{"id":470,"date":"2025-08-30T20:24:30","date_gmt":"2025-08-31T00:24:30","guid":{"rendered":"https:\/\/constantinpoindexter.com\/blog\/?p=470"},"modified":"2025-08-30T21:27:40","modified_gmt":"2025-08-31T01:27:40","slug":"cyber-militias-and-the-struggle-for-primacy-in-the-information-battlespace","status":"publish","type":"post","link":"https:\/\/constantinpoindexter.com\/blog\/cyber-militias-and-the-struggle-for-primacy-in-the-information-battlespace\/","title":{"rendered":"Cyber-Militias and the Struggle for Primacy in the Information Battlespace"},"content":{"rendered":"\n<p>I came of age in an intelligence community that still treated the \u201cfront line\u201d as a place one could step onto, map, and secure. That world is gone. Today, non-military adversaries, loosely coordinated \u201ccyber-militias\u201d of propagandists, patriotic hackers, influence entrepreneurs, and paid or volunteer amplifiers contest the initiative not with armor or artillery, but by colonizing attention, bending perception, and accelerating social division at scale. Our doctrine has begun to recognize this shift. In 2017, the U.S. Department of Defense elevated information to a joint function, formalizing what operators have seen for years. We note that modern campaigns hinge on creating and exploiting information advantage. The 2023 Department of Defense Strategy for Operations in the Information Environment makes the point explicitly: the Joint Force must be organized, trained, and resourced to integrate information effects alongside fires and maneuver (Department of Defense 2023).<\/p>\n\n\n\n<p>By cyber-militias I mean non-uniformed actors\u2014sometimes state-directed, often state-tolerated or \u201ccrowd-sourced\u201d who blend cyber actions with narrative warfare on social platforms. They recruit and radicalize; swarm, harass, and dox; seed deepfakes and conspiracies; and flood the zone with emotionally sticky memes. Their command and control is typically flat and improvisational; their logistics are cloud-based, and their operational tempo is set by platform algorithms and news cycles. We have seen the military effects of such formations in diverse theaters. The so-called Internet Research Agency (IRA) exemplified a state-linked influence militia that scaled persuasion attempts and offline mobilization through U.S. social platforms. Rigorous research has since complicated the maximalist claims about measurable attitude change, but the operational fact remains: adversaries can reach millions of targets, at negligible marginal cost, with tailored narratives synchronized to geopolitical aims (Eady et al. 2023).<\/p>\n\n\n\n<p>On the other end of the spectrum, the IT Army of Ukraine offers a case of defensive cyber-mobilization: a volunteer formation conducting DDoS, bug-hunting, and psychological operations in parallel with state efforts. This illustrates both the potency and the legal\/ethical ambiguities that arise when civilians become combatants in the information domain (Munk 2025).<\/p>\n\n\n\n<p>Terrorist organizations have long understood the leverage of social media. ISIS paired battlefield brutality with a meticulously engineered online propaganda machine, optimized for recruitment, intimidation, and agenda-setting across multiple languages and platforms. Peer-reviewed analyses detail how ISIS exploited platform affordances to sustain reach even as accounts were removed (Done 2022). The current flood of palestinian &#8220;claims of war theatre victory&#8221; are instructive.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Social Media Can Rival Physical Force<\/h2>\n\n\n\n<p>The simple answer is scale and speed. Computational propaganda leverages automation, amplification, and microtargeting to saturate feeds faster than fact-checking or deliberation can catch up. Systematic reviews now frame this as an evolving socio-technical ecosystem rather than a one-off tactic (Bradshaw and Howard 2019).<\/p>\n\n\n\n<p>Assymetry comes a close second. Bots and coordinated inauthentic behavior give small and individual operators outsized influence, particularly in the first minutes of a narrative\u2019s life cycle when early engagement signals can tip platform ranking systems. Studies show automated accounts disproportionately amplify low-credibility content at those critical early stages (Shao et al. 2018).<\/p>\n\n\n\n<p>Human terrain effects must be contemplated. Even when direct persuasion is modest, harms in conflict zones are VERY REAL. Doxing, stigmatization, displacement, and cultural desecration have all been linked to online incitement during armed conflict. This is not just \u201conline chatter\u201d; it is operational preparation of the environment with human consequences (Ulbricht 2024).<\/p>\n\n\n\n<p>Integration witrh kinetic operations is also an imperative ingredient. In Ukraine, Russian forces coupled physical systems (e.g., Orlan-10\/Leer-3) with mass text and social campaigns to trigger panic and erode cohesion. This serves as a reminder that \u201cinformation fires\u201d can bracket the battlespace as surely as artillery (GAO 2022).<\/p>\n\n\n\n<p>Memetic maneuver is a final consideration. In contemporary conflict, meme-based narratives are not mere ephemera. They are maneuver in the <strong>cognitive domain<\/strong>. Recent scholarship on memetic warfare in the Russia-Ukraine context argues that these artifacts structure attention, encode complex frames, and accelerate recruitment into \u201cparticipatory propaganda\u201d at scale (Prier 2017).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Note on Evidence and Caution<\/h2>\n\n\n\n<p>Brutal intellectual honesty must be front and center. A <em>Nature Communications<\/em> study linking U.S. Twitter feeds to survey data found no overly significant changes in respondents\u2019 attitudes or vote choice attributable to IRA exposure during 2016, however, we should neither ignore this nor overgeneralize from it. The study does not absolve adversary campaigns. It refines our theory of effect. Many operations seek agenda control, polarization, intimidation, and time-on-target distraction rather than simple vote-switching. In war, even small shifts in participation, risk perception, or unit morale can be decisive (Eady et al. 2023).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Imperative: Treat Adversarial Propaganda as a Campaign Target<\/h2>\n\n\n\n<p>NATO now frames \u201ccognitive warfare\u201d as a cross-domain challenge. The human mind is &#8220;contested terrain&#8221; where actors seek to modify perceptions and behavior (Claverie du Cluzel et al. 2021). That is not inflammatory rhetoric. It is operational reality in every theater that I have observed. Our response must leave the era of ad-hoc rebuttals and move toward integrated operations in the information environment (OIE) with explicit objectives, authorities, and measures of performance and effect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Intelligence and Warfighters Must Do<\/h3>\n\n\n\n<p><strong>1) Build a fused intelligence picture of the narrative battlespace.<\/strong><br>We need SOCMINT and OSINT cells that map not just \u201cwhat is trending,\u201d but also why. The network topologies, amplification pathways, and cross-platform migration patterns by which malign content metastasizes. Computational propaganda research offers a starting taxonomy; we must operationalize it into collection requirements and analytic standards (Bradshaw and Howard 2019).<\/p>\n\n\n\n<p><strong>2) Normalize OIE alongside fires and maneuver.<\/strong><br>Commanders should plan narrative lines of effort the way they plan suppression of enemy air defenses: with target systems, timing, sequencing, and joint enablers. The 2023 SOIE calls for exactly this, i.e., education, resourcing, and integration so that information effects are not an afterthought but embedded in campaign design (Department of Defense 2023).<\/p>\n\n\n\n<p><strong>3) Contest the initiative through pre-bunking and resilience, not just takedowns.<\/strong><br>Content moderation is necessary but insufficient. The strongest evidence for population-level resilience points to psychological inoculation. Brief interventions that teach people to spot manipulation techniques before exposure reaps oversized dividends. Large field experiments on YouTube and cross-platform studies show significant gains in users\u2019 ability to recognize manipulation, though effects attenuate without reinforcement (Roozenbeek et al. 2020; Maertens et al. 2021).<\/p>\n\n\n\n<p><strong>4) Impose friction on hostile cyber-militias.<\/strong><br>Joint and interagency teams should target the infrastructure of amplification (maning botnet C2, SIM farms, and payment rails for \u201cinfluence mercenaries.\u201d) Early-cycle disruption pays outsized dividends given bots\u2019 role in initial virality (Shao et al. 2018).<\/p>\n\n\n\n<p><strong>5) Clarify authorities and align with the law of armed conflict.<\/strong><br>Volunteer cyber formations raise attribution and status-of-combatant questions. Scholars have argued for pragmatic frameworks that harness civic energy while mitigating escalation and civilian-combatant blurring (Munk 2025).<\/p>\n\n\n\n<p><strong>6) Train for the cognitive domain.<\/strong><br>Treat cognitive security as tradecraft, not simply lip-service. This includes red-teaming our own narratives, pre-mission media terrain analysis, and SOPs for rumor control when adversaries seed panic. NATO-sponsored analyses emphasize that cognitive effects require skilled practitioners, clear objectives, and ethical guardrails (Claverie du Cluzel et al. 2021).<\/p>\n\n\n\n<p><strong>7) Measure what matters.<\/strong><br>Intelligence and warfighter analysts must avoid over-indexing on vanity metrics. We need to build dashboards around indicators, i.e., time to adversary saturation, percentage of priority audiences inoculated, and suppression of inauthentic behavior during the \u201cgolden hour.\u201d The ICRC\u2019s typology linking online dynamics to offline harm provides a framework (Ulbricht 2024).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Strategic Bottom Line<\/h2>\n\n\n\n<p>In conventional war, advantage is cumulative. Logistics, training, and combined arms competence pay off <em>BIGLY<\/em>. In the information fight, advantage is compounding. The side that gets inside the adversary\u2019s decision cycle sets the frame for everything that follows. Our adversaries are playing that compounding game. They field cyber-militias that operate at machine speed but speak in human idiom, exploiting platform incentives and cognitive biases that are as old as persuasion itself and as new as generative AI.<\/p>\n\n\n\n<p>As intelligence professionals and warfighters it is not merely to rebut lies after the damage is done. It is to DENY adversarial initiative in the information environment, to map and preempt their campaigns, to harden our populations, to integrate narrative effects with maneuver. Doing this all under the rule of law and democratic accountability will be a challenge. The I.C. and armed forces are not ignoring this, thankfully. The JF now names information as a core function, however, doctrine without resourcing and practice is just paper. We must build the teams, authorities, and habits to fight and win where people live now, in feeds and group chats as much as in physical space. If we fail, we cede the decisive ground of modern conflict to non-military adversaries who understand that primacy is no longer measured only in meters seized, but in minds held.<\/p>\n\n\n\n<p>A crucial recommendation is that counterintelligence is particularly well-suited to this mission. Counterintelligence tradecraft, long dedicated to identifying, deceiving, and neutralizing hostile influence operations, translates directly into the fight against cyber-militias. C.I. operators bring expertise in adversary attribution, double-agent operations, disinformation detection, and the manipulation of clandestine networks, which are precisely the skills needed to unmask coordinated inauthentic behavior online. I firmly believe that integrating C.I. into information warfare provides unique advantages. It blends technical signals analysis with human-source validation and can \u201cexploit, disrupt, or co-opt\u201d adversary influence operations in ways that exceed mere content moderation (Hunker 2010; Rid 2020). To leave cyber-militias solely to public diplomacy or platform governance is to fight with one arm tied. Incorporating counterintelligence into the core of our information campaigns ensures that the United States can not only defend against adversarial propaganda but actively contest and dismantle the networks that drive it.<\/p>\n\n\n\n<p>~ <a href=\"https:\/\/www.linkedin.com\/in\/constantinpoindexter?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_contact_details%3B%2BkZuvEinS%2BeFwGkKBld%2FXQ%3D%3D\" target=\"_blank\" rel=\"noopener\" title=\"C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA\/NCISS OSINT certification, DoD\/DoS BFFOC Certification\">C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA\/NCISS OSINT certification, DoD\/DoS BFFOC Certification<\/a><\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Bradshaw, Samantha, and Philip N. Howard. 2019. <em>The Global Disinformation Order: 2019 Global Inventory of Organised Social Media Manipulation<\/em>. Oxford: Oxford Internet Institute.<\/p>\n\n\n\n<p>Claverie du Cluzel, Fran\u00e7ois, et al. 2021. \u201cCognitive Warfare.\u201d NATO Allied Command Transformation, Innovation Hub. Norfolk, VA.<\/p>\n\n\n\n<p>Department of Defense. 2023. <em>Strategy for Operations in the Information Environment<\/em>. Washington, DC.<\/p>\n\n\n\n<p>Done, Alasdair. 2022. \u201cISIS Propaganda and Online Radicalization.\u201d <em>Journal of Strategic Security<\/em> 15 (3): 27\u201349.<\/p>\n\n\n\n<p>Eady, Gregory, Jonathan Nagler, Andrew Guess, Jan Zilinsky, and Joshua Tucker. 2023. \u201cExposure to the Russian Internet Research Agency Foreign Influence Campaign on Twitter in the 2016 U.S. Election and Its Relationship to Attitudes and Voting Behavior.\u201d <em>Nature Communications<\/em> 14 (1): 367.<\/p>\n\n\n\n<p>GAO (U.S. Government Accountability Office). 2022. <em>Information Environment: DOD Should Take Steps to Expand Its Assessments of Information Operations<\/em>. Washington, DC.<\/p>\n\n\n\n<p>Hunker, Jeffrey. 2010. \u201cCyber War and Cyber Power: Issues for NATO Doctrine.\u201d <em>NATO Defense College Research Paper<\/em>, no. 62. Rome: NATO Defense College.<\/p>\n\n\n\n<p>Maertens, Rakoen, Melisa Roozenbeek, Sander van der Linden, and Stephan Lewandowsky. 2021. \u201cLong-Term Effectiveness of Inoculation Against Misinformation: Three Longitudinal Experiments.\u201d <em>Journal of Experimental Psychology: Applied<\/em> 27 (1): 1\u201316.<\/p>\n\n\n\n<p>Munk, Tine. 2025. \u201cThe IT Army of Ukraine: Digital Civilian Resistance and International Law.\u201d <em>Crime, Law and Social Change<\/em> 83 (1): 55\u201374.<\/p>\n\n\n\n<p>Prier, Jarred. 2017. \u201cCommanding the Trend: Social Media as Information Warfare.\u201d <em>Strategic Studies Quarterly<\/em> 11 (4): 50\u201385.<\/p>\n\n\n\n<p>Rid, Thomas. 2020. <em>Active Measures: The Secret History of Disinformation and Political Warfare<\/em>. New York: Farrar, Straus and Giroux.<\/p>\n\n\n\n<p>Roozenbeek, Jon, Sander van der Linden, and others. 2020. \u201cFake News Game Confers Psychological Resistance Against Online Misinformation.\u201d <em>Palgrave Communications<\/em> 6 (1): 65.<\/p>\n\n\n\n<p>Shao, Chengcheng, Giovanni Luca Ciampaglia, Onur Varol, Alessandro Flammini, and Filippo Menczer. 2018. \u201cThe Spread of Low-Credibility Content by Social Bots.\u201d <em>Nature Communications<\/em> 9 (1): 4787.<\/p>\n\n\n\n<p>Ulbricht, Moritz. 2024. \u201cOnline Propaganda and Civilian Harm in Armed Conflicts.\u201d <em>International Review of the Red Cross<\/em> 106 (1): 67\u201394.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I came of age in an intelligence community that still treated the \u201cfront line\u201d as a place one could step onto, map, and secure. That world is gone. Today, non-military adversaries, loosely coordinated \u201ccyber-militias\u201d of propagandists, patriotic hackers, influence entrepreneurs, and paid or volunteer amplifiers contest the initiative not with armor or artillery, but by &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/constantinpoindexter.com\/blog\/cyber-militias-and-the-struggle-for-primacy-in-the-information-battlespace\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Cyber-Militias and the Struggle for Primacy in the Information Battlespace&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":472,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[85,40,180,76,179,178],"class_list":["post-470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-c-constantin-poindexter","tag-counterintelligence","tag-cyberwar","tag-intelligence","tag-warfare-and-cyber-militias","tag-warfighter"],"aioseo_notices":[],"rttpg_featured_image_url":{"full":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias.jpg",1280,1280,false],"landscape":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias.jpg",1280,1280,false],"portraits":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias.jpg",1280,1280,false],"thumbnail":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias-150x150.jpg",150,150,true],"medium":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias-300x300.jpg",300,300,true],"large":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias-1024x1024.jpg",525,525,true],"1536x1536":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias.jpg",1280,1280,false],"2048x2048":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias.jpg",1280,1280,false],"twentyseventeen-featured-image":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias-1280x1200.jpg",1280,1200,true],"twentyseventeen-thumbnail-avatar":["https:\/\/constantinpoindexter.com\/blog\/wp-content\/uploads\/2025\/08\/Warfare-and-Cyber-Militias-100x100.jpg",100,100,true]},"rttpg_author":{"display_name":"C. Constantin Poindexter","author_link":"https:\/\/constantinpoindexter.com\/blog\/author\/constantin-poindexter\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/constantinpoindexter.com\/blog\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","rttpg_excerpt":"I came of age in an intelligence community that still treated the \u201cfront line\u201d as a place one could step onto, map, and secure. That world is gone. Today, non-military adversaries, loosely coordinated \u201ccyber-militias\u201d of propagandists, patriotic hackers, influence entrepreneurs, and paid or volunteer amplifiers contest the initiative not with armor or artillery, but by&hellip;","_links":{"self":[{"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/posts\/470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/comments?post=470"}],"version-history":[{"count":3,"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/posts\/470\/revisions"}],"predecessor-version":[{"id":475,"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/posts\/470\/revisions\/475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/media\/472"}],"wp:attachment":[{"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/media?parent=470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/categories?post=470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/constantinpoindexter.com\/blog\/wp-json\/wp\/v2\/tags?post=470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}