Library
|
Your profile |
World Politics
Reference:
Semenov, B.R. (2025). The role of digital technologies in US information operations in the post-Soviet space. World Politics, 1, 37–47. https://doi.org/10.25136/2409-8671.2025.1.73553
The role of digital technologies in US information operations in the post-Soviet space
DOI: 10.25136/2409-8671.2025.1.73553EDN: PIRCELReceived: 27-02-2025Published: 06-03-2025Abstract: This article examines the importance and role of digital technologies in conducting information operations (IO) by the United States of America in the post-Soviet space. The research includes an analysis of the theoretical foundations of information operations, their place and importance in modern geopolitics, as well as their impact on international relations. Special attention is paid to the methods of information operations, including disinformation, targeted cyber attacks, manipulation of public opinion through social networks, media resources and artificial intelligence technologies. The strategies of the United States in the post-Soviet space are considered in detail, in which information operations act as one of the key tools for achieving geopolitical goals. The article also provides a detailed analysis of the tactics and mechanisms of influence used within the framework of AI, including informational and psychological effects on target audiences, the introduction of narratives aimed at forming a certain public opinion, as well as technological aspects of conducting cyber operations. Content analysis has been applied to identify ways of manipulating Western public consciousness while creating an "enemy image" of Russia. The information technologies used for information operations are classified into groups. The article presents an analysis of the attitude of post-Soviet countries to the implementation of the United States IO. The article is based on modern research, official US documents, and official statements by representatives of the Russian Federation and Belarus. After the collapse of the USSR, the United States assumed the role of hegemon, and claimed the right to interfere in the internal affairs of other states. Washington has shown interest in persuading the former Soviet republics to its side. Fearing a direct confrontation with Russia and China, which share a sphere of influence in the post-Soviet space, the United States began to use less visible methods such as information operations. Information operations based on the use of advanced information technologies developed in the United States have made it possible to have a significant impact on the post-Soviet space. Due to the fact that the Central Asian region is mainly within the sphere of influence of China, the United States has directed more efforts towards Ukraine and Georgia. By intelligently influencing the public's consciousness, manipulating information, and supporting opponents, they managed to spoil the relations of these countries with Russia and lead to a state of armed conflict. Keywords: information operations, digital technologies, cyber operation, disinformation, social media, USA, hybrid warfare, Cybersecurity, artificial intelligence, information warsThis article is automatically translated. You can find original text of the article here. Introduction In the 21st century, digital technologies have become the most important tool for information operations conducted by the largest actors in international relations. The United States, being an advanced country in the field of information technology, is more active than other states in using information systems, cyberspace, and artificial intelligence to realize geopolitical interests. Using the latest information technologies in information operations, Washington has the opportunity to influence the course of events in other states and regions. Information operations make it possible to influence the internal politics of another state without entering into direct confrontation with it, therefore, the use of AI is advisable in the post-Soviet space, since Russia is a nuclear power and defines the post-Soviet space as its sphere of influence. The United States, unable to engage in direct confrontation on this territory, resorts to information warfare, which is created by propaganda, influencing public opinion, creating an "enemy image", and playing with public sentiment, including protests and revolutions. Theoretical foundations of information operations The term "information operations" appeared for the first time in the USA. In 1976, Thomas Rona, an adviser on science at the US Department of Defense, used it in his report. And in 1998, the term was defined in the joint doctrine of the United States Armed Forces. According to the 1998 doctrine, information operations are a set of actions aimed at influencing information and information systems of the enemy, as well as protecting their own data and infrastructure. [10; p.41] Advanced information technologies, big data, neural networks, etc. are used in modern information operations. With the help of these tools, one side of the conflict can influence the automated systems and decision-making processes of the enemy. There are many methods of information operations. The most common methods include cyber attacks and manipulation of public opinion. The US doctrine of 1998 distinguishes two types of information operations: offensive and defensive. Offensive operations are used to influence the enemy in order to disorganize his command structures. The following methods of offensive information operations are used: operational security, cyber attacks, military disinformation companies, psychological operations, electronic warfare, physical destruction of objects. In crisis situations, offensive information operations play a significant role, as they support strategic and tactical operations. [14] Defensive information operations are used to protect information and information systems. To do this, they use such methods as: ensuring information security, electronic countermeasures, countering disinformation and propaganda, counterintelligence measures, and physical protection of facilities. Defensive IO methods are necessary to ensure that the enemy does not get hold of particularly important information. Information operations occupy a significant position in modern geopolitics. With the help of AI, actors in international relations have the opportunity to advance their interests without a direct military clash. AI is used by defense actors as a way to influence public opinion, as an opportunity to shake the political or economic stability of another state or region. Communication resources such as TV channels, the press, and radio are becoming as important in modern geopolitics as natural resources (gas, oil). [15] For this reason, information control is becoming an integral part of geopolitics. One of the most common ways to create an imbalance in an opponent's society is to form public opinion. This happens through the use of media resources, social networks, and other platforms to promote a certain opinion. They also use the "enemy image" and discredit political opponents to form public opinion. The United States actively uses large and influential media outlets such as CNN and The New York Times to promote its rhetoric around the world. American social networks and online platforms like Facebook (which is part of Meta, which is recognized as an extremist organization in the Russian Federation), X (formerly Twitter) and YouTube also operate within the framework of the American paradigm, therefore they have blocked the accounts of many Russian bloggers and media outlets that broadcast opinions contrary to their attitudes. Methods such as support for protest movements and opposition forces, interference in elections and political processes, dissemination of false information to discredit the government, etc. are used to destabilize the enemy. The United States often resorts to supporting protest movements. As it was in Belarus after the 2020 elections. To implement foreign policy interests in modern geopolitics, such methods as information control are used, which allows to strengthen the influence of a player in the region; information influence, which allows legitimizing military intervention or sanctions policy. An example of this method is Washington's rhetoric "about protecting democratic interests and freedoms" when it comes to sanctions against Russia and Iran. Cyber attacks and digital hegemony are important methods of information operations in geopolitics. Cyber attacks are often used to destroy or modify important enemy infrastructure, including official websites. For example, after the start of its development, many Russian government websites, such as Kremlin.ru , Mid.ru The Gosuslugi portal has been subjected to massive hacker attacks. Modern wars have become hybrid, because along with traditional warfare, digital attacks are also accompanied. This suggests that information operations have become an important component of the conflicts of our time. The strategy and goals of the United States in information operations in the post-Soviet space. The United States of America is striving to maintain its hegemony in geopolitics, which it acquired as a result of the collapse of the USSR after 1991. Their main goal is to preserve security and prevent the strengthening of new centers of power that could threaten the world order built by Washington. As part of this strategy, the United States uses hybrid warfare methods as a preventive defense. [1; p. 14] The American preventive defense strategy is based on two fundamental documents: the National Defense Strategy (NDS) 2022 and the National Security Strategy (NSS).[16] The post-Soviet space is a vast territory of 15 states that were previously part of the USSR. After the collapse of the USSR in 1991, this space became attractive to the strongest international powers such as the United States and China. The United States pursues geopolitical interests in the post-Soviet space for several reasons. The first reason is the limitation of Russia's influence. Russia, as the successor state of the USSR, strives to keep the post-Soviet states within its influence. The interests of the United States in the post-Soviet space clash with the interests of Russia. America resorts to various methods of pressure on Russia with the desire to weaken its influence on the post-Soviet space. [2] The second reason is that the post—Soviet space is a strategically important region, the intersection of Europe and Asia, where the most important transport corridors are located, and there are large energy reserves. The Caspian region, which is part of the former Soviet Union, is rich in energy resources (oil and gas). Washington is interested in the region contributing to the economic growth of the United States in various ways, including investments in infrastructure (pipeline construction, field development), IT, agriculture, industry in post-Soviet countries, arms supplies (to Ukraine, Georgia, the Baltic States), and the participation of American companies in energy production (Chevron, ExxonMobil). The third reason is to counter the spread of Chinese influence. After the collapse of the USSR, China showed the greatest activity in establishing relations in Central Asia. In the 90s. Russia did not have the power it has today, so it could not compete with China. The United States seeks to compete with China, but the territorial proximity of the latter largely resolves the issue in its favor. While Russia was recovering from the crisis of the 90s, China was actively establishing relations with the new Central Asian states, concluding long-term economic agreements, creating initiatives, etc. Today, Central Asia is largely part of China's sphere of influence. China is a major importer of oil and gas from Central Asia (Kazakhstan and Turkmenistan are the leaders in exports), creates megaprojects ("One Belt, One Road"), provides loans with huge interest rates (Tajikistan and Kyrgyzstan have the greatest credit dependence), and develops security projects. It is difficult for America to compete with China in the Central Asian region, but the United States is still striving to strengthen its position. There is much more Chinese investment in the region, but America is also taking the initiative. Beijing, unlike Washington, does not attach much importance to the political regimes of the states cooperating with it. For them, the main thing is that the state with which the PRC is building bilateral relations recognizes the existence of only one China (Taiwan as part of mainland China). Washington, on the contrary, is interested in promoting "democratic values" in the post-Soviet space. Due to the fact that Central Asia is more in the sphere of influence of China, America is investing more efforts in the region of Eastern Europe and the Caucasus. The fourth reason is to promote the interests of democracy. America sees itself as destined to dictate to other countries how they should govern their country. However, Washington approaches this issue very selectively, on the one hand it criticizes the authoritarian regimes of the post-Soviet space, and on the other hand it has close ties with Saudi Arabia, a country with an absolute monarchy. Democracy is promoted by supporting opposition forces, protest forces and revolutions (Kyrgyzstan, Ukraine, Georgia), providing foreign grants, and opening research centers. To promote its interests in the post-Soviet space, the United States resorts to various information operations. The United States is putting the most pressure on Russia, as the largest player in this territory. Russia is a nuclear superpower, so the United States does not dare to engage in an armed conflict with it, but prefers to act using hybrid methods. [9; p. 14] The pressure options are diverse: support for the opposition, information attacks, creating an "enemy image" of Russia in the American media, cyber attacks, spreading false information, manipulating public opinion through popular foreign social networks, imposing Western values, creating a split in the political elite by imposing personal sanctions, false accusations of crimes (the "poisoning" of the Skripals, the accusation of the "annexation" of Crimea) [6; p. 45]. In the American media (CNN, The New York Times) Russia is presented as an "aggressor" [21], an "invader"[20], "bizarre country" [19]. Anti-Russian rhetoric allows the United States to promote a sanctions policy that was designed to undermine Russia's economic stability. But after three years of unprecedented global sanctions pressure, the Russian economy has proven its resilience to external pressure. By creating a negative image of Russia, the United States is trying to increase its influence in the region. They managed to gain the trust of Ukraine, which was weakened by the turmoil of 2014. Using various methods of disinformation, propaganda, and manipulation of public consciousness, Washington has managed to turn two once close nations into enemies. Basic digital tools and technologies Modern and latest technologies are widely used in information operations. They are divided into several groups: electronic and communication systems, cyber warfare tools, and tools for analysis and monitoring, artificial intelligence, and blockchain. Technologies from the category of "electronic and communication systems" are used directly in combat operations, for example in Ukraine. Modern electronic warfare systems and complexes (EW systems) make it possible to suppress enemy communications, disorient them, and help intercept data, including telephone conversations of enemy soldiers. This group also includes information and communication systems designed to protect communication data and monitor cyber threats. In addition, military operations simulation systems such as AFATDS are used, which provide automated artillery strike control. [13] The Starlink satellite communication system, provided to Ukraine by American entrepreneur Elon Musk, allows both protecting the information data of Ukrainian soldiers and fighting Russian attempts to suppress communications.[12] Technologies like Starlink are a challenge to the established laws of warfare. The second category is cyberattack technologies. These include cyber intrusion detection systems (for example: Snort, Suricata), antiviruses against cyber attacks, threat analysis tools (Anomali Threat Stream), information encryption technologies, and cyber weapons. The National Defense Strategy focuses on cyber attacks. It is noted that the United States will conduct actions in cyberspace (threat monitoring, cyber intelligence, cyber attacks) in order to undermine the malicious actions of rivals. [17] The means for analyzing and monitoring information are necessary in order to collect as much information about the country as possible, to identify trends and patterns, being far beyond the borders of the studied state. This allows us to develop a strategy for further influence. Technologies such as Big Data, PRINT tools, SNA, and Brandwatch are used for this purpose. The advent of artificial intelligence has changed the modern world, including international relations. AI allows you to analyze a large amount of data, create deepfakes (video, audio), and use Big Data to predict information warfare events. AI also allows you to minimize the cost of expensive research, because it easily handles the analysis of big data, which means that it can be used not only by rich, but also by less well-off actors of the Ministry of Defense. [11] Artificial intelligence has increasingly been used in information operations. America is a leader in the development of artificial intelligence. The National Defense Strategy (NDS) of 2022 addresses the topic of artificial intelligence. It is noted that AI has the ability to change the course of military operations. It also mentions the intention of the US Department of Defense to invest more in new projects related to artificial intelligence. [18] Artificial intelligence is an invention similar to the discovery of the Internet, i.e. revolutionary. The Americans were the first to conduct research on this topic. Until recently, they were almost the only players in the field of AI, and now China has begun to assert itself. [7] Having knowledge about a new type of technology gives America unlimited power to carry out various manipulations using artificial intelligence, whether it is conducting large-scale analytical research, creating fake phone conversations, videos, etc. AI is being developed in the United States, so only they have an idea of the limits of its capabilities. Another technology is blockchain. Thanks to this technology, information does not have a single central storage location, but is distributed over several sites, which allows it to be more reliably protected. In addition, the blockchain has a sophisticated level of protection against hacking and cyber attacks, ensuring data security, including to combat cybercrime.[8] The reaction of Russia and the post-Soviet countries to the use of information operations by the United States Russia and other post-Soviet countries are unhappy that information operations are being used against them. Dissatisfaction can be traced in the statements of the official representatives of the Russian Foreign Ministry. For example, in 2021, YouTube, a video hosting company that is part of Google, headquartered in California (USA), deleted the German-language RT channels. The Russian Foreign Ministry responded to this action by saying that it was part of the information struggle against Russia [5]. In another speech, Russian Foreign Minister Sergei Lavrov said that the West, led by the United States, is pursuing a policy of "comprehensive, systemic containment of Russia" [4], "the West has declared a total hybrid war."[4] Representatives of the Belarusian Foreign Ministry also express dissatisfaction with the pressure from the United States: "a hybrid war has been launched against our country in order to change its geopolitical orientation."[3] Some states, such as Ukraine, Georgia or Moldova, perceive US information operations as providing assistance to their state, therefore they agree to act in Washington's interests, becoming puppet states. They are being used to propagandize the United States against Russia, so they are beginning to see Russia as an "enemy image" rather than a good neighbor. Russia wants to have good friendly relations with all the countries of the former USSR. However, Washington, with the most advanced information technologies in its arsenal, seeks to influence post-Soviet countries. This creates manageable chaos, instability in the region and the opportunity to limit Moscow's influence. Conclusion After the collapse of the USSR, the United States assumed the role of hegemon, and considered it right to interfere in the internal affairs of other states. Washington has shown interest in persuading the former Soviet republics to its side. Fearing a direct confrontation with Russia and China, which share a sphere of influence in the post-Soviet space, the United States began to use less visible methods such as information operations. Information operations based on the use of advanced information technologies developed in the USA have made it possible to have a significant impact on the post-Soviet space. Due to the fact that the Central Asian region, which is part of the post-Soviet space, is mainly within the sphere of influence of China, the United States has directed more efforts towards Ukraine and Georgia. By competently influencing the public's consciousness, manipulating information, and supporting opponents, they managed to spoil the relations of these countries with Russia and lead to a state of armed conflict. The United States is putting serious pressure on Russia and Belarus, which do not want to play by Washington's rules and have their own interests in the post-Soviet space. For this reason, America is trying in every possible way to discredit Russia, create an image of an "aggressor" in Western society, accuse of crimes, and support the opposition. Information technology plays a significant role in conducting information operations. Big data monitoring and analysis systems allow you to collect as much information about the country as possible; cyber attacks allow you to bring down enemy government websites, suspend the operation of significant government infrastructures; artificial intelligence allows you to create fake audio, video and text materials that are difficult to distinguish from the original. Thus, information operations are becoming a way to realize the geopolitical goals of the United States, and information technology is the main tool for carrying out such operations. In the context of information confrontation, it is necessary to strengthen control over information, develop skills to identify fake information, and prevent the enemy from manipulating public consciousness. References
1. Annenkov, V. I., Moiseev, A. V., & Shangaraev, R. N. (2022). Hybrid war as a preventive defense of the USA in modern conditions. Social and Political Sciences, 12(1), 13-20.
2. Vavilov, A. N. (2019). Political processes in the post-Soviet space in the context of the conflict of foreign policy strategies of Russia and the USA. Moscow University Bulletin. Series 12. Political Science, 3, 68-80. 3. Ambrazevich, Y. (2024, March 13). Speech by the Deputy Minister of Foreign Affairs of the Republic of Belarus at the high-level segment of the UN ECE Regional Forum on Sustainable Development. Retrieved March 1, 2025, from https://www.mfa.gov.by/press/news_mfa/f72ec1657420589d.html 4. Lavrov, S. V. (2022, April 14). Speech by the Minister of Foreign Affairs of the Russian Federation at the plenary session "International Relations in the Context of the Digitalization of Public Life" of the international scientific and practical conference "Digital International Relations 2022." Retrieved March 1, 2025, from https://mid.ru/ru/press_service/minister_speeches/1809294/ 5. Ministry of Foreign Affairs of the Russian Federation. (2025). Statement by the Ministry of Foreign Affairs of Russia regarding the removal of accounts of German-language projects of RT media holding by the video hosting service "YouTube" without the possibility of restoration. Retrieved March 1, 2025, from https://mid.ru/ru/foreign_policy/news/1777760/ 6. Krasovskaya, N. R., Gulyaev, A. A., Lakhtin, A. Yu., & Vakulenko, A. N. (2019). Information warfare technologies against Russia. Power, 3, 42-47. 7. Moment of "Sputnik." (2025). How the Chinese chatbot DeepSeek shook the Western artificial intelligence industry and what it threatens. Retrieved March 1, 2025, from https://www.bbc.com/russian/articles/cn8y30xgz7eo 8. Pahaye, K. K., Aigumov, T. G., & Abdulmukminova, F. M. (2022). The role of blockchain technology in the implementation of cybersecurity. Engineering Bulletin of the Don, 10(94), 272-282. 9. Saifetdinov, K. I. (2022). Hybrid wars conducted by the USA and NATO countries: Their essence and direction. Military Thought, 5, 13-20. 10. Tertrov, G. (2015). Information operations: History and modernity. 21st Century, 3(36), 40-49. 11. Bankov, B. (2023). Revolutionising hybrid warfare: The role of artificial intelligence. In Annual Conference of Crisis Management and Disaster Response Centre of Excellence (pp. 25-60). 12. Bojor, L., Petrache, T., & Cristescu, C. (2024). Emerging technologies in conflict: The impact of Starlink in the Russia-Ukraine war. Land Forces Academy Review, 29, 185-194. 13. Danyk, Y., Maliarchuk, T., & Briggs, C. (2017). Hybrid war: High-tech, information and cyber conflicts. Connections, 16(2), 5-24. 14. Joint Chiefs of Staff. (1998). Joint Doctrine for Information Operations. Retrieved February 27, 2025, from https://nsarchive.gwu.edu/themes/custom/nsarchive/templates/pdfjs/web/viewer.html?file=https%3A%2F%2Fnsarchive.gwu.edu%2Fsites%2Fdefault%2Ffiles%2Fdocuments%2F5626284%2FJoint-Chiefs-of-Staff-Joint-Publication-3-13.pdf 15. Maliukevičius, N. (2007). Geopolitics and information warfare: Russia's approach. Lithuanian Annual Strategic Review, 146. 16. Morfakidis, I. (2024). Hybrid warfare and American strategy. Master Program in American Studies: Politics, Strategy and Economics. 17. U.S. Department of Defense. (2022). National Defense Strategy of the United States of America. Retrieved March 1, 2025, from chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.pdf 18. U.S. Air Force. (2019). The United States Air Force Artificial Intelligence Annex to The Department of Defense Artificial Intelligence Strategy. Retrieved March 1, 2025, from https://www.af.mil/Portals/1/documents/5/USAF-AI-Annex-to-DoD-AI-Strategy.pdf 19. CNN. (2023). 'Russia is a bizarre country': Historian Nina Khruscheva on a strange few weeks in Moscow. Retrieved March 1, 2025, from https://edition.cnn.com/videos/world/2023/07/07/russia-ukraine-amanpour-putin-nina-khruscheva-prigozhin.cnn 20. CNN. (2025). Trump's rush for a deal with Putin leaves Ukraine and Europe scrambling. Retrieved March 1, 2025, from https://edition.cnn.com/2025/02/18/politics/trump-putin-deal-ukraine-analysis/index.html 21. The New York Times. (2025). U.S. and European allies split sharply at the U.N. over Ukraine. Retrieved March 1, 2025, from https://www.nytimes.com/2025/02/24/world/middleeast/us-un-russia-ukraine-war.html
Peer Review
Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
|