The model of hybrid influence in the information sphere

Keywords: public administration, hybrid threats, countermeasures and prevention, information policy, authorities, network structures, information technologies.

Abstract

An analysis of the specifics of the functioning and essence of the model of hybrid influence in the information sphere was carried out, as a result of which it was established that with the growing threat of cyber-attacks by national states, hackers and criminal organizations, it began to affect the way the world sees the Internet. Inadequate management of cyber threats puts users at risk, undermines trust in the Internet, and jeopardizes its ability to drive economic and social innovation. But at the same time, a misinformed and disproportionate response by authorities can potentially threaten Internet freedom and create an atmosphere of fear, uncertainty and doubt. Therefore, the future of the Internet and its continued growth will be determined by how governments and private organizations collectively respond to the scope and scale of cyberattacks.

As governments feel pressure to mitigate the effects of cyberattacks, there is a growing risk that online freedoms and global connectivity will be severely curtailed in favor of national security. To avoid this, new models of incentives, accountability, and responsibility are urgently needed to increase cybersecurity readiness, reduce vulnerabilities, and ensure end-user security. The complexity and scale of cyber-attacks require a multi-stakeholder and expert-led response to keep the digital economy thriving and to restore confidence in internet security. Neither the public nor the private sector can handle the scope and scale of cyber threats alone. Because of the interconnected nature of the Internet, actions taken by individual stakeholders will do little to mitigate or eliminate cyber threats. Usually, the state reacts to new cyber threats, guided by the need to “do something” in the face of increasingly sophisticated cyber-attacks. However, such reactive responses will not effectively mitigate the threat and will lead to over-regulation. Effective action and network resilience to cyber threats can only come about through information sharing, strategic thinking and collaborative efforts by all stakeholders.

It is argued that how stakeholders adapt to future cyberattacks could transform the Internet from a platform of openness and collaboration to a fragmented, closed, and insecure network environment. A fundamental change in the architecture and basic principles of the Internet could create a dystopian future of a protected walled garden, filtering access without encryption, anonymity, or privacy. The national security of nation-states will eclipse the freedoms and rights we now take for granted, creating a battle between perceived national security interests and end-user security measures. This can be avoided if the long-discussed need for a global cyber security culture takes on new relevance and urgency as cyber security becomes everyone’s responsibility. At the same time, cyber governance can no longer remain solely in the hands of the authorities, as the risk of being subjected to cyber-attacks is constantly increasing. Much of the global Internet infrastructure today is developed, owned and maintained by private actors, and due to the complexity and scale of cyber-attacks, governments alone are unable to provide inclusive and expert-led regulatory responses, and therefore private actors need to be encouraged to join discussions about the future of the Internet.

Downloads

Author Biography

Anton Khryapynskyi , LLC “Khryapynskyi and Company”, Kharkiv, Ukraine 4/6 A, Akhsarova St., Kharkiv, 61051, Ukraine

Director of LLC “Khryapynskyi and Company”, Kharkiv, Ukraine

4/6 A, Akhsarova St., Kharkiv, 61051, Ukraine

References

Armerding, T. (2019, January 24). The future of open source software: More of everything. Synopsys. URL: https://www.synopsys.com/blogs/software-security/future-of-open-source-predictions/

Balcaen, P., Bois, C. D., & Buts, C. (2021). A game-theoretic analysis of hybrid threats. Defence and Peace Economics, 33(1), 26–41. DOI: https://doi.org/10.1080/10242694.2021.1875289

Cadwalladr, C., & Graham-Harrison, E. (2018, March 17). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian.

Caliskan, M., & Liégeois, M. (2020). The concept of ‘hybrid warfare’ undermines NATO’s strategic thinking: Insights from interviews with NATO officials. Small Wars & Insurgencies, 32(2), 295–319. DOI: https://doi.org/10.1080/09592318.2020.1860374

Clarke, R., & Knake, R. (2020). Cyber war: The next threat to national security and what to do about it. New York: HarperCollins.

Confessore, N. (2018). Cambridge Analytica and Facebook: The scandal and the fallout so far. The New York Times. URL: https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html

Ishimaru, S. (2018). Roaming Mantis uses DNS hacking to infect Android smartphones. Securelist. URL: https://securelist.com/roaming-mantis-uses-dns-hijacking-to-infect-android-smartphones/85178/

Jung, S. C., & Tan, E. W. (2024). Middle powers and minilateralism against hybrid threats in the Indo-Pacific: South Korea, Singapore, and Taiwan. Australian Journal of International Affairs, 78(6), 889–910. DOI: https://doi.org/10.1080/10357718.2024.2399339

Kulkarni, P., Patil, S., & Kadam, P. (2018). EternalBlue: A prominent threat actor of 2017–2018. Virus Bulletin. URL: https://www.virusbulletin.com/virusbulletin/2018/06/eternalblue-prominent-threat-actor-20172018/

Libiseller, C. (2023). ‘Hybrid warfare’ as an academic fashion. Journal of Strategic Studies, 46(4), 858–880. DOI: https://doi.org/10.1080/01402390.2023.2177987

McWilliams, A., & Legnér, M. (2024). Threat assessments and heritage in the age of hybrid warfare. International Journal of Heritage Studies, 30(12), 1379–1392. DOI: https://doi.org/10.1080/13527258.2024.2393610

Newman, L. H. (2018, March 1). GitHub survived the biggest DDoS attack ever recorded. Wired. URL: https://www.wired.com/story/github-ddos-memcached/

O’Sullivan, D., Griffin, D., & DiCarlo, P. (2018, July 17). Cambridge Analytica’s Facebook data was accessed from Russia, MP says. CNN.

Parfitt, T. (2011, April 6). Georgian woman cuts off web access to whole of Armenia. The Guardian. URL: https://www.theguardian.com/world/2011/apr/06/georgian-woman-cuts-web-access

Symantec Security Response. (n.d.). Reign: Top-tier espionage tool enables stealthy surveillance. Symantec Security. URL: https://docs.broadcom.com/doc/regin-top-tier-espionage-tool-15-en

Richmond, R. (2010, September 24). Malware hits computerized industrial equipment. The New York Times. URL: https://bits.blogs.nytimes.com/2010/09/24/malware-hits-computerized-industrial-equipment/

Sadowski, A., & Maj, J. (2022). Interoperability and complementarity of civil defense as crucial problems of regional security: The case of the Suwalki corridor. The Journal of Slavic Military Studies, 35(2), 205–225. DOI: https://doi.org/10.1080/13518046.2022.2139576

The Economist. (2017, May 6). The world’s most valuable source is no longer oil, but data. The Economist. URL: https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data

Weinstein, D. (2018, October 2). Stop saying “digital Pearl Harbor”. DARK Reading.

URL: https://www.darkreading.com/threat-intelligence/stop-saying-digital-pearl-harbor/a/d-id/1332932

White, R. (2009, April 4). China and Russia vs. US grid! Wired. URL: https://www.wired.com/2009/04/china-and-russi/

Published
2024-12-30
How to Cite
Khryapynskyi , A. (2024). The model of hybrid influence in the information sphere. Pressing Problems of Public Administration, 2(65), 302-315. https://doi.org/10.26565/1684-8489-2024-2-16
Section
Public Service: Aspects and Practices