3,782
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Theory of strategic culture: An analytical framework for Russian cyber threat perception

&
 

ABSTRACT

The strategic environment is evolving rapidly with the recognition of cyberspace as a domain of warfare. The increased interest in cyber as a part of defence has heightened the need for theoretical tools suitable to assess cyber threat perceptions and responses to these threats. Drawing from previous research, we will formulate an analytical framework to study the formation of Russian thinking on cyber threats as a part of Russian strategic culture. This article identifies a sense of vulnerability, the narrative of Russia as a besieged fortress and the technological inferiority of Russia as specific factors influencing Russian cyber threat perception.

Disclosure statement

No potential conflict of interest was reported by the authors.

Notes

1 Nato, Warsaw, ‘Summit Communiqué of the North Atlantic Council in Warsaw’, (8–9 July 2016). https://www.nato.int/cps/en/natohq/official_texts_133169.htm and MoD, Military Doctrine of the Russian Federation (2014). https://rg.ru/2014/12/30/doktrina-dok.html.

2 Rogozin, Dmitri, ‘Speech by Dmitry Rogozin at a press conference in the ‘RG’, (28 June 2013). (in Russian) https://rg.ru/2013/06/28/doklad.html.

3 Orlov, Vladimir, ‘Start of new battles, Moskovskie Novosti’, (21 April 2011). (in Russian). http://www.mn.ru/newspaper/world/68636.

4 Orlov, ‘Start of new battles’.

5 Kerry, John F., Hearing before the Committee on Foreign Relations of United States (24 January 2013) https://www.gpo.gov/fdsys/pkg/CHRG-113shrg86451/pdf/CHRG-113shrg86451.pdf.

6 Cirenza, Patrick, ‘The Flawed Analogy Between Nuclear and Cyber Deterrence’, Bulletin of the Atomic Scientists (22 February 2016). http://thebulletin.org/flawed-analogy-between-nuclear-and-cyber-deterrence9179.

7 See for example Jaishankar K., ‘Establishing a Theory of Cyber Crimes’, International Journal of Cyber Criminology 1/2 (July 2007) http://www.cybercrimejournal.com/Editoriaijccjuly.pdf; and Bolden, M. and Nalla, M., ‘Theorizing Cybercrime: Applying Routine Activities Theory’, 2014. https://www.academia.edu/8897451/Theorizing_Cybercrime_Applying_Routine_Activities_Theory .

8 Zhuang, Rui; Bardas, Alexandru; DeLoach, Scott & Ou, Xinming, ‘A Theory of Cyber Attacks A Step Towards Analyzing MTD Systems’, MTD’15 Denver CO USA (12 October 2015). doi: 10.1145/2808475.2808478.

9 Aron, Leon, ‘The Problematic Pages. In memory of Alexander Solzhenitsyn’, The New Republic. (24 September 2008). https://newrepublic.com/article/62070/the-problematic-pages.

10 Technological determinism is a reductionist theory that aims to provide a causative link between technology and a society’s nature. The theory questions the degree to which human thought or action is influenced by technological factors.

11 Desch, Michael C., ‘Culture Clash: Assessing the Importance of Ideas in Security Studies’, International Security 23/1 (Summer, 1998), 141–170.

12 Snyder J., The Soviet Strategic Culture: Implications for Limited Nuclear Operations (Santa Monica, CA: RAND Corporation 1977), 8. https://www.rand.org/pubs/reports/R2154.html.

13 Snyder, The Soviet Strategic Culture,, 9.

14 Lantis, Jeffrey S., ‘Strategic Culture and National Security Policy’, International Studies Review 4/3 (Autumn, 2002), 87–113. http://www.fb03.uni-frankfurt.de/45431305/Lantis-2002–Strategic-Culture-and-National-Security-Policy.pdf and Lantis, Jeffrey, S, ‘Presentation on theme: Strategic Culture and Threat Assessment’, Second Annual Joint Threat Anticipation Center Workshop, The University of Chicago (4 April 2006). http://slideplayer.com/slide/4271931/.

15 Gray, Colin S., ‘What Rand Hath Wrought’, Foreign Policy 4 (Autumn 1971), 118.

16 Gray, Colin S., ‘Out of the Wilderness: Prime-time for Strategic Culture’, Inaugural speech made at the Defense Threat Reduction Agency (October 2006). https://fas.org/irp/agency/dod/dtra/stratcult-out.pdf.

17 Desch 1998.

18 Johnston, Alistair, Cultural Realism: Strategic Culture and Grand Strategy in Chinese History (New Jersey: Princeton University Press 1995b).

19 Lantis 2006.

20 Johnston, Alistair, ‘Thinking about Strategic Culture’, International Security 19/4 (Spring, 1995a), 32–64. http://www.fb03.uni-frankfurt.de/45431264/Johnston-1995-Thinking-about-Strategic-Culture.pdf.

21 Lantis 2002.

22 Howlett D. and Glenn J, ‘Nordic strategic culture’. Cooperation and conflict 40/1 (2005), 121–140. doi: 10.1177/0010836705049737; Lantis 2002.

23 Bloomfeld, Alan, ‘Time to Move On: Reconceptualizing the Strategic Culture Debate’, Contemporary Security Policy 33/3 (Dec 2012) 437–461. doi: 10.1080/13523260.2012.727679; Davis Cross, Maiá K, ‘Rethinking epistemic communities twenty years later’, Review of International Studies 39/1 (Jan 2013), 137–160. doi: 10.1017/S0260210512000034.

24 Libel, Tamir, ‘Explaining the security paradigm shift: strategic culture, epistemic communities, and Israel’s changing national security policy’, Defence Studies (March 2016), 137–156. doi: 10.1080/14702436.2016.1165595.

25 Johnston 1995a.

26 Johnston, 1995a: 33.

27 Johnston, 1995a: 60.

28 Johnston, 1995a: 64.

29 Johnson, Jeannie L., ‘Conclusion: toward a standard methodological approach’, in Johnson, Jeannie L., Kerry M. Kartchner, and Jeffrey A. Larsen, Strategic culture and weapons of mass destruction. Culturally based insights into comparative national security policymaking. (NY: Palgrave Macmillan 2009).

30 Gray 1999, 50 .

31 Cray, Colin S., ’Out of the wilderness: prime time for strategic culture’, in Johnson, Jeannie L., Kerry M. Kartchner, and Jeffrey A. Larsen, Strategic culture and weapons of mass destruction. Culturally based insights into comparative national security policymaking. (NY: Palgrave Macmillan 2009).

32 Horton-Eddison, Martin, ‘Is Theory of Strategic Culture Valid?’ (2018). https://www.academia.edu/12536463/Is_the_Theory_of_Strategic_Culture_Valid.

33 Berrett, Matthew T. and Johnson, Jeannie L., ‘Cultural Topography: A New Research Tool for Intelligence Analysis – Central Intelligence Agency’, Studies in Intelligence 55/2 (June 2011). https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-55-no.-2/pdfs-vol.-55-no.-2/Berrett-Cultural%20Topography-9June2011.pdf see also Johnson, Jeannie L., ‘Conclusion: toward a standard methodological approach’, in Johnson, Jeannie L., Kerry M. Kartchner, and Jeffrey A. Larsen, ‘Strategic culture and weapons of mass destruction’, Culturally based insights into comparative national security policymaking (NY: Palgrave Macmillan).

34 Cray 2006.

35 see Horton-Eddison 2018; Lock, E., ‘Strategic Culture Theory: What, Why, and How’, doi: 10.1093/acrefore/9780190228637.013.320; See debate Echevarria II, Antulio J. and Hoffman, Frank, ‘Review Essay – Strategic Culture And Ways of War, Elusive Fiction or Essential Concept?’, Naval War College Review 70/2 (2017), Article 7. https://digital-commons.usnwc.edu/nwc-review/vol70/iss2/7/.

36 Adamsky, Dima, ‘Cultural Underpinnings of Current Russian Nuclear and Security Strategy’, in J.L. Johnson, Kerry Kartchner and Marilyn Maines (eds) Crossing Nuclear Thresholds. Leveraging Sociocultural Insights into Nuclear Decisionmaking (NY: Palgrave Macmillan 2018).

37 Poore, Stuart, ‘What is the context? A reply to the Gray-Johnston debate on strategic culture’, Review of International Studies 29 (2003), 279–284. doi: 10.1017/S0260210503000172.

38 Johnston, 1995a: 46 .

39 Johnston, 1995b: ix–x, 248.

40 Johnston, 1995a: 46.

41 Johnston, 1995a, 46.

42 Booth K., ‘Strategic Culture: Validity and Validation’, Oxford Journal on Good Governance 2/1 (March 2005), 25–28. http://ocgg.org/fileadmin/Journal/OJGG_Vol_2_No_1.pdf and Gray 2006.

43 Johnston, 1995a: 57.

44 Johnston, 1995a: 55.

45 Gray 1999.

46 Johnston 1995b.

47 Snyder 1977.

48 FZ-172 (2014) Federal Law 172 of 28 June 2014 on Strategic Planning in the Russian Federation. https://rg.ru/2014/07/03/strategia-dok.html.

49 FZ-172 (2014).

50 Putin, Vladimir, ‘President’s Speech to the Federal Assembly’, (1 December 2016). (in Russian) http://kremlin.ru/events/president/news/53379.

51 Putin, Vladimir, ‘President’s Speech to the Federal Assembly’, (1 March 2018). (in Russian) http://kremlin.ru/events/president/news/56957.

52 UP-203 (2017) Decree 203 of the President of the RF of 9 May 2017 On the Strategy for the Development of the Information Society in the Russian Federation for 2017–2030. (in Russian) http://kremlin.ru/acts/bank/41919.

53 UP- 683 (2015) Decree 683 of the President of the RF of 31 December 2015 About the National Security Strategy of the Russian Federation. (in Russian) http://pravo.gov.ru/proxy/ips/?docbody=&nd=102385609 .

54 UP-683 (2015).

55 MFA, ‘Foreign Policy Concept of the Russian Federation’, (30 November 2016.) http://www.mid.ru/en/foreign_policy/official_documents/-/asset_publisher/CptICkB6BZ29/content/id/2542248 .

56 MoD 2014.

57 UP-646 (2016) Doctrine of Information Security of the RF. (in Russian) https://rg.ru/2016/12/06/doktrina-infobezobasnost-site-dok.html.

58 UP-646 (2016).

59 UP-646 (2016).

60 Lapina M., Revin A. and Lapin V, Информационное право [Information Law] (Moscow: Zakon i pravo 2004) and Komarov, Aleksei, ‘Normative documents on the safety of automated control systems and critical information infrastructure’, (21 July 2016). (in Russian) http://www.securitylab.ru/blog/personal/zlonov/144489.php.

61 UP-569 (2017) Decree 569 of the President of the RF of 25 November 2017 on Amendments to the Regulations on the Federal Service for Technical and Export Control. (in Russian) http://kremlin.ru/acts/bank/42489.

62 See for example MoD 2014, UP-683 (2015); and MFA 2016.

63 MFA 2016.

64 UP-683 (2015).

65 Facon, Isabella, ‘Russian Strategic Culture in the 21st Century: Redefining the West-East Balance’, in Tellis A., Szalwinski A. and Wills M. (eds) Understanding Strategic Cultures in the Asia-Pacific, Strategic Asia 2016–2017, The National Bureau of Asian Research, (2016) 62–89. http://nbr.org/publications/strategic_asia/pdf/SA16_ExecutiveBrief.pdf.

66 UP-683 (2015).

67 Sinovets, Polina, ‘From Stalin to Putin: Russian Strategic Culture in the XXI Century, Its Continuity, and Change’, Philosophy Study 6/7 (July 2016), 417–423 doi: 10.17265/2159-5313/2016.07.002.

68 Pynnöniemi, Katri, ‘Russia’s National Security Strategy: Analysis of Conceptual Evolution’, The Journal of Slavic Military Studies 31/2 (2018), 240–256.

69 MoD 2014.

70 Gerasimov, Valeri, ‘The value of science in anticipation. New challenges require rethinking the forms and methods of conducting military operations’, Voenno-Promyshlennyi Kurier (26 February 2013). (in Russian) https://www.vpk-news.ru/articles/14632.

71 MoD 2014.

72 Aron 2008.

73 Kennan, George, ‘The Sources of Soviet Conduct’, Foreign Affairs 25 (1947), 566–82. https://is.muni.cz/el/1423/jaro2017/BSS185/um/Week_4_Kennan_on_Containment.pdf.

74 Monaghan, Andrew, ‘“An enemy at the gates” or “from victory to victory”?’ Russian foreign policy. International Affairs 84/4 (2008), 717–733. http://onlinelibrary.wiley.com/doi/10.1111/j.1468-2346.2008.00734.x/abstract.

75 Kolesnikov, Andrei, ‘Do Russians Want War?’ Carnegie Moscow Center (June 2016). http://carnegieendowment.org/files/Article_Kolesnikov_2016_Eng-2.pdf.

76 Facon 2016.

77 Covington, Stephen R., ‘The Culture of Strategic Thought Behind Russia’s Modern Approaches to Warfare.’ Belfer Center. Harvard Kennedy School (2016). https://www.belfercenter.org/sites/default/files/files/publication/Culture%20of%20Strategic%20Thought%203.pdf .

78 Facon, Isabella, ‘Russia’s national security strategy and military doctrine and their implications for the EU’, European Parliament’s Sub-Committee on Security and Defence (2017). http://www.europarl.europa.eu/RegData/etudes/IDAN/2017/578016/EXPO_IDA(2017)578016_EN.pdf.

79 Igumnova Lyudmila, ‘Russia’s Strategic Culture Between American and European Worldviews’, The Journal of Slavic Military Studies 24 (2011). doi: 10.1080/13518046.2011.572729.

80 Felgenhauer, Pavel, ‘Russia’s Imperial General Staff’, Perspective XVI/1 (October- November 2005). https://www.bu.edu/iscip/vol16/felgenhauer.html.

81 Facon 2016.

82 Skak, Mette, ‘Russian strategic culture: the role of today’s chekisty’, Contemporary Politics 22/3 (2016), 324–341. doi: 10.1080/13569775.2016.1201317.

83 Yarovaya, M., ‘Igor Ashmanov: “Today information domination is the same as air superiority”’, (1 May 2013). (in Russian) https://ain.ua/2013/05/01/igor-ashmanov-segodnya-informacionnoe-dominirovanie-eto-vse-ravno-chto-gospodstvo-v-vozduxe.

84 UP-646 (2016).

85 UP-646 (2016).

86 Johnston 1995a: 46.

87 UP-646 (2016).

88 Kamyshev, E., Information Security and Protection of Information (Tomsk: Federalnoe Agenstvo RF po nauke i obrazovaniju 2009). (in Russian).

89 Putin, Vladimir, ‘Meeting of the Valdai International Discussion Club’ (22 October 2015). http://en.kremlin.ru/events/president/news/50548 .

90 Yarovaya 2013.

91 Eliseev, Igor, ‘I shooted with digital cannon’, Rossiyskaya Gazeta No 6085 (109) (23 May 2013) (in Russian) https://rg.ru/2013/05/23/ashmanov.html.

92 UP-646 (2016).

93 Covington 2016.

94 Monaghan 2008.

95 Gusachenko, V.A., ‘On the current context of the concept of national security’, Voennaya Mysl 7 (2007), 2–13. (in Russian) http://militaryarticle.ru/voennaya-mysl/2007-vm/10032-ob-aktualnom-kontekste-ponjatija-nacionalnaja.

96 Facon 2016.

97 Ovtsarenko, Elena, ‘Deputy Head of the Presidential Administration Vladislav Surkov: Putin is strengthening the state, not himself’, Komsomolskaya Pravda (28 September 2004). (in Russian) https://www.kompravda.eu/daily/23370/32473/.

98 Skak 2016.

99 Covington 2016.

100 Facon 2017.

101 Covington 2016.

102 UP-203 (2017).

103 UP-646 (2016).

104 Eliseev 2013.

105 Johnston 1995a:46.

106 Wirtz, James J., ‘Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy’, CCDCOE Tallinn (2015). https://ccdcoe.org/uploads/2018/10/Ch03_CyberWarinPerspective_Wirtz.pdf.

107 Facon 2016.

108 Igumnova 2011.

109 Facon 2016; Skak 2016; Kolesnikov 2016.

110 Johnston,1995b: ix–x, 248.

111 UP-203 (2017).

112 UP-31 (2013) Decree 31 of the President of the RF of 15 January 2013 on the establishment of a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. (in Russian) https://rg.ru/2013/01/18/komp-ataki-site-dok.html.

113 UP-620 (2017) Decree of the President of the Russian Federation of 22 December 2017 No. 620 on the improvement of the state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. (in Russian) http://www.kremlin.ru/acts/bank/42623.

114 UP-646 (2016).

115 Yarovaya 2013.

116 UP-646 (2016).

117 Eliseev 2013.

118 Meduza, ‘Russia’s Communications Ministry plans to isolate the RuNet by 2020ʹ. (13 May 2016). https://meduza.io/en/news/2016/05/13/communications-ministry-plans-to-isolate-runet-by-2020.

119 Soldatov Andrei, Borogan Irina, The Red Web (New York: Public Affairs 2015).

120 PP-538 (2005) Decree 538 of the Government of the Russian Federation of 27 August 2005 on Approval of the Rules for Interaction of Communication Operators with Authorized State Bodies Conducting Operational-Investigation Activities. (in Russian) http://www.consultant.ru/document/cons_doc_LAW_55326/.

121 FZ-276 (2017) Federal Law 276 of 29 July 2017 on Amendments to the Federal Law On Information, Information Technologies and Information Protection. (in Russian) https://rg.ru/2017/07/30/fz276-site-dok.html.

122 FZ-241 (2017) Federal Law 241 of 29 July 2017 on Amendments to Articles 101 and 154 of the Federal Law on Information, Information Technologies and Information Protection. (in Russian) https://rg.ru/2017/08/04/informacia-dok.html.

123 Yefremov, Alexey, ‘Formation of the concept of state information sovereignty’, (March 2017). (in Russian) doi: 10.17323/2072-8166.2017.1.201.215.

124 Putin, Vladimir, ‘President’s Speech to the Federal Assembly’, (1 March 2018). (in Russian) http://kremlin.ru/events/president/news/56957.

125 UP-646 (2016).

126 Eliseev 2013.

127 UP-646 (2016).

Additional information

Notes on contributors

Martti J. Kari

Martti J. Kari is university teacher in Jyväskylä University, Finland. He retired as colonel from Finnish Defense Intelligence in the end of year 2017. His last post was Assistant Chief of Defense Intelligence. He has MA in Russian language (1993) and literature, and MA in cyber security (2017) in Jyväskylä University. Kari has worked as a university teacher from the beginning of year 2018 In Jyväskylä University. He is specialized in intelligence, and Russian cyber and hybrid warfare.

Katri Pynnöniemi

Dr. Katri Pynnöniemi holds Master’s and Doctor’s degrees in international relations from the University of Tampere, Finland. She is as an Assistant Professor of Russian Security Policy at the National Defense University and at the University of Helsinki. Previously she has worked as a senior researcher at the Finnish Institute for International Affairs. Her research deals with Russia's security policy and strategic thinking. She has published widely about the system change in Russia and on Russian foreign and security policy. Her latest publications include: “Russia’s National Security Strategy: Analysis of Conceptual Evolution”, at the Journal of Slavic Military Studies (2018) and Information-psychological warfare in Russian strategic thinking, in Kanet E. Roger (ed.) (2019) Handbook of Russian Security Policy, London & NY: Routledge.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.