to reference Murphy, D. M. (2010). Attack or defend? Leveraging information and balancing risk in cyberspace. Military Review 88–96. Murphy, D. M. (2010). Attack or defend? Leveraging information and balancing risk in cyberspace. Military Review 88–96.
go back to reference Pakhomenko, S., & Tryma, C. (2016). Identity and propaganda in Russian-Ukrainian hybrid warfare. Sõjateadlane,2, 42–53. Pakhomenko, S., & Tryma, C. (2016). Identity and propaganda in Russian-Ukrainian hybrid warfare. Sõjateadlane,2, 42–53.
go back to reference Pamment, P., Nothhaft, H., Agardh-Twetman, H., & Fjällhed, A. (2018). Countering information influence activities: The state of the art. Lund: Lund University. Pamment, P., Nothhaft, H., Agardh-Twetman, H., & Fjällhed, A. (2018). Countering information influence activities: The state of the art. Lund: Lund University.
go back to reference Popa A. V. (2019). Reconfiguring the balance of power in the wider Black Sea region: the Romanian proposal for an allied naval cooperation. Romanian Intelligence Studies Review, 19–20, 345–374 (2018). Popa A. V. (2019). Reconfiguring the balance of power in the wider Black Sea region: the Romanian proposal for an allied naval cooperation. Romanian Intelligence Studies Review, 19–20, 345–374 (2018).
go back to reference Riistan, A. (2016). The Moscow patriarchate and the conflict in Ukraine. Sõjateadlane,2, 206–231. Riistan, A. (2016). The Moscow patriarchate and the conflict in Ukraine. Sõjateadlane,2, 206–231.
go back to reference Sakwa, R. (2006). Nations and nationalism in Russia. In G. Delanty & K. Kumar (Eds.), The SAGE handbook of nations and nationalism. London: SAGE. Sakwa, R. (2006). Nations and nationalism in Russia. In G. Delanty & K. Kumar (Eds.), The SAGE handbook of nations and nationalism. London: SAGE.
go back to reference Sazonov, V. (2017). In V. Sazonov et al. (Eds.), Conclusion: The Russian information operations in 2014–2015 (pp. 75–76). Sazonov, V. (2017). In V. Sazonov et al. (Eds.), Conclusion: The Russian information operations in 2014–2015 (pp. 75–76).
go back to reference Sazonov, V., Mölder, H., Müür, K., et al. (Eds.). (2017a). Russian information operations against Ukrainian armed forces and Ukrainian countermeasures (2014–2015), ENDC Occasional Papers, 6. Tartu: Estonian National Defence College. Sazonov, V., Mölder, H., Müür, K., et al. (Eds.). (2017a). Russian information operations against Ukrainian armed forces and Ukrainian countermeasures (2014–2015), ENDC Occasional Papers, 6. Tartu: Estonian National Defence College.
go back to reference Sazonov, V., Müür, K., & Kopõtin, I. (2017b). In V. Sazonov et al. (Eds.), Methods and tools of Russian information operations used against Ukrainian armed forces: The assessments of Ukrainian experts (pp. 52–66). Sazonov, V., Müür, K., & Kopõtin, I. (2017b). In V. Sazonov et al. (Eds.), Methods and tools of Russian information operations used against Ukrainian armed forces: The assessments of Ukrainian experts (pp. 52–66).
go back to reference Sazonov, V., & Müür, K. (2017). In V. Sazonov et al. (Eds.), Introduction: Russian hybrid and information warfare (pp. 9–12). Sazonov, V., & Müür, K. (2017). In V. Sazonov et al. (Eds.), Introduction: Russian hybrid and information warfare (pp. 9–12).
go back to reference Sazonov, V., & Mölder, H. (2017). In V. Sazonov et al. (Eds.), Why did Russia attack Ukraine? (pp. 28–33). Sazonov, V., & Mölder, H. (2017). In V. Sazonov et al. (Eds.), Why did Russia attack Ukraine? (pp. 28–33).
go back to reference Sazonov, V., Mölder, H., & Saumets, A. (2016). Introduction: The role of Russian information warfare. Sõjateadlane,2, 7–12. Sazonov, V., Mölder, H., & Saumets, A. (2016). Introduction: The role of Russian information warfare. Sõjateadlane,2, 7–12.
go back to reference Scheipers, S. (2016). Winning wars without battles: Hybrid warfare and other ‘indirect’ approaches in the history of strategic thought. In B. Renz & H. Smith (Eds.), Russia and hybrid warfare—Going beyond the label (Aleksanteri Papers No. 1/2016) (pp. 47–51). Helsinki: Kikimora. Scheipers, S. (2016). Winning wars without battles: Hybrid warfare and other ‘indirect’ approaches in the history of strategic thought. In B. Renz & H. Smith (Eds.), Russia and hybrid warfare—Going beyond the label (Aleksanteri Papers No. 1/2016) (pp. 47–51). Helsinki: Kikimora.
go back to reference Schmidt-Felzmann, A. (2017). More than ‘just’ disinformation: Russia’s information operations in the Nordic region. In T. Čižik (Ed.), Information warfare. New security challenge for Europe (pp. 32–67). Bratislava: Centre for European and North Atlantic Affairs. Schmidt-Felzmann, A. (2017). More than ‘just’ disinformation: Russia’s information operations in the Nordic region. In T. Čižik (Ed.), Information warfare. New security challenge for Europe (pp. 32–67). Bratislava: Centre for European and North Atlantic Affairs.
go back to reference Sliwa, Z. (2017). In V. Sazonov et al. (Eds.), “Hybrid warfare”—The military security domain’s considerations (pp. 13–27). Sliwa, Z. (2017). In V. Sazonov et al. (Eds.), “Hybrid warfare”—The military security domain’s considerations (pp. 13–27).
go back to reference Thomas, T. L. (1996a). Deterring information warfare: A new strategic challenge. Parameters,26(4), 81–91. Thomas, T. L. (1996a). Deterring information warfare: A new strategic challenge. Parameters,26(4), 81–91.
go back to reference Thomas, T. L. (1996b). Russian views on information-based warfare. Airpower Journal (Special Edition) 25–35. Thomas, T. L. (1996b). Russian views on information-based warfare. Airpower Journal (Special Edition) 25–35.
go back to reference Tsymbal, V. I. (1995, September 12–14). Kontseptsiya “informatsionnoy voyny” (Concept of Information War). In Speech at the Russian-U.S. Conference “Evolving Post-Cold War National Security Issues”, held at the Russian Academy of Civil Service in Moscow. Tsymbal, V. I. (1995, September 12–14). Kontseptsiya “informatsionnoy voyny” (Concept of Information War). In Speech at the Russian-U.S. Conference “Evolving Post-Cold War National Security Issues”, held at the Russian Academy of Civil Service in Moscow.
go back to reference UN General Assembly. (1998). Developments in the field of information and telecommunications in the context of international security (A/RES/53/70). UN General Assembly. (1998). Developments in the field of information and telecommunications in the context of international security (A/RES/53/70).
go back to reference Värk, R. (2017). In V. Sazonov et al. (Eds.), Legal element of Russia’s hybrid warfare (pp. 45–51). Värk, R. (2017). In V. Sazonov et al. (Eds.), Legal element of Russia’s hybrid warfare (pp. 45–51).
go back to reference Vilson, M. (2016). The Europeanization of foreign policy. Sõjateadlane,2, 113–140. Vilson, M. (2016). The Europeanization of foreign policy. Sõjateadlane,2, 113–140.
go back to reference Wetoszka, A. (2016). An attempt to identify hybrid conflict. Sõjateadlane,2, 54–75. Wetoszka, A. (2016). An attempt to identify hybrid conflict. Sõjateadlane,2, 54–75.
go back to reference White, W. P. (2018). The cyber crucible: Eastern Europe, Russia, and the development of modern warfare. In M. D. Vertuli & B. S. Loudon (Eds.), Perceptions are reality: Historical case studies of information operations in large-scale combat operations (pp. 151–162). Fort Leavenworth, KS: Army University Press. White, W. P. (2018). The cyber crucible: Eastern Europe, Russia, and the development of modern warfare. In M. D. Vertuli & B. S. Loudon (Eds.), Perceptions are reality: Historical case studies of information operations in large-scale combat operations (pp. 151–162). Fort Leavenworth, KS: Army University Press.
go back to reference Zhaohong, J. N. (2016). Information warfare—The challenges and opportunities for militaries in the information age. Pointer,42(3), 49–57. Zhaohong, J. N. (2016). Information warfare—The challenges and opportunities for militaries in the information age. Pointer,42(3), 49–57.
go back to reference Zhou, V. (2020, March 23). Coronavirus barbs help nobody, China’s Washington ambassador says after ‘US army’ tweets. South China Morning Post. Zhou, V. (2020, March 23). Coronavirus barbs help nobody, China’s Washington ambassador says after ‘US army’ tweets. South China Morning Post.
Metadata
Title
The Russian Influence Strategy in Its Contested Neighbourhood
Author
Marco Marsili
Copyright Year
2021
Publisher
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-73955-3_8