Hybrid Communication Warfare and the Blurring of Boundaries
Chapter 1
Scroll, Click, Deceive: The New Normal
Jason Miller
Hey, everyone—welcome back to The Ubuntu Podcast Series. As always, I'm Jason Miller, and with me is Philippe Funk. So, Philippe, last episode we dove straight into this idea of digital mediation and staying human, but, honestly, I feel like that gets thrown into a blender the minute I open my phone these days.
Philippe Funk
Yeah, Jason, it gets messy fast. You scroll, see a news alert, next comes an “urgent” video, and then suddenly your airline app glitches out when you try to check in. Those moments—they look random, but, as we’re seeing more often, they can be touchpoints in much bigger strategies. A battlefield, just not the kind with visible soldiers.
Jason Miller
Exactly. Last month in Europe, one of those “shipping delay” rumors going viral—everywhere: WhatsApp groups, local news, even some “grassroots” hashtags. Seemed like garden-variety travel headaches. Then, turns out, digging a little deeper, it was part of a coordinated campaign, targeting port infrastructure—trying to freak people out, test responses, stress the system before anything dramatic even happened. Totally changed the way I looked at those feeds.
Philippe Funk
And that’s the point, isn’t it? In hybrid communication warfare, even that simple scroll is part of the front line. News, propaganda, commercial statements, actual glitches—they all bleed together. Our daily digital environment is so loaded, orientation itself becomes a challenge. Figuring out who’s talking to you, why, and with what agenda… it’s not always obvious. Actually, it’s almost never obvious anymore.
Chapter 2
Defining Hybrid Communication Warfare
Philippe Funk
Maybe we should pin down what “hybrid communication warfare” even means, because it’s a term that gets thrown around a lot. At the core: hybrid warfare’s about using military, political, economic, civilian, and informational tools all at once—right? But in the digital age, communication isn’t just a piece, it’s the hub, the main artery everything runs through.
Jason Miller
Exactly. It’s not just about hacking networks or shutting down websites. We’re talking cyber operations against infrastructure, coordinated influence campaigns, deepfakes, leaks, pushing disinformation—not just on official channels, but blending right into normal online life. And, crucially, pressure on private sector platforms too: cloud providers, social media giants, even your run-of-the-mill telecoms.
Philippe Funk
Think back to Crimea in 2014, if you want a stark example: Russia leveraged not only military moves but also flooded social channels—memes, “leaks,” fake grassroots activism. All synchronized. The same platform you share vacation photos on becomes an instrument of state policy, overnight. That’s hybrid communication warfare: no clean lines between legitimate civic, commercial, or military voices.
Jason Miller
And the same fiber optic cable bringing you Netflix is also carrying sensitive military comms, at the same moment, in the same stream. That overlap—it’s not just technical, it’s deeply political. Suddenly, figuring out where one domain stops and another starts is...kind of impossible.
Chapter 3
Dual-Use Dilemma: Shared Infrastructure
Jason Miller
That brings us to this “dual-use dilemma”—I always stumble on that term, but it’s at the root of why these battles get so confusing. Every system, every network, is both civilian and military now. Airports, ports, telecoms—if it’s critical, it’s a shared resource and a potential soft spot.
Philippe Funk
Yep. Let me share a story from closer to home. Luxembourg airport had this odd systems outage—a few years back now—initially chalked up to technical failure. Nothing too dramatic at first. But over time, analysis showed traces of a hybrid threat actor. They weren’t after passenger data or a quick ransomware payday. No, they were looking to map interdependencies. What supported both weekend holidaymakers and defense logistics? Turns out, a lot more than people thought. And adversaries noticed it first.
Jason Miller
Telecoms, satellites, cloud servers—none of them are purely commercial or purely state anymore. Even AI and data platforms, they’re run by private firms but fit right into defense planning. So, when an airport goes down, is it just annoying, or is it a warning? And who figures that out, fast enough?
Philippe Funk
And here’s the painful part: what looks like “just a network issue” can actually degrade both military readiness and public trust. We rarely see that coming until after the fact because the boundaries are so blurred. It’s by design, and it’s what makes response so messy—no clear lines, all shared targets.
Chapter 4
The Challenge of Orientation in the Cyber Fog
Philippe Funk
The cyber fog. Classic warfare—well, at least you saw tanks, uniforms, lines on maps. Here? Attribution, as we say, is murky. Was that outage at the hospital just a bug? Was it a criminal ring, or did a state-backed group slip in behind the noise?
Jason Miller
Yeah. And it rarely stops there. These campaigns are designed to hit across sectors: hospitals, media, logistics, defense, sometimes within the same few hours. What looks like isolated incidents—a “little” disinformation here, a new ransomware attack there—cumulates. The net effect? Societal fatigue, polarization, and confusion pile up till it feels like the system is coming apart at the seams.
Philippe Funk
That’s the real playbook, right? Not always about destruction, but overload—cognitive, institutional, collective. The NotPetya attack in 2017 is the extreme version: started out as “just” ransomware, but quickly became a global operation—media, transport, even shipping lines. Not a clear “bad guy” in sight, but a world left reeling and struggling to even assign blame, let alone fix things. Hybrid attackers know this: confusion is the real victory condition.
Jason Miller
It’s kind of sobering. We always want a simple story—good guys, bad guys, quick fix. But in this environment, distinguishing peace from conflict, an accidental outage from an attack, a citizen from a covert actor... it’s all part of the contest. Makes you think twice about every “random” glitch, doesn’t it?
Chapter 5
Civil and Commercial Frontline Realities
Jason Miller
Speaking of who’s on the front line, here’s an uncomfortable truth: most of the stuff that actually matters—energy grids, transport links, financial systems—it’s not in military hands. It’s run by private companies, for the most part.
Philippe Funk
Precisely. And the platforms shaping public debate—social media, chat apps, video streaming—they’re commercial too, not government. So, this creates a weird but necessary triangle: civil, military, and commercial actors all forced to cooperate, even if they don’t trust each other or share the same priorities.
Jason Miller
Reminds me of this panel in Brussels—platform execs sort of squirming when pressed about state cooperation. They admitted, point blank, that there’s a real tension: serve shareholders and users, or play a direct role in national security? No easy answer, lots of legal headaches—and meanwhile attackers don’t wait for legal process or committee meetings.
Philippe Funk
Exactly. And more: many of the real cyber defense experts, the ones catching the first whiff of a campaign, are in the private sector—maybe even working far outside any “official” security brief. But if coordination slows, gets bogged in bureaucracy or mistrust, the fog only thickens and response falls behind. That’s the paradox of the digital frontline now—it’s everywhere, but responsibility is scattered.
Chapter 6
Daily Life Inside Hybrid Warfare
Philippe Funk
It’s tempting to treat hybrid communication warfare as distant, exotic—just for intelligence geeks or defense ministries. But it shapes digital life for everyone. These aren’t edge cases, they’re our context, especially in regions like Eastern Europe, but honestly, it’s global now. Every one of us is on the frontline, whether we realize it or not.
Jason Miller
Yeah, and I think it’s really important to start seeing “random” issues—outages, weird trending stories, viral rumors—not just as isolated weirdness. There’s almost always a system, a pattern, at play. The more you look, the more you notice.
Philippe Funk
I try to teach this. Don’t just analyze the code, read the bigger picture—the digital “noise” is full of signals if you know what to look for. I’ll get, “Is this overthinking?” But more and more, it’s not. It’s about building the instincts to catch hybrid campaigns before they spiral. Platform transparency, resilience—they matter, and not just for security teams, but for anyone who lives through their phone, which is just about all of us.
Jason Miller
Right. We’re all unwitting participants, but also potential sentinels, if we choose to pay attention and ask—hey, is this too weird to be random?
Chapter 7
Learning to Orient in a Blurred Digital World
Jason Miller
So, here’s where we land. In a world where civil, commercial, and military lines are blurred by design, learning to make sense of the noise isn’t a luxury. It’s kind of survival, for institutions and for each of us. Demanding transparency, building resilience, but above all—teaching ourselves to read the signals critically. That’s what makes confusion such a potent weapon in hybrid warfare: it’s not just a side-effect, it’s often the whole point.
Philippe Funk
Absolutely. Clarity—cognitive clarity—has to be treated like a strategic resource now. That means pushing for openness, yes, but also building up our habits of questioning. If you work in tech or security, or just care about where things are headed, this is not abstract philosophy—it is daily maintenance. Look at recent hybrid campaigns in Eastern Europe: the playbook is ambiguity, ambiguity, and more ambiguity. Don’t give away your orientation cheaply.
Jason Miller
And with that, I think we’ll wrap it up for today. We covered a lot of fog but hopefully gave you a flashlight, or at least another question to ask, next time you see something weird online. Philippe, thanks for all the straight talk as always.
Philippe Funk
Thank you, Jason. Always a pleasure. And thanks to everyone listening—don’t drown in the blur, folks, lean in and ask questions. We’ll be back next time with more on navigating the digital wilds.
Jason Miller
Goodbye for now, everyone. Take care, stay curious, and keep scrolling... but maybe not too fast.
