Abstract
The Gray Zone lies between peace and war, where and when adversaries increasingly orchestrate campaigns using multiple elements of power to achieve political-security objectives minimizing the risks of engaging in direct kinetic warfare. Actions motivated by a Gray Zone campaign are deliberately ambiguous - sometimes deceptive - to hide the ultimate intent, cloud attribution, or leave the target of the campaign a choice among only acquiescence or escalation. Recent Gray Zone campaigns include the Russian occupation in the Ukraine and the expansion of Chinese influence and control in the South China Sea. In this paper we define competition in the Gray Zone, characterize the concurrent interactions between campaigns and counter-campaigns of two adversaries, and provide an Indications and Warnings (I&W) framework for detecting Gray Zone campaigns early. We propose combining bottom-up analysis, such as changes in the intensity and tone of messaging in media, economic investments, and other actions in the Diplomatic, Information, Military, and Economic (DIME) spectrum, with top-down analysis of the master narratives of nation states and other actors. We propose that interdiction of a Gray Zone campaign is best structured by analogy to the approach for disrupting the cyber kill chain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Popp, G., Canna, S.: The Characterization and conditions of the Gray Zone. Office of the Secretary of Defense (OSD) Strategic Multilayer Assessment (SMA) Report (2016)
Griffith, S.: Sun Tzu—The Art of War. Oxford University Press, London (1963)
Kettler, B.: Mixed methods stability forecasting and mitigation for the DARPA ICEWS program. In: Third International Conference on Computational Cultural Dynamics (2009)
Intelligence Advanced Research Projects Activity (IARPA) Mercury Program. https://www.iarpa.gov/index.php/research-programs/mercury
Muthiah, S., Butler, P., Khandpur, R.P., Saraf, P., Self, N., Rozovskaya, A., Zhao, L., et al.: Embers at 4 years: experiences operating an open source indicators forecasting system. arXiv preprint arXiv:1604.00033 (2016)
Intelligence Advanced Research Projects Activity (IARPA) Cyber-attack Automated Unconventional Sensor Environment (CAUSE) Program. https://www.iarpa.gov/index.php/research-programs/cause
Tetlock, P.E., Mellers, B.A., Scoblic, J.P.: Bringing probability judgments into policy debates via forecasting tournaments. Science 355(6324), 481–483 (2017)
Bell, J., Whaley, B.: Cheating and Deception. Transaction Publishers, New Brunswick (1982)
Whaley, B.: Toward a general theory of deception. J. Strateg. Stud. 5(1), 178–192 (1982)
Yuill, J., Feer, F., Denning, D., Bell, B.: “Deception for Computer Security Defense”, research-project final-report for the Office of the Secretary of Defense (2004)
Yuill, J.: Defensive computer-security deception operations: processes, principles and techniques, Ph.D. thesis, North Carolina State University (2006)
Yuill, J.J., Denning, D., Freer, F.: Using deception to hide things from hackers: processes, principles, and techniques. J. Inf. Warf. 5(3), 26–40 (2006)
Kambhampati, S.: Model-lite planning for the web age masses: the challenges of planning with incomplete and evolving domain theories. In: Proceedings of AAAI (2007)
Gerasimov, V.: The value of science is in the foresight. Mil. Rev. 2016, 23–29 (2016)
Freier, N.: SSI Pub1325 OUTPLAYED: Regaining Strategic Initiative in the Gray Zone. Strategic Studies Institute and US Army War College Press, June 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Hoffman, M., Hofmann, M.O. (2018). Challenges and Opportunities in Gray Zone “Combat”. In: Hoffman, M. (eds) Advances in Cross-Cultural Decision Making. AHFE 2017. Advances in Intelligent Systems and Computing, vol 610. Springer, Cham. https://doi.org/10.1007/978-3-319-60747-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-60747-4_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60746-7
Online ISBN: 978-3-319-60747-4
eBook Packages: EngineeringEngineering (R0)