Skip to main content

Challenges and Opportunities in Gray Zone “Combat”

  • Conference paper
  • First Online:
  • 1618 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 610))

Abstract

The Gray Zone lies between peace and war, where and when adversaries increasingly orchestrate campaigns using multiple elements of power to achieve political-security objectives minimizing the risks of engaging in direct kinetic warfare. Actions motivated by a Gray Zone campaign are deliberately ambiguous - sometimes deceptive - to hide the ultimate intent, cloud attribution, or leave the target of the campaign a choice among only acquiescence or escalation. Recent Gray Zone campaigns include the Russian occupation in the Ukraine and the expansion of Chinese influence and control in the South China Sea. In this paper we define competition in the Gray Zone, characterize the concurrent interactions between campaigns and counter-campaigns of two adversaries, and provide an Indications and Warnings (I&W) framework for detecting Gray Zone campaigns early. We propose combining bottom-up analysis, such as changes in the intensity and tone of messaging in media, economic investments, and other actions in the Diplomatic, Information, Military, and Economic (DIME) spectrum, with top-down analysis of the master narratives of nation states and other actors. We propose that interdiction of a Gray Zone campaign is best structured by analogy to the approach for disrupting the cyber kill chain.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Popp, G., Canna, S.: The Characterization and conditions of the Gray Zone. Office of the Secretary of Defense (OSD) Strategic Multilayer Assessment (SMA) Report (2016)

    Google Scholar 

  2. Griffith, S.: Sun Tzu—The Art of War. Oxford University Press, London (1963)

    Google Scholar 

  3. Kettler, B.: Mixed methods stability forecasting and mitigation for the DARPA ICEWS program. In: Third International Conference on Computational Cultural Dynamics (2009)

    Google Scholar 

  4. Intelligence Advanced Research Projects Activity (IARPA) Mercury Program. https://www.iarpa.gov/index.php/research-programs/mercury

  5. Muthiah, S., Butler, P., Khandpur, R.P., Saraf, P., Self, N., Rozovskaya, A., Zhao, L., et al.: Embers at 4 years: experiences operating an open source indicators forecasting system. arXiv preprint arXiv:1604.00033 (2016)

  6. Intelligence Advanced Research Projects Activity (IARPA) Cyber-attack Automated Unconventional Sensor Environment (CAUSE) Program. https://www.iarpa.gov/index.php/research-programs/cause

  7. Tetlock, P.E., Mellers, B.A., Scoblic, J.P.: Bringing probability judgments into policy debates via forecasting tournaments. Science 355(6324), 481–483 (2017)

    Article  Google Scholar 

  8. Bell, J., Whaley, B.: Cheating and Deception. Transaction Publishers, New Brunswick (1982)

    Google Scholar 

  9. Whaley, B.: Toward a general theory of deception. J. Strateg. Stud. 5(1), 178–192 (1982)

    Article  Google Scholar 

  10. Yuill, J., Feer, F., Denning, D., Bell, B.: “Deception for Computer Security Defense”, research-project final-report for the Office of the Secretary of Defense (2004)

    Google Scholar 

  11. Yuill, J.: Defensive computer-security deception operations: processes, principles and techniques, Ph.D. thesis, North Carolina State University (2006)

    Google Scholar 

  12. Yuill, J.J., Denning, D., Freer, F.: Using deception to hide things from hackers: processes, principles, and techniques. J. Inf. Warf. 5(3), 26–40 (2006)

    Google Scholar 

  13. Kambhampati, S.: Model-lite planning for the web age masses: the challenges of planning with incomplete and evolving domain theories. In: Proceedings of AAAI (2007)

    Google Scholar 

  14. Gerasimov, V.: The value of science is in the foresight. Mil. Rev. 2016, 23–29 (2016)

    Google Scholar 

  15. Freier, N.: SSI Pub1325 OUTPLAYED: Regaining Strategic Initiative in the Gray Zone. Strategic Studies Institute and US Army War College Press, June 2016

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mark Hoffman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Hoffman, M., Hofmann, M.O. (2018). Challenges and Opportunities in Gray Zone “Combat”. In: Hoffman, M. (eds) Advances in Cross-Cultural Decision Making. AHFE 2017. Advances in Intelligent Systems and Computing, vol 610. Springer, Cham. https://doi.org/10.1007/978-3-319-60747-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60747-4_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60746-7

  • Online ISBN: 978-3-319-60747-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics