The Role of Cyber Operations and Information Warfare in the Strategic Calculus of State and Non-State Actors

Authors

  • Christian C. Madubuko University of New England, Armidale, NSW, Australia

DOI:

https://doi.org/10.47941/jirp.3662

Keywords:

Cyber Operations, Information Warfare, Strategic Calculus, State Actors, Non-State Actors

Abstract

Purpose: This research critically interrogates the strategic proliferation of cyber capabilities and information warfare within the evolving architecture of international security. It seeks to elucidate how cyber operations serve as asymmetrical instruments of coercion, deception, and ideological influence, thereby reshaping core paradigms of sovereignty, conflict, and power projection in contemporary geopolitics.

Methodology: Employing a multidisciplinary analytical framework, this study synthesises insights from strategic studies, cybersecurity theory, and international relations discourse. It undertakes a qualitative analysis of case studies involving state-sponsored cyber operations, complemented by a critical review of policy documents, legal frameworks, and scholarly debates. The research critically evaluates the normative assumptions underpinning sovereignty, attribution, and regulation, employing a constructivist lens to interrogate how norms evolve in response to technological innovation and strategic imperatives.

Findings: The findings reveal that cyber and information domains are increasingly embedded within hybrid strategies that leverage ambiguity, deniability, and asymmetry to disrupt established norms of warfare and diplomacy. Strategic motivations encompass hegemonic ambitions, the pursuit of strategic ambiguity, and the ideological dissemination of influence, often operating in a normative grey zone that complicates attribution and accountability. The analysis underscores that normative dilemmas, particularly issues of sovereignty, attribution, and the regulation of state and non-state actors, pose fundamental challenges to the development of effective international governance frameworks. The proliferation of cyber capabilities heightens risks of escalation, proliferation, and strategic instability, especially given the difficulties in establishing credible deterrence mechanisms.

Unique Contribution to Theory, Policy, and Practice: This study advances the theoretical understanding of cyber operations as integral to the ontological redefinition of sovereignty and conflict in the information age. It critically engages with constructivist and realist perspectives to interrogate how normative frameworks evolve amidst strategic ambiguity. Policy-wise, it advocates for a nuanced, multilayered approach that combines resilience-building, normative norm development, and robust multilateral institutions capable of addressing the complex, transnational nature of cyber threats. Practically, it emphasises the imperative for states and non-state actors to develop adaptive, norm-sensitive strategies that mitigate the risk of escalation while fostering a resilient international security architecture that is responsive to the diffuse and contested nature of cyber power.

Downloads

Download data is not yet available.

Author Biography

Christian C. Madubuko, University of New England, Armidale, NSW, Australia

Peace & Conflict Studies

References

Abrahams, M., & Bramsen, R. (2018). Digital Jihad: The Use of Social Media by Terrorist Organisations. Journal of Cybersecurity Studies, 12(3), 45–68.

Bradshaw, S., & Howard, P. N. (2019). The global organisation of social media disinformation campaigns. Journal of Cyber Policy, 4(1), 1–22.

Burelli, P., Carminati, B., & Ferrari, E. (2019). Cybercrime and Cryptocurrency: Challenges for Law Enforcement. International Journal of Cybersecurity, 15(2), 89–104.

Cavelty, M. K. (2014). Cybersecurity and the Politics of Attribution. In: Cybersecurity and Cyberwar: What Everyone Needs to Know. P.W. Singer & A. Friedman (Eds.), Oxford University Press.

Clarke, R. A., & Knake, R. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. Ecco.

CrowdStrike. (2019). Operation Cloud Hopper: APT10 targets managed service providers worldwide. CrowdStrike Intelligence Report. https://www.crowdstrike.com/blog/operation-cloud-hopper/

Fifield, D., & Sanger, D. E. (2013). U.S. and Israel developed the Stuxnet virus to slow Iran’s nuclear efforts. The New York Times. https://www.nytimes.com/2013/06/01/world/middleeast/us-and-israel-developed-stuxnet-virus.html

Gabiou, M. (2014). Cybersecurity and Asymmetrical Warfare: Challenges and Responses. Journal of Strategic Studies, 37(4), 567–589.

Gartzke, E. (2013). The Myth of Cyberwar: Bringing War in Cyber Space Back Down to Earth. International Security, 38(2), 41–73.

Gartzke, E., & Lindsay, J. R. (2015). Weaving Tapestries of Cyber Power: The Politics of Attribution. Journal of Cyber Policy, 1(2), 131–146.

Gartzke, E., & Lindsay, J. R. (2015). Weaving Ties That Bind: Norms, Power, and Cybersecurity. Security Studies, 24(2), 287–318.

Gartzke, E., & Lindsay, J. R. (2015). Norms and Cybersecurity. Journal of Cybersecurity, 1(1), 1–14.

Gartzke, E., & Lindsay, J. R. (2015). Weaving Tangles: Attribution, Deterrence, and Cyber Warfare. Security Studies, 24(2), 323–355.

Giles, K. (2016). Cybersecurity and deterrence in the 21st century. Routledge.

Greenberg, A. (2018). The untold story of NotPetya, the most devastating cyberattack in history. WIRED. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code/

Hathaway, O. A. (2018). The Law of Cyber Warfare: An Overview. Harvard National Security Journal, 9, 1–45.

Hoffman, F. G. (2007). Hybrid Warfare and Challenges. Joint Force Quarterly, 52, 34–39.

Hoffman, B. (2017). Inside Terrorism. Columbia University Press.

Kello, L. (2017). The Virtual Weapon and International Order. Yale University Press.

Kofman, M., & Rojansky, M. (2018). A Closer Look at Russia's 'Hybrid Warfare'. Wilson Centre. https://www.wilsoncenter.org/publication/closer-look-russias-hybrid-warfare

Krehel, K. (2019). Russia’s hybrid warfare and influence operations in the digital age. Journal of Strategic Studies, 42(2), 200–222.

Krepon, M., & Kuber, S. (2014). Detering cyber conflict: Strategies and policy options. Centre for Strategic and International Studies (CSIS).

Kushner, D. (2016). The Darkening Web: The War for Cyberspace. Penguin Press.

Libicki, M. C. (2007). Conquest in Cyberspace: National Security and Information Warfare. Cambridge University Press.

Libicki, M. C. (2009). Cyberdeterrence and Cyberwar. RAND Corporation.

Lanoszka, A. (2016). Russian Hybrid Warfare and Its Implications for NATO's Defence. International Affairs, 92(1), 175–191.

Lindsay, J. R. (2013). Stuxnet and the Limits of Cyber Warfare. Security Studies, 22(3), 365–404.

Lindsay, J. R. (2014). The Impact of Cyber Warfare on International Security. International Security, 39(2), 130–132.

Mueller, R. S. (2019). Report on the Investigation into Russian Interference in the 2016 Presidential Election. U.S. Department of Justice.

NATO. (2017). Multi-Domain Operations Concept. North Atlantic Treaty Organisation.

Nye, J. S. (2010). Cyber Power. Harvard University Press.

Nye, J. S. (2013). The Future of Power. Public Affairs.

Nye, J. S. (2017). Determinants of influence: The role of information operations in modern conflict. Harvard University Press.

Nye, J. S. (2017). Cyber Power: Challenges to American National Security. Harvard University Belfer Centre.

ODNI. (2021). Annual Threat Assessment of the US Intelligence Community. Office of the Director of National Intelligence.

Onuoha, F. C. (2016). Boko Haram and the Use of Social Media for Recruitment and Propaganda. African Security Review, 25(3), 227–241.

Pomerantz, J. (2014). The Challenges of Deterrence in Cyberspace. Journal of Cybersecurity, 1(1), 51–66.

Rid, T. (2018). Cyber War Will Not Take Place. Oxford University Press.

Rid, T. (2019). Active Measures: The Secret History of Disinformation and Political Warfare. Farrar, Straus and Giroux.

Rid, T. (2020). The Geostrategic Significance of Cyber Capabilities. International Affairs, 96(4), 917–935.

Rid, T., & Buchanan, B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1–2), 4–37.

Rid, T., & Buchanan, B. (2015). The Rise of Hybrid Warfare. Journal of Strategic Studies, 38(4), 633–651.

Schmitt, M. N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press.

Schmitt, M. N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press.

Segal, A. (2017). Hacktivism and the Rise of Anonymous. Journal of Digital Security, 11(1), 73–88.

Singer, P. W., & Friedman, A. (2014). Cybersecurity and the future of civil society. Foreign Affairs, 93(4), 87–98.

Wark, M. (2019). Norms and non-state actors in cyberspace. International Journal of Cybersecurity, 3(1), 45–60.

Wirtz, J. J., & Born, G. (2019). Cyber Operations and the Norms Dilemma. International Security, 43(1), 7–42.

Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown.

Zetter, K. (2016). How Digital Sabotage Threatens Critical Infrastructure. WIRED.

Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.

Downloads

Published

2026-04-25

How to Cite

Madubuko, C. C. (2026). The Role of Cyber Operations and Information Warfare in the Strategic Calculus of State and Non-State Actors. Journal of International Relations and Policy, 7(1), 55–82. https://doi.org/10.47941/jirp.3662

Issue

Section

Articles