30,95 €
30,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
15 °P sammeln
30,95 €
30,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
15 °P sammeln
Als Download kaufen
30,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
15 °P sammeln
Jetzt verschenken
30,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
15 °P sammeln
  • Format: ePub

Technology-enabled influence operations, including disinformation, will likely figure prominently in adversary efforts to impede U.S. crisis response and alliance management in high-risk, high-impact scenarios under a nuclear shadow. Both Russia and China recognize their conventional military disadvantage vis-à-vis conflict with the United States. As a result, both nations use sub-conventional tactics and operations to support their preferred strategies for achieving favorable outcomes while attempting to limit escalation risks. Such strategies include an array of activities loosely identified…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 2.34MB
Produktbeschreibung
Technology-enabled influence operations, including disinformation, will likely figure prominently in adversary efforts to impede U.S. crisis response and alliance management in high-risk, high-impact scenarios under a nuclear shadow. Both Russia and China recognize their conventional military disadvantage vis-à-vis conflict with the United States. As a result, both nations use sub-conventional tactics and operations to support their preferred strategies for achieving favorable outcomes while attempting to limit escalation risks. Such strategies include an array of activities loosely identified as influence operations, focused on using and manipulating information in covert, deniable, or obscure ways to shape the strategic environment. This report presents eight scenarios-four focused on Russia and four focused on China-that invite potential escalation risks and demonstrate how the tools and tactics of influence operations could be employed to challenge detection, response, and crisis management. It explores a range of potential escalatory pathways and destabilizing consequences if adversary influence operations engage strategic interests and targets in high-risk scenarios and identifies key takeaways and recommendations for policymakers to better identify and defend against adversary influence operations.
Autorenporträt
By Rebecca Hersman; Eric Brewer; Lindsey Sheppard and Maxwell Simon