Emily Bienvenue is a Senior Analyst in the Joint Operations and Analysis Division at the Defence Science and Technology Group Edinburgh. Zachary Rogers is a Research Lead in the Jeff Bleich Centre for the U.S. Alliance in Digital Technology, Security, and Governance at Flinders University.
While the nature of war remains a battle of political wills, discontinuous change in the strategic landscape is constantly changing the way in which warfare is conducted.1 Expedited by the speed and scope of technological change, the age of information warfare (IW) is well upon us.2 While the impact of technological change on operational and strategic maneuverability in the physical battlespace is comparatively well understood, the impact of complex interwoven technological and social trends on the nature of conflict and the threat posed to the rules-based global order are less so.
The intentions of this article are twofold. First, it aims to improve understanding of the nature of change in the operating environment. Emerging from technological change is a strategic war against trust—trust in the open rules-based system and the sociopolitical systems of its key players. Authoritarian states such as China and Russia, for whom a level of revision of the existing order is a key strategic interest, are contending to rewrite, disrupt, or block the preferred narratives of the Western liberal democracies such as Australia’s by sowing seeds of distrust within and without of their hyper-connected societies. Four interlocking features of the emergent operating environment drive this change: the shift from vertical to horizontal networks of power, expansion of the cognitive battlespace, constant and unrestricted warfare, and the erosion of trust in traditional centralized institutions. In the digital era, state and nonstate actors alike exploit and manipulate information for commercial and strategic effect. Power flows among a diversity of actors connected through horizontal networks, in which the state’s—and other traditional institutions’—roles and capacities to channel that power are disrupted.3 The lines between the civilian and military domains and the conditions of peace and war are indistinguishable. The contemporary canter of warfare, considered as both violent and nonviolent contending with others for political gain, is now a constant between and across whole societies.4 Chaos and disorder in the information domain undermine functionality in the Western liberal institutional tradition and degrade the basis of authority, legitimacy, and trust in the rules-based order.5
Second, this article asserts that trust, characterized by its relational nature, is the connective tissue that provides legitimacy and authority to the promise and functionality of openness and rule-making. It enables the acceptance of a level of vulnerability associated with open systems.6 This relational trust offers us an advantage over adversaries that cooperate on a more transactional and calculative basis, and is thus an underrecognized strategic resource. Without trust and the normative principles and institutions that provide a plausible narrative for the rules-based global order, those who support and benefit from an open system risk strategic defeat below the threshold of conventional conflict.7 To default to the employment of the offensive strategies of our adversaries, what Joseph Nye has termed “sharp power,”8 is to risk forfeiting one of our most valuable strategic resources.9 In addition, it is to play into the strategic strengths of adversary actors for whom the incumbent international order and its underpinnings of relational trust between allied partners are the primary competitive threat.
Shifting Contours of the Strategic Landscape
In 2004, the Australian army released a future operating concept. Written by Lieutenant Colonel David Kilcullen, “Complex Warfighting” described a “changing landscape in which [globalization] has created and empowered a diverse range of enemies of the west; and U.S. dominance . . . has caused those adversaries to seek asymmetric arenas and unconventional means to confront the west.” Kilcullen’s analysis of the operating environment and the evolving character of warfare centered around four longstanding trends: complexity, lethality, diversity, and diffusion of warfare. For Kilcullen, however, ongoing changes in the operating environment and the nature of warfare resided “in the unpredictable, ambiguous, and highly complex manner in which the trends interact, not in each trend itself.”10 Subsequent doctrine sketched the contours of such complexity, describing an operating environment “that is more than the physical environment.”11 However, the ongoing preoccupation with the modernization of technology as a means to maintain relative advantage in the physical battlespace neglects the deeply complex social changes Kilcullen was referring to.
Drawing on lessons from Iraq and Afghanistan, in 2006 Robert Scales purported that victory in the wars of the future would be decided by human and cultural factors. According to Scales, Iraq and Afghanistan indicated that it would be not technological superiority but rather the capacity to capture the perceptions and minds of populations that would determine victory on the battlefield.12 The idea that war is not simply an engineering problem is not new. Scales goes beyond this understanding of warfare, claiming that human and cultural factors are decisive factors in battle. Indeed, close combat capabilities would remain a key function of an army that would have to contend with violent conflict; however, these capabilities would be insufficient to achieve strategic effect in the future war for minds.
Today, major shifts in the strategic landscape suggest that the narrative of liberal internationalism and the associated global governance model is under great strain. In place since 1945, the rules-based global order has been underwritten by the primacy of U.S. material power and principles of democracy, transparency, and openness as reflected and reinforced by national and global institutions. These pillars of the postwar order do not exist in isolation. Superior military and economic resources manifest as strategic power only when translated through the institutions able to convert the resource into the preferred strategic outcome. The capacity for the translation of resources into preferred strategic outcomes has been dependent on not only the maintenance of material superiority but also the sustainment of the enabling narrative.13
Through a combination of relative decline in material superiority and accumulating challenges to the narrative, the capacity for translation has been eroding for the United States for some time, marked by many scholars of the international order as far back as 1973 and beyond.14 This decline has continued and accelerated in recent times, as major signs of fragility in the order marked by financial crises, breakdown of international consensus and cooperation, and security crises have proliferated since 2001. In addition, the digital age has ushered in new threats that have not only created a new terrain of competitive interactions but have also distorted existing orientations regarding competition and conflict. A major development has been the capacity of opponents of the existing order to cause disruption and dysfunction in its supporting narrative while pursuing material gains in other ways.15
Russian interference in the 2016 U.S. Presidential elections marks the manifestation and convergence of these trends. Fragility in the global order has given way to upheaval. As major reorientation of the global order is under way, states are being forced to adapt to the rapidly changing environment while seeking to preserve features of the order aligned with their strategic interests. For Australia, its interests remain tied to the material superiority of allied military and economic resources coupled with an institutional narrative of openness to cross-border trade and investment, the preservation of stability and security, and an emphasis on consensual and rules-based international governance. While global shifts in material power are forces outside of Australia’s control, the sustainment and propagation of its preferred institutional narrative can be significantly influenced by whole-of-government actions.
This process is dependent on trust. It is trust that allows both individuals and states to commit to institutions in an environment of imperfect information and underpins the narratives that sustain them over time. Disinformation and uncertainty in the age of cognitive warfare present a direct threat to these processes and capacities to maintain and renew the institutions and norms that underwrite the rules-based global order.16 Adversarial attempts to precipitate the erosion of trust are an attack on the connective tissue of allied strategic power. The erosion of trust must not be met with a retreat from trust; rather, it brings to the fore the centrality of relational trust as a strategic resource of allied systems and the paucity of trust in adversary systems.17 Relational trust cultivation is the counter to adversary transactional-based relationships, which represent a vector of long-term strategic advantage that requires greater acknowledgment.
Nathan Freier and Jonathan Dagle of the U.S. Army War College have identified the challenge presented by an era of hyper-competition to the values of openness and liberalism:
Russia and China create the worst possible Faustian choices for U.S. public- and private-sector leaders. On the one hand: choose to stick to the core values that define the United States—a rules-based international order, truth and candor, free speech, free markets, free enterprise, etc.—and see those values exploited at U.S. expense. On the other hand: compromise those values to wrestle in the mud with rivals, and hazard erosion of the hard-won principles that have for so long separated the United States and other liberal democracies from their authoritarian adversaries.18
This challenge is evident across a number of theaters of below-the-threshold conflict around the world. Gregory Poling reports on China extending its influence in the South China Sea not through its often cited military modernization but through its “weaponized” counter-narrative of victimization at the hands of European and Asian powers.19 Digital platforms provide new opportunities for China to transmit this narrative not only to its domestic population but also to the region and beyond. China’s narrative depicts the United States and its allies as a destabilizing force in the region and serves to propagate the belief that the U.S.-led security architecture, long synonymous with a rules-based global order, is merely a euphemism for its hegemony, not a guarantee of security and stability for the region.
A more unilateralist foreign policy under Trump and a reduction of U.S. hard power in the region play to China’s counternarrative. This metanarrative provides a façade for the People’s Liberation Army’s incremental territorial gains in the South China Sea. By targeting the morality of U.S. strategy, it challenges the normative basis for the “rules-based global order” without which the United States and other members of the regional system of alliances, most notably Australia, cannot exercise their material power. As noted by U.S. Air Force Intelligence and Information Operations Officer Jon Herrmann, “When a narrative, as a key example of information power, falters, other forms of power also falter.”20 As a number of scholars, officials, and commentators have also noted, a further refined and targeted version of this strategy is likely to migrate further south to the South Pacific and the strategically pivotal countries to Australia’s north.21
From Vertical to Horizontal Networks of Power
The future of governance in the immediate region and elsewhere is uncertain. It cannot be predicted, and efforts to reconstitute it must be cognizant of complexity, as the nature of these changes is inherently discontinuous and nonlinear.22 This disruption is driven by four interlocking characteristics of the age of digital information networks, detailed below. The ubiquity of information in the digital era has caused a diffusion of power among a diversity of actors in the international system. However, as indicated in Kilcullen’s 2004 Complex Warfighting operating concept, while the increased diversity of actors is not a new trend, it is how these actors wield power through flattened power structures that represents a marked change.23 In the unfolding strategic context, power no longer strictly flows through vertical hierarchical institutions upon which sits the state, but rather flows horizontally through complex networks in which the role of the state and its ability to exercise power is unclear.24 Individuals, social groups, organizations, and state actors as distinct and indistinct entities and in side-by-side relationships are involved in the transmission of ideas and the exploitation and manipulation of information as a means to gain strategic advantage. As a number of authors attest, IW waged through these horizontal networks upsets the balance of power as its means do not favor the traditional remit of vertically hierarchical conventional militaries.25 In the information domain, advantage is hard to achieve and maintain as “a narrative can now deploy in a rapid-fire series of mutually reinforcing stories that are hard for people to disregard and reach a global audience in seconds at minimal costs.”26 Furthermore, the rapid deployment of narratives can create chaos and undermine the rules-based global order and those that stand in support of it.27
China has conducted a concerted information campaign through statements of senior officials and state-owned media outlets to develop a narrative of victimization and rightful historical ownership of land features in the South China Sea.28 This narrative is intended to foster perceptions that China’s extension of power into the South China Sea is a defensive measure, and therefore the behaviors of those contesting China’s actions are offensive. At the same time, little information has been released to the public from U.S. intelligence agencies regarding China’s activities, further facilitating China’s own narrative.29 Operatives of the Russian Internet Research Agency, a Kremlin-associated group run by oligarch Yevgeny Prigozhin, exploited existing partisanship and disenfranchisement in the U.S. political system.30 Their use of fake profiles on social media platforms, including but not limited to Twitter and Facebook, to spread suspicions against key political figures, namely within the Democratic Party, was a highly effective, yet unseen offensive against American democracy.31 Before Russia, militant extremist group al Shabaab, and later the so-called Islamic State, used a wide range of social media platforms to transmit its propaganda and amplify its voice to construct a narrative of religious superiority and moral higher order to support calls for jihad.32
Expansion of the Cognitive Battlespace
Corresponding with the expansion of digital horizontal networks, the cognitive battlespace has expanded dramatically while eluding formal characterization within military and intelligence communities. The shifts in the strategic landscape suggest its time has come and a cogent definition and lexicon are now overdue. IW is an enduring feature of warfare. Early 1990s conceptualizations of IW viewed it as a component of the overall military battlespace and as a convergence of separate lines of effort that included all elements of intelligence, surveillance, and reconnaissance, electronic warfare, psychological operations, and cyber operations. However, a unity of effort under a unified theory of IW did not materialize, and the elements of IW continued to develop and evolve as more or less distinct operational efforts supplementary to kinetic effects.33 Concepts of “cognitive warfare” were introduced but remained indistinct from the broader IW discussion within military and intelligence communities.34 A brief overview of the cognitive battlespace and cognitive warfare is offered below.
Broadly speaking, cognition describes the mental process by which information is transformed into knowledge and knowledge into understanding.35 As early discussions of IW pointed out, human understanding of the battlespace is the essence of situational awareness and the basis of strategic decisionmaking and action.36 Contests for information assurance and security involving attempts to deny, degrade, and destroy adversary information have always occurred in a “cognitive battlespace.” These efforts now include but are not exhausted by all the elements of IW mentioned, and thus involve both human and cyber systems and dissolve the civil-military divide. The point of departure is in the exploding use of computers as persuasive technologies—the set of practices termed captology by Stanford University’s B.J. Fogg in 1997.37 It is by way of the uniquely persistent, proximal, and continuous forms of contending availed by digital technologies, accessing the minds of others anonymously and from extended range, that IW efforts have merged into an expanded cognitive domain. These contests taken as a whole amount to “cognitive warfare,” the sum of which is greater than its individual parts, and where the unintended side effects of intended persuasive activities are unpredictable and emergent. Effects in the cognitive battlespace have the capacity to alter the context of situational awareness, thus rendering it incomplete. Incomplete situational awareness can reflect an orientation toward information that obscures its meaning. Capabilities deployed under a false orientation cannot achieve the desired strategic effect. Worse still, the capacity to recognize and adapt to the shifting circumstances can be thwarted.
Cognitive warfare is an enduring feature of the existing and future operating environment. By connecting all domains, it blurs distinctions between war and peace and operational levels. The unification of lines of effort and effects under preexisting IW constructs has been forced on operators by a combination of the shifting strategic circumstances and by the efforts and activities of not only adversaries but also private-sector captology practices with no malignant intent, effectively creating a new terrain. The transformative impact of the weaponization of the cognitive domain extends well beyond existing conceptualizations of the problem space. In turn, the erosion and delegitimization of the liberal internationalist narrative change the context in which the United States and its allies may seek to exercise kinetic power. This terrain and its informational content connect the traditional physical domains of warfare to human systems, and there is no firewall dividing civil and military domains and no sentinel currently protecting the domestic population. Sophisticated and coordinated information operations traversing this terrain are poised to target the political, cultural, and moral centers of gravity of society, leveraging all elements of the connectivity, reach, and persistence of the medium.
No better example to date exists than the Russian manipulation of various social media platforms in the 2016 U.S. election, acknowledged on July 3, 2018, by the U.S. Select Senate Committee on Intelligence (SSCI) report, which confirmed the U.S. Intelligence Community Assessment produced in January 2017.38 Having foreseen “the broad impact of technology on the battlespace,” Russia has effectively leveraged the shift to horizontal information networks and the expansion of gray-zone warfare.39
While very much in its formative stages, U.S.-based military and intelligence communities have begun to develop a lexicon for cognitive war that contains analogies with elements of traditional kinetic warfare.40 From these early conceptualizations, the concept of information effects is being refined. The advent of hyper-connectivity has added the carefully tailored narrative to the arsenal of information effects.41 The narrative, injected into the information cycle at the critical time, can be described as a form of “cognitive fire.” Cognitive fires are now precision-guided, and the kill chain is transversal. Cognitive fires emit a “narrative signature” in the electromagnetic spectrum, analogous to an aircraft wing in the radio spectrum or a combustion engine in infrared.42 To an extent, they can be identified and tracked. However, when a weaponized narrative leaps inevitably from cyberspace into analogue physical space, its signature gets disseminated and, in many cases seen recently, its effects both intended and unintended can be exponentially magnified. This exponential payoff in effects is what defines cognitive fires as a strategic weapon of unprecedented power. The Russian information operations identified in the SSCI report benefited precisely from this payoff. The strategic ramifications, therefore, are not limited in the same way as adversaries’ employment of high-tech weaponry or the cyber warfare targeting of command and control of deployed armed forces. The strategic implications extend to the vulnerable cognitive fabric of the open society from which the armed forces of liberal democracies draw the entirety of their resources.
Constant, Unrestricted, and Unbounded Warfare
As the cognitive battlespace expands, the strategic threshold, once determined as a discernible point on a linear continuum by traditional markers of conflict escalation, now transverses a multidimensional nonlinear matrix of competition and conflict. In the cognitive battlespace, lines demarcating civil and military spaces and conditions of peace and war are being blurred and reconstituted. Adversary lines of effort are increasingly aimed below a threshold at which conventional combat capabilities would be engaged. Both Russia and China have employed integrated military and nonmilitary mechanisms aimed directly at the strategic level, bypassing operational level campaigns, which extend beyond the limits of the physical battlespace.43 Iran’s constant, unrestricted, and unbounded warfare strategy leverages Hizballah to cause societal and political chaos for its adversaries.44 This strategy, bypassing the strengths and authority of traditional militaries, is not the preserve of militaries but is open to all. As Clint Watts suggests, the concern now should be how everyone, state and nonstate, might seek to employ similar strategies and the consequences of mass chaos in a world in which the capacity to distinguish truth from fiction is in precipitous decline.45
This strategy is intentionally designed to play to the weaknesses of Western liberal democracies by attacking their soft underbelly.46 Military and legal responses to adversaries’ efforts that blur the line between militaries and civilian populations and acts of war debilitate liberal democratic norms and principles of international law. Effective responses must be oriented to reflect this blurring and reconstitution of the relevant battlespace.47 The integrated incorporation of informational effects with physical effects, in both offensive and defensive contexts, can orient the armed forces toward the “cognitive main effort” they will require while defending the peace as well as to fight and win in the future operating environment. A cognitive main effort requires whole-of-government coordination and support, and will require significant organizational adjustment within the Australian Defence Organisation.48
Erosion of Trust in Western Liberal Democratic Institutions
The dislocation of states from their traditional hierarchies and the failure of governance are both caused by and enforce the erosion of ideas, norms, and trust upon which the Westphalian state and rules-based order are predicated. The loss of trust in centralized Western liberal democratic institutions and their ability to govern after the 2007–2008 global financial crisis is now exacerbated by the advent of peer-to-peer digital platforms, including but not limited to social media, through which ideas about the failure of Western democratic institutions and decentralized self-governance models are transmitted. Soon, distributed ledger technology, commonly known as “blockchain,” will add new and novel variances to the human-computer interface as institutions such as banks, governments, and corporations seek a secure foothold out of what is widely recognized as a rogue cyber domain.49 These and other technology-driven changes represent radical and untested interventions in analogue systems of trust.
According to the 2018 Edelman Trust Barometer, the trust that was dislocated from vertical liberal democratic institutions to digital platforms is now also in decline as the findings of the Robert Mueller investigation are made public and people come to realize that the person they correspond with via these networks may not be a “peer” but rather a bot.50 How trust in a post-truth world will be reconstituted in horizontal networks and the role of the state within are yet to be determined.51 At the same time, the 2018 Edelman barometer shows that trust of a different type—transactional in nature—has increased in authoritarian systems, most notably China, which now holds the number-one trust rank. Here the broader implications of proliferating disinformation activities are clear. Not only battles for trust, but contests of trust, to reorient its meaning between different political-economic systems—democratic and authoritarian—characterize this strategic contest. Leading scholars from the intelligence, military, and academic communities are recognizing this fundamental shift: “The most prominent operations of the last year—Russian attempts to undermine the 2016 American Presidential election through the hacking of the Democratic National Committee, the release of emails, and the use of fake Facebook and Twitter accounts—were designed to undermine trust in institutions through manipulation, distortion, and disruption.”52
Developing Trust to Navigate Uncertainty in the Cognitive Battlespace
The future of global governance and the Western liberal democratic model is yet to be determined and may be in a state of contested reconstitution indefinitely. The interplay of social and technological trends, from which the threat to the strategic narrative and global governance model emerges, is characteristically nonlinear and therefore cannot be predicted, and plays out below a threshold in which the attention and resources required to respond are likely not forthcoming from highly distracted societies and government institutions. This is fundamentally because the interplay is occurring within complex and multifaceted human and nonhuman systems about which we as observers have inherently imperfect knowledge. The threat is by its nature an orientation challenge, driven by the complexity in the speed and scope of change. This means that the more immediate strategic problem for the Australian army is not in meeting a peer adversary on the conventional battlefield, which is a low-probability, high-impact operational and tactical scenario, but the uncertainty of governance, stability, and peace at both local and global levels in the face of contending narratives that erode the incumbent social-political settlement upon which civil peace—domestic and international—is predicated. Relational trust, therefore—the voluntary acceptance of a level of vulnerability in the presence of pervasive uncertainty—is a strategic resource that represents the connective tissue of Australian and allied power, and it requires acknowledgment and cultivation as a type of “immunity boost” for sociopolitical stability and sustainability, not retreat and abandonment.53
Trust cultivation and prioritization are active strategies to reestablish the conditions in which preferred supporting narratives can be forwarded. Without the trust component, the narrative and associated order become one of reactive self-interest and short-term transactionalism, which provides benefits to the highest bidder and the most materially endowed. Power and influence become a numbers game, one that would offer particular benefits to authoritarian adversaries. Building trust avoids succumbing to an attempt to directly counter the strategic aims of the adversary, which further erodes the fabric of open societies and works to alter the rules of the game to adversary advantage. It provides the heuristic needed to underpin the necessary unified narrative to coordinate joint and whole-of-government activities—for example, international engagement, information operations, IW, and psychological operations—in the cognitive battlespace and the means to deny the adversary strategic space gained through “information fratricide,” a consequence of discordant strategic messaging. Coherence can only be achieved as a product of strategic engagement that augments and aligns existing disparate lines of effort conducted under the auspices of a cognitive main effort. Without the coherence of narrative provided by trust, the cognitive main effort succumbs to an analogue of blue-on-blue conflict, to use kinetic terms.
For an army, this requires a reorientation of its international engagement strategy as an ad hoc line of effort in support of kinetic operations. The development of relational trust requires strategic engagement—enduring in nature and coordinated for a unified strategic message as the U.S. Echelons Above Brigade (EAB) concept concurs. U.S. Army efforts in this regard are well advanced. U.S. Army Training and Doctrine Command Pamphlet 525-3-8, published December 6, 2018, details how the Service’s EAB concept can better support operations across the “competition continuum,” with particular focus on persistent competition below the threshold of armed conflict, with irregular and unconventional combatants and capabilities, and emphasizes the pervasive cognitive element,54 as described above. It envisions persistent and continuous EAB formations and commanders as never ceding the initiative, being anticipatory rather than reactive, and remaining skeptical of their own understanding throughout a campaign or operation due to the inherent complexity of the contemporary battlefield.55 Acknowledging the significant civil-military cooperation required to achieve these ambitious goals, Assad Raza and Jerritt Lynn argue that EAB formations must be complemented by a unified civil affairs regiment under the joint command of the communities of interest they represent within the armed forces, which can nonetheless carry forward the government’s strategic intent. According to Raza and Lynn, the envisioned U.S. Joint Civil-Military Operations Center would serve as an
operational- to strategic-level organization to maintain continuous coordination with interagency partners, [which] would facilitate cooperation with interagency partners in areas of common interest, promote a common civil operational picture, and enable sharing of critical information and resources to support population-centric operations, [providing] commanders a unique capability to help resolve population-centric problems that could negatively impact military and civilian efforts.56
The concept is closely aligned with the “cognitive main effort” we describe above and expressed in our recommendation for the role of strategic engagement within the Australian army.57
To achieve this outcome and meet strategic guidance would require a significant change in the role of the army, which would need to be articulated in the Australian army’s operating concepts. Close combat capabilities will remain a cornerstone of the remit of Australian Land Forces. Modernization programs should be maintained to sustain a combat capability. At the same time, the army could expand upon elements of its traditional remit to support whole-of-government efforts to address the growing strategic vacuum that exists below the threshold of conventional armed conflict. This would involve a paradigm shift from the traditional notion of top-down military-to-military and civil-military cooperation to allow for new forms of bottom-up and side-by-side cooperation, which leverage a coherent strategic narrative to introduce a cognitive main effort to the army’s remit. This requires a prioritization of strategic engagement specialists trained specifically with the appropriate skill sets within a dedicated force structure construct.58
This proposal represents a paradigm shift for the Australian army. Relational trust develops over time, through deepened and sustained civil-military and military-to-military interactions, from the bottom up and side by side across levels of society. Furthermore, the army’s efforts to build trust as a counter to adversaries should also be directed internally within Australia, as there is no firewall dividing the narrative the army needs to project overseas and the narrative it needs to project domestically. Leveraging trust as a strategic resource requires sustained commitment and focus. It should be treated as part of the Australian army’s core business rather than as “accessories that serve military requirements,”59 or the remit of the special forces.
Here the opportunity exists for the army to lead the strategic response to develop trust between Australia and key domestic, regional, and global partners. In its ability to build trust from the bottom up and side by side, the Australian army uniquely contributes to joint and whole-of-government international engagement efforts.60 This would offer particular benefits to the special forces, whose own unique efforts would be greatly facilitated by a more favorable operating environment. Existing strategic engagement efforts do not extend far enough and are not structured to fulfill the aim of establishing enduring relational trust-based relationships across the region and abroad. Periodic ship visits, joint exercises, capacity-building, and cultural exchanges are important but insufficient to respond to the persistent challenges of the shifting operating environment. The augmentation of the Australian army’s civil-military information center capability, potentially leveraging expanded reservist forces trained with a specific skill set, could provide the scale-appropriate niche capability for the army, whether acting independently or in an alliance contingency. Enabled by its strategic agility and innovation, the army’s impact will be to leverage mass through enduring strategic effect in order to realize a truly strategic army.
Rapid shifts in the future operating environment present traditional Western armies with a number of strategic risks, including the speed and scope of change in the human and technical environment, and the expression of these elements through the prism of increasingly diverse and unpredictable threats to the regional and global rules-based order. These threats have emerged from the technology-driven shift from vertical to horizontal digital information flows and the associated degree of hyper-connectivity. This results in an expanded battlefield, with an increasing emphasis on cognitive vulnerabilities that do not discern between military and civilian domains or conditions of peace and war. This gives rise to a high-tempo threat environment of constant, unrestricted, and unbounded warfare. Together, these shifts in the strategic landscape amount to what is essentially a cognitive contest, one that goes beyond existing risk modeling and challenges the army to account for broader types of threats. This challenge reveals the critical role played by trust in the constitution and understanding of the nature and character of threats and the required response. Trust can provide the “cognitive shield” in the changing operating environment.
The threat environment is forcing a reorientation on the army that is highly disruptive but also presents new opportunities. The necessary reorientation challenges the army to seriously consider its future roles and the structure and makeup of the key capabilities required to deliver the desired strategic engagement effects, integrated with close combat capabilities, in order to realize a strategic army. JFQ
1 Daniel Maurer, The Clash of the Trinities: A New Theoretical Analysis of the General Nature of War (Carlisle Barracks, PA: U.S. Army War College Press, 2017), available at <https://ssi.armywarcollege.edu/pubs/display.cfm?pubID=1365>.
2 Mari Eder, “The Information Apocalypse . . . Is Already Here,” War Room, August 22, 2018, available at <https://warroom.armywarcollege.edu/articles/information-apocalypse/>.
3 See Carl Miller, The Death of the Gods: The New Global Power Grab (New York: Random House, 2018).
4 Nathan Freier and Jonathan Dagle, “The Weaponization of Everything,” Defense One, September 9, 2018, available at <www.defenseone.com/ideas/2018/09/weaponization-everything/151097/>; Ariel E. Levite and Jonathan Shimshoni, “The Strategic Challenge of Society-Centric Warfare,” Survival 60, no. 6 (November 2, 2018), available at <https://doi.org/10.1080/00396338.2018.1542806>.
5 Alicia Wanless and Michael Berk, “The Strategic Communication Ricochet: Planning Ahead for Greater Resiliency,” The Strategy Bridge, March 7, 2018, available at <https://thestrategybridge-org.cdn.ampproject.org/c/s/thestrategybridge.org/the-bridge/2018/3/7/the-strategic-communication-ricochet-planning-ahead-for-greater-resiliency?format=amp>.
6 Emily Bienvenue et al., “Monitoring the Effectiveness of International Engagement and the Health of Bilateral Relationships: A Trust-Based Framework,” Defence Science and Technology Discussion Paper, 2017.
7 Nathan P. Freier et al., Outplayed: Regaining Strategic Initiative in the Gray Zone (Carlisle Barracks, PA: U.S. Army War College Press, 2016), available at <https://ssi.armywarcollege.edu/pubs/display.cfm?pubID=1325>.
8 Joseph S. Nye, Jr., “China’s Soft and Sharp Power,” Project Syndicate (Prague), January 4, 2018, available at <www.project-syndicate.org/commentary/china-soft-and-sharp-power-by-joseph-s—nye-2018-01>. The term sharp power was first introduced by the Washington-based National Endowment for Democracy. See “What to Do About China’s ‘Sharp Power,’” The Economist, December 14, 2017, available at <www.economist.com/leaders/2017/12/14/what-to-do-about-chinas-sharp-power>.
9 Emily Bienvenue, Zac Rogers, and Sian Troath, “Trust as a Strategic Resource for the Defence of Australia,” The Cove, October 29, 2018, available at <https://cove.army.gov.au/article/trust-strategic-resource-the-defence-australia>.
10 David Kilcullen, “Complex Warfighting,” Future Land Warfare Branch, Australian Army, 2004.
11 Land Warfare Doctrine (LWD) 1, The Fundamentals of Land Power (Canberra: Australian Army, 2017).
12 Robert Scales, “Clausewitz and World War IV,” Armed Forces Journal, no. 48, July 1, 2006, available at <http://armedforcesjournal.com/clausewitz-and-world-war-iv/>.
13 On the importance of narrative to strategic power, see Jill Lepore, “A New Americanism: Why a Nation Needs a National Story,” Foreign Affairs, March/April 2019, available at <www.foreignaffairs.com/articles/united-states/2019-02-05/new-americanism-nationalism-jill-lepore>.
14 John Gray, False Dawn: The Delusions of Global Capitalism (London: Granta Books, 2015); Karl Polanyi, The Great Transformation: The Political and Economic Origins of Our Time (Boston: Beacon Press, 2001).
15 Nathan Freier et al., “Game On or Game Over: Hypercompetition and Military Advantage,” War Room, May 22, 2018, available at <https://warroom.armywarcollege.edu/articles/the-new-defense-normal-nine-fundamentals-of-hypercompetition/>.
16 For discussion of the term cognitive warfare, see Emily Bienvenue, Zac Rogers, and Sian Troath, “Cognitive Warfare,” The Cove, September 19, 2018, available at <https://cove.army.gov.au/article/cognitive-warfare>; Exploring Cognitive Warfare, Over the Horizon Podcast 4, November 8, 2017, available at <https://othjournal.com/2017/11/08/oth-podcast-4-exploring-cognitive-warfare/>; Deric J. Holbrook, “Information-Age Warfare and Defence of the Cognitive Domain,” The Strategist, December 13, 2018, available at <www.aspistrategist.org.au/information-age-warfare-and-defence-of-the-cognitive-domain/>; Dave Lyle, “The Cognitive Domain,” Center for International Maritime Security, May 27, 2014, available at <http://cimsec.org/cognitive-domain/>; Kimberly Underwood, “Cognitive Warfare Will Be Deciding Factor in Battle,” SIGNAL, August 15, 2017, available at <www.afcea.org/content/cognitive-warfare-will-be-deciding-factor-battle>; Rand Waltzman, “Weaponization of the Information Environment: The Need for Cognitive Security,” Information Professionals Association, January 10, 2017.
17 For a definition of relational trust, see Bienvenue et al., “Monitoring the Effectiveness of International Engagement and the Health of Bilateral Relationships.”
18 Freier and Dagle, “The Weaponization of Everything.”
19 Gregory B. Poling, “Avoiding the False China-U.S. Narrative in the South China Sea,” American Journal of Chinese Studies 23, no. 1 (July 2016).
20 Jon Herrmann, “Nine Links in the Chain: The Weaponized Narrative, Sun Tzu, and the Essence of War,” The Strategy Bridge, July 27, 2017, available at <https://thestrategybridge.org/the-bridge/2017/7/27/nine-links-in-the-chain-the-weaponized-narrative-sun-tzu-and-the-essence-of-war>.
21 Winston Peters, “Shifting the Dial,” speech, Lowy Institute, Sydney, March 1, 2018, available at <www.beehive.govt.nz/speech/shifting-dial>; Euan Graham, “Conserving the Single Maritime Operating Environment,” speech, Exercise Kakadu Fleet Commanders Conference, Lowy Institute, September 1, 2018, available at <www.lowyinstitute.org/publications/conserving-single-maritime-operating-environment-euan-graham>; Ben Bohane, “South Pacific Nation Shrugs Off Worries on China’s Influence,” New York Times, June 14, 2018, available at <www.nytimes.com/2018/06/13/world/asia/vanuatu-china-wharf.html>; Liam Fox, “Tonga to Start Paying Back Controversial Chinese Loans Described by Some as ‘Debt-Trap Diplomacy,’” ABC News, November 18, 2018, available at <www.abc.net.au/news/2018-07-19/tonga-to-start-repaying-controversial-chinese-loans/10013996>; David McCabe, “Go Deeper: Why China Hasn’t Followed Russia on Disinformation—Yet,” Axios, August 6, 2018, available at <www.axios.com/china-and-russia-online-disinformation-election-meddling-255d7196-41da-4f1b-9fdf-2f185218cb2c.html>.
22 On the challenge to forecasting amid complexity, see Dan Gardner, Future Babble: Why Expert Predictions Fail—And Why We Believe Them Anyway (Toronto: McClelland & Stewart, 2010); Philip E. Tetlock, Expert Political Judgment: How Good Is It? How Can We Know? (Princeton: Princeton University Press, 2017); Philip E. Tetlock and Dan Gardner, Superforecasting: The Art and Science of Prediction (New York: Random House, 2015); Nassim Nicholas Taleb, Incerto: Fooled by Randomness, The Black Swan, The Bed of Procrustes, Antifragile (New York: Random House, 2016).
23 Kilcullen, “Complex Warfighting,” 7–8.
24 Anne-Marie Slaughter, “How to Succeed in the Networked World: A Grand Strategy for the Digital Age,” Foreign Affairs, December 2016, available at <www.foreignaffairs.com/articles/world/2016-10-04/how-succeed-networked-world>.
25 Ian Tunnicliffe and Steve Tatham, “Social Media—The Vital Ground: Can We Hold It?” Strategic Studies Institute, U.S. Army War College, April 21, 2017, available at <https://ssi.armywarcollege.edu/pubs/display.cfm?pubID=1349>; James P. Farwell and Darby J. Arakelian, “Using Information in Contemporary War,” Parameters 46, no. 3 (Autumn 2016), 71; Gideon Avidor and Russell W. Glenn, “Information and Warfare: The Israeli Case,” Parameters 46, no. 3 (Autumn 2016), 99; David Betz, Carnage and Connectivity: Landmarks in the Decline of Conventional Military Power (Oxford: Oxford University Press, 2015).
26 Herrmann, “Nine Links in the Chain.”
28 “Yang Jiechi Gives Interview to State Media on the So-Called Award by the Arbitral Tribunal for the South China Sea Arbitration,” Embassy of the People’s Republic of China in Canada, July 15, 2016, available at <http://ca.china-embassy.org/eng/zt/cpot/t1381769.htm>; see also “China’s Position on the Territorial Disputes in the South China Sea Between China and the Philippines,” Embassy of the People’s Republic of China in Canada, April 4, 2014, available at <http://ca.china-embassy.org/eng/zt/cpot/t1144139.htm>.
29 Ely S. Ratner, “Exposing China’s Actions in the South China Sea,” Council on Foreign Relations, April 6, 2018, available at <www.cfr.org/report/exposing-chinas-actions-south-china-sea>.
30 Adrian Chen, “What Mueller’s Indictment Reveals about Russia’s Internet Research Agency,” The New Yorker, February 16, 2018, available at <www.newyorker.com/news/news-desk/what-muellers-indictment-reveals-about-russias-internet-research-agency>.
31 Senate Select Committee on Intelligence (SSCI), The Intelligence Community Assessment: Assessing Russian Activities and Intentions in Recent U.S. Elections, Summary of Initial Findings, July 3, 2018, available at <www.intelligence.senate.gov/publications/committee-findings-2017-intelligence-community-assessment>; Alina Polyakova and Spencer P. Boyer, “The Future of Political Warfare: Russia, the West, and the Coming Age of Global Digital Competition,” Brookings, March 2018, available at <www.brookings.edu/wp-content/uploads/2018/03/fp_20180316_future_political_warfare.pdf>; Malcolm Nance, The Plot to Destroy Democracy: How Putin and His Spies Are Undermining America and Dismantling the West (New York: Hachette Books, 2018); Scott Shane and Mark Mazzetti, “The Plot to Subvert an Election: Unraveling the Russia Story So Far,” New York Times, September 20, 2018; Maria Farrell, “Why Russia Is Using the Internet to Undermine Western Democracy,” Slate, December 5, 2016, available at <www.slate.com/articles/technology/future_tense/2016/12/why_russia_is_using_the_internet_to_undermine_western_democracy.html>.
32 Dave Lee, “The Tactics of a Russian Troll Farm,” BBC News, February 16, 2018, available at <www.bbc.com/news/technology-43093390>; Clint Watts, Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News (New York: HarperCollins, 2018).
33 Martin C. Libicki, “The Convergence of Information Warfare,” Strategic Studies Quarterly 11, no. 1 (Spring 2017), available at <www.airuniversity.af.mil/Portals/10/SSQ/documents/Volume-11_Issue-1/Libicki.pdf>.
34 Peter Nicholson, “Effects-Based Strategy: Operations in the Cognitive Domain,” Security Challenges 2, no. 1 (2006), available at <www.regionalsecurity.org.au/Resources/Files/vol2no1Nicholson.pdf>.
35 For background on military and strategic thinking regarding cognitive processes, see Frans P.B. Osinga, Science, Strategy and War: The Strategic Theory of John Boyd (New York: Routledge, 2007).
36 Martin C. Libicki and Stuart E. Johnson, eds., Dominant Battlespace Knowledge (Washington, DC: NDU Press, October 1995), available at <www.dodccrp.org/files/Libicki_Dominant.pdf>.
37 B.J. Fogg, “Captology: The Study of Computers as Persuasive Technologies,” CHI ’97 Extended Abstracts on Human Factors in Computing Systems (New York: ACM, 1997), available at <https://doi.org/10.1145/1120212.1120301>; see also B.J. Fogg, Persuasive Technology: Using Computers to Change What We Think and Do (San Francisco: Morgan Kaufmann, 2003).
38 SSCI, The Intelligence Community Assessment.
39 James J. Wirtz, “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy,” in Cyber War in Perspective: Russian Aggression Against Ukraine, ed. Kenneth Geers (Tallinn: North Atlantic Treaty Organization Cooperative Cyber Defence Centre of Excellence, 2015).
40 Tyler Quinn and Von Lambert, “Musings on the Prominence of Informational Effects in the Operational Art,” Grounded Curiosity, May 21, 2018, available at <https://groundedcuriosity.com/musings-on-the-prominence-of-informational-effects-in-the-operational-art/>; Carmine Cicalese, “Redefining Information Operations,” Joint Force Quarterly 69 (2nd Quarter 2013); Chris Telley and Scott Carpenter, “This Task Force Could Be Key to Winning in the Information Environment,” Modern War Institute at West Point, July 19, 2018, available at <https://mwi.usma.edu/task-force-key-winning-information-environment/>.
41 Betz, Carnage and Connectivity; Ajit K. Maan and Paul L. Cobaugh, Introduction to Narrative Warfare: A Primer and Study Guide (Eugene, OR: Narrative Strategies, LLC, June 2018); Ajit K. Maan, Narrative Warfare (Eugene, OR: Narrative Strategies, LLC, June 2018).
42 Quinn and Lambert, “Musings on the Prominence of Informational Effects in the Operational Art.”
43 Wirtz, “Cyber War and Strategic Culture,” 31–33.
44 Levi Maxey, “Hezbollah Goes on the Cyber Offensive with Iran’s Help,” The Cipher Brief, January 30, 2018, available at <www.thecipherbrief.com/hezbollah-goes-cyber-offensive-irans-help>.
45 Watts, Messing with the Enemy.
46 Assad A. Raza and Jerritt A. Lynn, “The Future of Civil Affairs: Creating Regimental Order from Chaos,” Small Wars Journal, October 2018, available at <https://smallwarsjournal.com/jrnl/art/future-civil-affairs-creating-regimental-order-chaos>.
47 Raza and Lynn, “The Future of Civil Affairs.” See also Assad A. Raza, “Great Power Competition: The Fight for Weak States,” Small Wars Journal, January 2019, available at <https://smallwarsjournal.com/jrnl/art/great-power-competition-fight-weak-states>.
48 Nicholas Stuart, “The New, Desperate Struggle to Secure the Critical Fabric of Society,” Sydney Morning Herald, January 30, 2019, available at <www.smh.com.au/politics/federal/the-new-desperate-struggle-to-secure-the-critical-fabric-of-society-20190129-p50u9k.html>.
49 Zac Rogers, “Blockchain and the State: Vehicle or Vice?” Australian Quarterly 89, no. 1 (January/March 2018).
50 “Executive Summary,” 2018 Annual Global Study, 2018 Edelman Trust Barometer, 2–3, available at <www.edelman.com/sites/g/files/aatuss191/files/2018-10/2018_Edelman_TrustBarometer_Executive_Summary_Jan.pdf>.
51 Zac Rogers, “Targeting Our Blind Spot of Trust: Five Impossibilities of Liberal Democracy in a Dangerous Digital Age,” The Strategy Bridge, January 28, 2019, available at <https://thestrategybridge.org/the-bridge/2019/1/28/targeting-our-blind-spot-of-trust-five-impossibilities-of-liberal-democracy-in-a-dangerous-digital-age>.
52 Neal A. Pollard, Adam Segal, and Matthew G. Devost, “Trust War: Dangerous Trends in Cyber Conflict,” War on the Rocks, January 16, 2018.
53 For discussion of the need for a heuristic to support stability and functionality amid deepening socio-technological disarray, see Jay Cassano, “It’s as if Humans Are the Problem and Technology Is the Solution,” Fast Company, January 29, 2019, available at <www.fastcompany.com/90295374/how-to-reclaim-our-humanity-in-a-world-of-machines-douglas-rushkoff-team-human>. See especially Douglas Rushkoff, Team Human (New York: Norton, 2019).
54 U.S. Army Training and Doctrine Command Pamphlet 525-3-8, U.S. Army Concept: Multi-Domain Combined Arms Operations at Echelons Above Brigade 2025–2045 (Washington, DC: Headquarters Department of the Army, December 21, 2018), available at <https://fas.org/irp/////doddir/army/tp525-3-8.pdf>.
55 Ibid., 17, 35.
56 Raza and Lynn, “The Future of Civil Affairs.”
57 Since 2006, civil affairs activities in support of U.S. Government objectives have been conducted under a multitude of independent and uncoordinated commands, creating organizational and strategic disfunction; see Raza and Lynn, “The Future of Civil Affairs.”
58 Greg Colton, “Defence Needs to Develop International Engagement Specialists,” The Interpreter, December 14, 2017, available at <www.lowyinstitute.org/the-interpreter/defence-needs-develop-international-engagement-specialists>; Andrew Maher, “Strategic Planners: A Response to Operational Complexity,” Australian Army Journal 13, no. 1 (2016).
59 Tony Balasevicius, “Looking for Little Green Men: Understanding Russia’s Employment of Hybrid Warfare,” Canadian Military Journal 17, no. 3 (Summer 2017), 20.
60 Rick Burr, “Army and International Engagement: Opportunities and Challenges in a Changing Strategic Environment,” The Strategist, June 26, 2015; see also LWD 1, 8.