The internet is now an arena for conflict – and we're all caught up in it
<p>Most people think the internet operates as a kind of global public square. In reality, it’s become a divided arena where conflict between nation states plays out.</p>
<p>Nation states run covert operations on the same platforms we use to post cat videos and exchange gossip. And if we’re not aware of it, we could be unwittingly used as pawns for the wrong side.</p>
<p>How did we get here? It’s complicated, but let’s walk through some of the main elements.</p>
<p><strong>The age of entanglement</strong></p>
<p>On the one hand, we have an information landscape dominated by Western culture and huge multi-national internet platforms run by private companies, such as Google and Facebook. On the other, there are authoritarian regimes such as China, Iran, Turkey and Russia exercising tight control over the internet traffic flowing in and out of their countries.</p>
<p>We are seeing more cyber intrusions into<span> </span><a href="https://theconversation.com/a-state-actor-has-targeted-australian-political-parties-but-that-shouldnt-surprise-us-111997">nation state networks</a>, such as the recent hack of the Australian parliamentary network. At the same time,<span> </span><a href="https://www.politics.ox.ac.uk/news/lucas-kello-gives-evidence-to-house-of-lords-committee.html">information</a><span> </span>and influence operations conducted by countries such as Russia and China are flowing through social media into our increasingly shared digital societies.</p>
<p>The result is a<span> </span><a href="https://mitpress.mit.edu/books/stack">global</a><span> </span>ecosystem<span> </span><a href="https://nsc.crawford.anu.edu.au/news-events/podcasts/video/10698/towards-political-ecology-cyberspace-3-3">perpetually</a><span> </span>close to the threshold of war.</p>
<p>Because nations use the internet both to assert power and to conduct trade, there are incentives for authoritarian powers to keep their internet traffic open. You can’t maintain rigid digital borders and assert cyberpower influence at the same time, so nations have to “<a href="https://www.belfercenter.org/sites/default/files/legacy/files/IS3903_pp007-047.pdf">cooperate to compete</a>”.</p>
<p>This is becoming known as “entanglement” – and it affects us all.</p>
<p><strong>Data flows in one direction</strong></p>
<p>Authoritarian societies such as China, Russia and Iran aim to create their own separate digital ecosystems where the government can control internet traffic that flows in and out of the country.</p>
<p>The Chinese Communist Party is well known for maintaining a supposedly secure Chinese internet via what is known in the West as the “<a href="https://cs.stanford.edu/people/eroberts/cs181/projects/2010-11/FreedomOfInformationChina/the-great-firewall-of-china-background/index.html">Great Firewall</a>”. This is a system that can block international internet traffic from entering China according to the whim of the government.</p>
<p>For the majority of the<span> </span><a href="https://techcrunch.com/2018/08/21/china-reaches-800-million-internet-users/">802 million people online</a><span> </span>in China, many of the apps we use to produce and share information are not accessible. Google, YouTube, Facebook, Twitter are blocked. Instead, people in China use apps created by Chinese technology companies, such as Tencent, Alibaba and Baidu.</p>
<p>Traffic within this ecosystem is monitored and censored in the most sophisticated and comprehensive surveillance state in the world. In 2018, for example, Peppa Pig was<span> </span><a href="https://www.sbs.com.au/news/how-peppa-pig-became-a-gangster-figure-in-china">banned</a> and the People’s Daily referred to her as a “<a href="https://web.archive.org/web/20180502092019/http://media.people.com.cn/BIG5/n1/2018/0426/c40606-29950870.html">gangster</a>” after she became iconic of rebelliousness in Chinese youth culture.</p>
<p><strong>Complete blocking of data is impossible</strong></p>
<p>A key objective of this firewall is to to shield Chinese society and politics from external influence, while enabling internal surveillance of the Chinese population.</p>
<p>But the firewall is not technologically independent of the West – its development has been reliant upon US corporations to supply the software, hardware innovation and training to ensure the system functions. And since the internet is an arena where nations compete for economic advantage, it’s not in the interest of either side to destroy cyberspace entirely.</p>
<p>As cyber security expert Greg Austin<span> </span><a href="https://www.springer.com/la/book/9783319684352">has observed</a>, the foundations of China’s cyber defences remain weak. There are technical ways to<span> </span><a href="https://link.springer.com/chapter/10.1007%2F11957454_2">get around the firewall</a>, and Chinese internet users exploit<span> </span><a href="https://theconversation.com/from-metoo-to-ricebunny-how-social-media-users-are-campaigning-in-china-90860">Mandarin homophones and emoji</a><span> </span>to evade internal censors.</p>
<p>Chinese economic and financial entanglement with the West means complete blocking of data is impossible. Consistent incentives to openness remain. China and the United States are therefore engaged in what Canadian scholar of digital media and global affairs Jon R Lindsay<span> </span><a href="https://www.belfercenter.org/sites/default/files/legacy/files/IS3903_pp007-047.pdf">describes</a><span> </span>as:</p>
<blockquote>
<p><em>chronic and ambiguous intelligence-counter intelligence contests across their networks, even as the internet facilitates productive exchange between them.</em></p>
</blockquote>
<p>That is, a tension exists because they are covertly working against each other on exactly the same digital platforms necessary to promote their individual and mutual interests in areas such as trade, manufacturing, communications and regulation.</p>
<p>Since Russia is less dependent upon the information technology services of the United States and is therefore less entangled than China, it is<span> </span><a href="https://www.unsw.adfa.edu.au/unsw-canberra-cyber/news/australian-cyber-ideas-moscow">more able</a><span> </span>to engage in bilateral negotiation and aggression.</p>
<p><strong>Different styles of influence</strong></p>
<p>If the internet has become a contest between nation states, one way of winning is to appear to comply with the letter of the law, while abusing its spirit.</p>
<p>In the West, a network of private corporations, including Twitter, Google and Facebook, facilitate an internet system where information and commerce flow freely. Since the West remains open, while powers such as Russia and China exercise control over internet traffic, this creates an imbalance that can be exploited.</p>
<p>Influence operations conducted by China and Russia in countries such as Australia exist within this larger context. And they are being carried out in the digital arena on a<span> </span><a href="https://blog.google/technology/safety-security/update-state-sponsored-activity/">scale</a>never before experienced. In the words of the latest<span> </span><a href="https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR---SSCI.pdf">US Intelligence Community Worldwide Threat Assessment</a>:</p>
<blockquote>
<p><em>Our adversaries and strategic competitors […] are now becoming more adept at using social media to alter how we think, behave and decide.</em></p>
</blockquote>
<p>The internet is a vast infrastructure of tools that can be used to strategically manipulate behaviour for specific tactical gain, and each nation has its own style of influence.</p>
<p>I have previously written about attempts by<span> </span><a href="https://theconversation.com/how-digital-media-blur-the-border-between-australia-and-china-101735">China</a><span> </span>and<span> </span><a href="https://theconversation.com/russian-trolls-targeted-australian-voters-on-twitter-via-auspol-and-mh17-101386">Russia</a><span> </span>to influence Australian politics via social media, showing how each nation state utilises different tactics.</p>
<p>China takes a subtle approach, reflecting a long term strategy. It seeks to connect with the Chinese diaspora in a<span> </span><a href="https://securityaffairs.co/wordpress/57781/apt/operation-cloud-hopper-apt10.html">target country</a>, and shape opinion in a manner favourable to the Chinese Communist Party. This is often as much as about<span> </span><a href="https://theconversation.com/why-china-will-be-watching-how-we-commemorate-anzac-day-75856">ensuring some things aren’t said</a>as it is about shaping what is.</p>
<p><a href="https://theconversation.com/russian-trolls-targeted-australian-voters-on-twitter-via-auspol-and-mh17-101386">Russia</a>, on the other hand, has used more obvious tactics to infiltrate and disrupt Australian political discourse on social media,<span> </span><a href="https://theconversation.com/weve-been-hacked-so-will-the-data-be-weaponised-to-influence-election-2019-heres-what-to-look-for-112130">exploiting</a><span> </span>Islamophobia – and the divide between left and right – to undermine social cohesion. This reflects Russia’s primary aim to destabilise the civic culture of the target population.</p>
<p>But there are some similarities between the two approaches, reflecting a growing cooperation between them. As the<span> </span><a href="https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR---SSCI.pdf">US Intelligence Community</a><span> </span>points out:</p>
<blockquote>
<p><em>China and Russia are more aligned than at any point since the mid-1950s.</em></p>
</blockquote>
<p><strong>A strategic alliance between Russia and China</strong></p>
<p>The strategic<span> </span><a href="https://toinformistoinfluence.com/2017/07/24/forget-sun-tzu-the-art-of-modern-war-can-be-found-in-a-chinese-strategy-book-from-1999/">origins of these shared approaches</a><span> </span>go back to the early internet itself. The Russian idea of<span> </span><a href="https://www.nato.int/DOCU/review/2015/Also-in-2015/hybrid-modern-future-warfare-russia-ukraine/EN/index.htm">hybrid warfare</a><span> </span>– also known as the<span> </span><a href="https://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/">Gerasimov Doctrine</a><span> </span>– uses information campaigns to undermine a society as part of a wider strategy.</p>
<p>But this concept first originated in the Chinese People’s Liberation Army (PLA). In 1999, Chinese PLA colonels penned a strategy titled<span> </span><a href="https://www.oodaloop.com/documents/unrestricted.pdf">Unrestricted Warfare</a>, which outlined how to use media, government, pretty much everything, in the target country not as a tool, but as a weapon.</p>
<p>It recommended not just cyber attacks, but also fake news campaigns – and was the basis for information campaigns that became famous during the 2016 US presidential election.</p>
<p>In June 2016, Russia and China<span> </span><a href="http://www.russia.org.cn/en/russia_china/president-vladimir-putin-and-chairman-of-the-people-s-republic-of-china-xi-jinping-held-talks-in-beijing-june-25-2016/">signed</a><span> </span>a joint declaration on the internet, affirming their shared objectives. In December 2016, Russian President Vladimir Putin signed off on a new<span> </span><a href="http://www.mid.ru/en/foreign_policy/official_documents/-/asset_publisher/CptICkB6BZ29/content/id/2563163">Doctrine of Information Security</a>, which establishes how Russia will<span> </span><a href="https://www.cyberdb.co/russia-and-china-are-making-their-information-security-case/">defend</a><span> </span>its own population against influence operations.</p>
<p><a href="https://www.lexology.com/library/detail.aspx?g=d23109be-661d-4e90-a92c-32b7330e3a49">Observers</a><span> </span>noted the striking similarity between the Russian document and Chinese internet<span> </span><a href="https://www.chinalawtranslate.com/cybersecuritylaw/?lang=en">law</a>.</p>
<p>Russia and China also<span> </span><a href="https://www.chathamhouse.org/expert/comment/cyberattack-revelations-appear-undercut-russia-un">share a view</a><span> </span>of the global management of the internet, pursued via the United Nations:</p>
<blockquote>
<p><em>[…] more regulations to clarify how international law applies to cyberspace, with the aim of exercising more sovereignty – and state control – over the internet.</em></p>
</blockquote>
<p>The recent “sovereign internet”<span> </span><a href="http://sozd.duma.gov.ru/bill/608767-7">bill</a><span> </span>introduced to the Russian Parliament<span> </span><a href="https://www.rferl.org/a/russian-bill-on-autonomous-operation-of-internet-advances-in-duma/29765882.html">proposes</a><span> </span>a Domain Name System (DNS) independent of the wider internet infrastructure.</p>
<p>If the internet is now a site of proxy war, such<span> </span><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2466222">so-called</a><span> </span>“<a href="https://www.rferl.org/a/q-a-hurdles-ahead-as-russia-surges-on-with-sovereign-internet-plan/29766229.html">balkanization</a>” challenges the dominance of the United States.</p>
<p>Nations are competing for<span> </span><a href="https://smallwarsjournal.com/jrnl/art/harnessing-david-and-goliath-orthodoxy-asymmetry-and-competition">influence, leverage and advantage</a><span> </span>to secure their own interests. Russia and China don’t want to risk an all out war, and so competition is pursued at a level just below armed conflict.</p>
<p>Technology, especially the internet, has brought this competition to us all.</p>
<p><strong>We're entering turbulent waters</strong></p>
<p>Despite its best efforts, China’s leaders remain concerned that the digital border between it and the rest of the world is too porous.</p>
<p>In June 2009, Google was blocked in China. In 2011, Fang Binxing, one of the main designers of the<span> </span><a href="https://www.bloomberg.com/quicktake/great-firewall-of-china">Great Firewall</a><span> </span>expressed concern Google<span> </span><a href="https://books.google.com.au/books?id=dEGdCwAAQBAJ&pg=PA113&lpg=PA113&dq=Fang+Binxing+2011+riverbed+benjamin+bratton&source=bl&ots=61Gnc-6vW-&sig=ITVdygMm5ZmxuelLYB6w9oa6Cos&hl=en&sa=X&ved=2ahUKEwib66X9mPvcAhXHU7wKHRHrDiUQ6AEwAHoECAcQAQ#v=onepage&q=Fang%20Binxing%202011%20riverbed%20benjamin%20bratton&f=false">was still potentially accessible in China</a>, saying:</p>
<blockquote>
<p><em>It’s like the relationship between riverbed and water. Water has no nationality, but riverbeds are sovereign territories, we cannot allow polluted water from other nation states to enter our country.</em></p>
</blockquote>
<p>The water metaphor was deliberate. Water flows and maritime domains define sovereign borders. And water flows are a good analogy for data flows. The internet has pitched democratic politics into the fluid dynamics of<span> </span><a href="http://politicalturbulence.org/">turbulence</a>, where algorithms shape<span> </span><a href="https://motherboard.vice.com/en_us/article/xwjden/targeted-advertising-is-ruining-the-internet-and-breaking-the-world">attention</a>, tiny clicks<span> </span><a href="https://www.cambridge.org/core/journals/political-science-research-and-methods/article/quota-sampling-using-facebook-advertisements/0E120F161C9E114C6044EBB7792B5E70">measure participation</a>, and personal data is<span> </span><a href="https://www.chinoiresie.info/the-global-age-of-algorithm-social-credit-and-the-financialisation-of-governance-in-china/">valuable</a><span> </span>and apt to be<span> </span><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3224952">manipulated</a>.</p>
<p>While other nations grapple with the best mix of containment, control and openness, ensuring Australia’s<span> </span><a href="http://www.abc.net.au/radionational/programs/breakfast/china-in-focus/10181900">democracy remains robust</a><span> </span>is the best defence. We need to keep an eye on the nature of the political discussion online, which requires a coordinated approach between the government and private sector, defence and security agencies, and an educated public.</p>
<p>The strategies of information warfare we hear so much about these days were conceived in the 1990s – an era when “surfing the web” seemed as refreshing as a dip at your favourite beach. Our immersion in the subsequent waves of the web seem more threatening, but perhaps we can draw upon our cultural traditions to influence Australian security.</p>
<p>As the rip currents of global internet influence operations grow more prevalent, making web surfing more dangerous, Australia would be wise to mark out a safe place to swim between the flags. Successful protection from influence will need many eyes watching from the beach.</p>
<p class="p1"><em><span class="s1">Written by Tom Sear. Republished with permission of </span><a href="https://theconversation.com/the-internet-is-now-an-arena-for-conflict-and-were-all-caught-up-in-it-101736"><span class="s1">The Conversation.</span></a></em></p>