Global Security and Intelligence Studies Volume 5, Number 1, Spring / Summer 2020 | Page 26

Global Security and Intelligence Studies of effort to reach one person as it does five million (Shallcross 2017). Conversely, the simplicity by which information is shared has led to increased accessibility by those on the receiving end. • Attribution in this arena is increasingly difficult. Social personas can create profiles that appear to be legitimate, but in reality are fake. Websites can also be created by unknown sources to relay disinformation. Furthermore, the narratives do not necessarily have to be untrue. For example, they can be attached to already-established movements within a democratic society. The impact of this is twofold: first, it gives artificial credibility and visibility to otherwise illegitimate groups. Second, if the deception is detected, it can have the opposite effect of discrediting legitimate groups by tainting them with foreign interference. • There is an ever-growing information environment. Information overload can lead to mass confusion and the subsequent disengagement of society, making information manipulation by the aggressor easier and more normalized. The “velocity of human interaction and the velocity of information is at an alltime high,” leading to somewhat of a truth crisis (Banach 2018). Even if there is an overall awareness of deception by the public and the individuals that comprise it, the limitations of System 2 to handle so much information means that corrections and fact checking almost never fully undo the damage done (Kagan, Bugayova, and Cafarella 2019). 2) Cyber Espionage While there is no agreed upon definition at the moment, the 2013 Tallinn manual defines cyber espionage as “an act undertaken clandestinely or under false pretenses that uses cyber capabilities to gather (or attempt to gather) information with the intention of communicating it to the opposing party” (Schmitt). These hacking operations are typically carried out by nation states, but are increasingly taken up by nonstate actors. Conversely, “hacktivism” blends hacking and activism for a political or social cause, and state and local governments are increasingly finding themselves targets (Bergal 2017). This form of digital disobedience, however altruistic the intent, is highly disruptive and regarded as harassment. While there are a variety of ways hacked information can be used to influence targets, one tactic is hack and leak operations. This involves two stages: the first “focuses on intrusion (unauthorized access to networks), while the second concentrates on influence (the use of digital technologies to shift public debate) (Shires 2019). The intrusion into specific digital systems and networks constitutes cyber espionage—the theft of information in cyberspace, usually classified as compromising material. On the other hand, the leak of said stolen information into the public arena has intended psychological effects. This is perhaps especially so when the 12