Sharp Power – the New Technology of Influence in a Global World

5443
DOI: 10.20542/0131-2227-2019-63-2-21-28

O. Leonova (politolga@gmail.com),
Lomonosov Moscow State University, build. 13/14, 1, Leninskie gory, Moscow 119992, Russian Federation

Abstract. The “sharp power” is a new phenomenon of gaining influence in international politics in the era when information has become a weapon, a combination of information influence operations and methods of cyber-terrorism. J. Nye regards the “sharp power” as usage of falsified information for hostile purposes. It encompasses manipulation of information, formation of falsified content of the information flow, conduct of information operations and implementation of information projects. By diverting the audience’s attention and using manipulation technologies the “sharp power” promotes certain values, ideas and phobias to the outside world. Its purpose is interference in domestic political processes of the targeted country, violation of its stability and threatening its national security by influencing public consciousness and behavior of people. The subjects of the “sharp power” do not seek to “win hearts and minds” as those of the “soft power” do, but try to penetrate into and subjugate the political and media spheres of other countries by conducting information operations. The “sharp power” technologies include hacking into personal e-mail and theft of electronic correspondence, falsification of information flow, introduction of malicious software, defacing of websites, destruction of network services and the main computer networks. They are mainly associated with misinformation, fake news and manipulation of information; use the advantages of information openness of cyberspace and are virtually invulnerable – it is difficult to detect them and to identify the mechanism of their action. The “sharp power” has the following quality characteristics: high speed of transactions, their low cost, timing, clear strategy and tactics, flexibility, agility and efficiency. The efficiency factors of the “sharp power” are the openness of cyberspace, camouflage of their purposes, state control and state support of information operations. In conditions when any country can become a victim of the “sharp power”, and its technology represents a threat to the security of the world community, only common efforts of all interested parties and their joint action can tackle the problem and confront cyber threats. The article also reveals the western audience’s perception of the features of “sharp power” in China, Russia and Iran. In conclusion, the author formulates the possible measures and problem solutions. 

Keywords: soft power, smart power, intelligent power, sharp power, influence technologies, information operations, cyberspace, China, Russia, Iran


REFERENCES

1. Walker Ch., Ludwig J. The Meaning of Sharp Power. How Authoritarian States Project Influence. Foreign Affairs, 2017, November 16. Available at: https://www.foreignaffairs.com/articles/china/2017-11-16/meaning-sharp-power?cid=nlc-fa_fatoday-20171221 (accessed 02.12.2017).

2. Nye J.S., Jr. Soft Power. The Means to Success in World Politics. New York, Public Affairs, 2004. 192 p.

3. Nye J.S., Jr. The Future of Power. New York, Public Affairs, 2011. 320 p.

4. Stoletov O.V. Strategiya “razumnoi sily” v politike global’nogo liderstva. Diss. kand. polit. nauk. [The Strategy of “Reasonable Power” in the Policy of Global Leadership. Cand. Diss. (Polit.)]. Moscow, 2014. 152 p.

5. Kurlantzick J. Charm Offensive: How China’s Soft Power Is Transforming the World. Yale University Press, 2007. 306 p.

6. Nye J.S. Jr. How Sharp Power Threatens Soft Power. The Right and Wrong Ways to Respond to Authoritarian Influence. Foreign Affairs, 2018, January 24, Available at: https://www.foreignaffairs.com/articles/china/2018-01-24/how-sharp-power-threatens-soft-power?cid=nlc-fa_fatoday-20180124 (accessed 29.01.2018).

7. Serena C.C., Clarke C.P. America’s Cyber Security Dilemma – and a Way Out (2016). Available at: https://www.rand.org/blog/2016/12/americas-cyber-security-dilemma-and-a-way-out.html (accessed 12.01.2018).

8. Libicki M. C. Checklist for a U.S. – Russia Cyberwar (2016). Available at: https://www.rand.org/blog/2016/10/checklist-for-a-us-russia-cyberwar.html (accessed 14.01.2018).

9. McClintock B. Russian Information Warfare: A Reality That Needs a Response (2017). Available at: https://www.rand.org/ blog/2017/07/russian-information-warfare-a-reality-that-needs-a.html (accessed 16.01.2018).

10. Wiener M., Wiener C. Cybersecurity Threats: How Vulnerable Is the United States? Annual Lecture on Science and Technology (2017). Available at: https://www.cfr.org/event/cybersecurity-threats-how-vulnerable-united-states (accessed 29.12.2017).

11. Kania E. B. Artificial Intelligence and Chinese Power. Beijing’s Push for a Smart Military and How to Respond. Foreign Affairs, 2017, December 5. Available at: https://www.foreignaffairs.com/articles/china/2017-12-05/artificial-intelligence-and-chinese-power (accessed 20.02.2018).

12. Fominykh A. Nastuplenie s ulybkoi: kak “myagkoe vliyanie” Kitaya preobrazhaet mir [Coming with a Smile: How China’s “Soft Influence” Transforms the World]. Problemy Dal’nego Vostoka, 2009, no. 3, pp. 175-178.

13. Report Watch Vol. VI: Tracking Digital and Cyber Scholarship So You Don’t Have To (2018). Available at: https://www.cfr.org/blog/report-watch-vol-vi-tracking-digital-and-cyber-scholarship-so-you-dont-have (accessed 25.05.2018).

14. Deibert R. Social Media, Inc.: The Global Politics of Big Data. World Politics Review, 19.06.2012. Available at: https://www.worldpoliticsreview.com/articles/12065/social-media-inc-the-global-politics-of-big-data (accessed 21.06.2018).

15. Countering Russian Information Operations in the Age of Social Media (2017). Available at: https://www.cfr.org/report/countering-russian-information-operations-age-social-media (accessed 26.12.2017).

16.Parasiliti A. Were Russian Hacks Really a Threat to American Democracy? (2016). Available at: https://www.rand.org/pubs/research_reports/RR2081.html (accessed 20.02.18).

17.Courtney W., Libicki M. C. How to Counter Putin’s Subversive War on the West (2016). Available at: https://www.rand.org/blog/2016/08/how-to-counter-putins-subversive-war-on-the-west.html (accessed 12.01.2018).

18.Knake R. K. Iran: Keep Your Finger Off the Cyber Button. Available at: https://www.cfr.org/blog/iran-keep-your-finger-cyber-button (accessed 19.05.2018).

19.Davis II J.S., Boudreaux B.A., Welburn J.W., Aguirre J., Ogletree C., McGovern G., Chase M.S., eds. Stateless Attribution. Toward International Accountability in Cyberspace. Santa Monica, Calif. Published by the RAND Corporation, 2017. 57 p.

20. The Hacked Elections, Online Influence Operations, and the Threat to Democracy symposium. December 6, (2017). (The transcript of the Symposium). Available at: https://www.cfr.org/hacked-elections-online-influence-operations-and-threat-democracy (accessed 25.12.2017).


Registered in System SCIENCE INDEX

For citation:
Leonova O. Sharp Power – the New Technology of Influence in a Global World. World Eñonomy and International Relations, 2019, vol. 63, no. 2, pp. 21-28. https://doi.org/10.20542/0131-2227-2019-63-2-21-28



Comments (0)

No comments

Add comment







Indexed

 

 

 

 

Dear authors! Please note that in the VAK List of peer-reviewed scientific journals, in which the main scientific results of dissertations for the degree of candidate and doctor of sciences should be published for the “MEMO Journal” the following specialties are recorded:
economic sciences:
5.2.5. World Economy.
5.2.1. Economic Theory
5.2.3. Regional and Branch Economics
political sciences:
5.5.4. International Relations
5.5.1. History and Theory of Politics
5.5.2. Political Institutions, Processes, Technologies

 

Current Issue
2025, vol. 69, No. 2
Topical Themes of the Issue:
  • Battle of Titans: Structural Shifts in MNCs Global Production
  • Features of Collective Securitization in the European Union
  • Terrorist Networks of the “Global Jihad” in the 2020s
  • At Post-Soviet Space
Announcement

Dear authors of the journal!

Please note that the author's copies of the issues in which your texts are published are kept in the editorial office for no more than one year. After this period expires, the editorial office has the right to dispose of unclaimed copies at its own discretion.

 

Submit an Article
INVITATION FOR PUBLICATION
The Editorial Board invites authors to write analytical articles on the following topics:
  • changes in the processes of globalization in modern conditions
  • formation of the new world order
  • shifts in civilization at the stage of transition to a digital society

The editors are also interested in publishing synthesis articles / scientific reviews revealing the main trends in the development of certain regions of the world - Latin America, Africa, South Asia, etc.