Russian Political Warfare: Origin, Evolution, and Application

Total Page:16

File Type:pdf, Size:1020Kb

Russian Political Warfare: Origin, Evolution, and Application Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Russian political warfare: origin, evolution, and application Dickey, Jeffrey V. Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45838 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS RUSSIAN POLITICAL WARFARE: ORIGIN, EVOLUTION, AND APPLICATION by Jeffrey V. Dickey Thomas B. Everett Zane M. Galvach Matthew J. Mesko Anton V. Soltis June 2015 Thesis Advisor: Hy S. Rothstein Second Reader: Stephen J. Blank Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS RUSSIAN POLITICAL WARFARE: ORIGIN, EVOLUTION, AND APPLICATION 6. AUTHOR(S) Jeffrey V. Dickey, Thomas B. Everett, Zane M. Galvach, Matthew J.Mesko, Anton V.Soltis 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING N/A AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB Protocol number ____N/A____. 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited A 13. ABSTRACT (maximum 200 words) Russia’s annexation of the Crimean Peninsula in 2014 and subsequent activities in Eastern Ukraine are not isolated incidents, but rather a new form of hybrid war, or asymmetric warfare. They are part of a decades-long and continent- spanning Russian political warfare (PW) campaign. Analysis of the origin, history, and evolution of Soviet/Russian PW from 1917 through today reveals that Russia is using PW to assert regional dominance and challenge the unipolarity of the United States and the West. A review of events in Ukraine demonstrates Russia is using its latest evolution of PW doctrine, the Gerasimov Model, to achieve strategic objectives while remaining below the military response threshold of the international community. This paper combines an empirical and case study review of PW, with lessons from the Cold War, to propose a conceptual framework and a supporting model for foreign policy makers, planners, and practitioners to better understand PW. Furthermore, it recommends the United States adopt a proactive PW strategy to support national policy objectives and counter the PW activities of Russia and other rising powers. United States Special Operations Forces are well-suited for PW and will play a pivotal role in a U.S. PW strategy that encompasses all elements of national power and synchronizes the interagency community. 14. SUBJECT TERMS 15. NUMBER OF political warfare, unconventional warfare, asymmetric warfare, hybrid warfare, Russia, Russian PAGES Federation, Cold War, foreign policy, national strategy, Eastern Europe, Ukraine, Donbass, Crimea, 319 special operations, Gerasimov, Bezmenov, new generation warfare 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20. LIMITATION OF CLASSIFICATION OF CLASSIFICATION OF THIS CLASSIFICATION OF ABSTRACT REPORT PAGE ABSTRACT Unclassified Unclassified Unclassified UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 i THIS PAGE INTENTIONALLY LEFT BLANK ii Approved for public release; distribution is unlimited RUSSIAN POLITICAL WARFARE: ORIGIN, EVOLUTION, AND APPLICATION Zane M. Galvach Thomas B. Everett Major, United States Army Major, United States Army B.S., United States Military Academy, B.A., North Georgia College and State 2004 University, 2004 Matthew J. Mesko Jeffrey V. Dickey Major, United States Army Lieutenant, United States Navy B.S., Michigan Technological B.S., The Citadel, 2009 University, 2001 Anton V. Soltis Major, United States Army B.S., Clarkson University, 2003 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN DEFENSE ANALYSIS from the NAVAL POSTGRADUATE SCHOOL June 2015 Authors: Jeffrey Dickey, Thomas Everett, Zane Galvach, Matthew Mesko, Anton Soltis Approved by: Hy Rothstein Thesis Advisor Stephen Blank Second Reader John Arquilla Chair, Department of Defense Analysis iii THIS PAGE INTENTIONALLY LEFT BLANK ii ABSTRACT Russia’s annexation of the Crimean Peninsula in 2014 and subsequent activities in Eastern Ukraine are not isolated incidents, but rather a new form of hybrid war, or asymmetric warfare. They are part of a decades-long and continent-spanning Russian political warfare (PW) campaign. Analysis of the origin, history, and evolution of Soviet/ Russian PW from 1917 through today reveals that Russia is using PW to assert regional dominance and challenge the unipolarity of the United States and the West. A review of events in Ukraine demonstrates Russia is using its latest evolution of PW doctrine, the Gerasimov Model, to achieve strategic objectives while remaining below the military response threshold of the international community. This paper combines an empirical and case study review of PW, with lessons from the Cold War, to propose a conceptual framework and a supporting model for foreign policy makers, planners, and practitioners to better understand PW. Furthermore, it recommends the United States adopt a proactive PW strategy to support national policy objectives and counter the PW activities of Russia and other rising powers. United States Special Operations Forces are well-suited for PW and will play a pivotal role in a U.S. PW strategy that encompasses all elements of national power and synchronizes the interagency community. iii THIS PAGE INTENTIONALLY LEFT BLANK iv TABLE OF CONTENTS I. INTRODUCTION: RUSSIAN POLITICAL WARFARE.......................................1 A. PROBLEM STATEMENT AND BACKGROUND .....................................1 B. PURPOSE .........................................................................................................2 1. Research Question: How can the United States use United States Special Operations Forces (USSOF) to Counter Russian- Sponsored Political Warfare? .............................................................2 2. Primary Hypothesis .............................................................................2 3. Supporting Hypotheses ........................................................................2 4. Methodology .........................................................................................3 a. Supporting Hypothesis 1 ...........................................................3 b. Supporting Hypothesis 2 ...........................................................3 c. Supporting Hypothesis 3 ...........................................................4 d. Supporting Hypothesis 4 ...........................................................4 e. Supporting Hypothesis 5 ...........................................................4 f. Primary Hypothesis ...................................................................5 II. POLITICAL WARFARE: ORIGINS AND IMPLEMENTATION .......................7 A. POLITICAL WARFARE DEFINED ............................................................9 B. POLITICAL WARFARE TODAY ..............................................................16 1. Russia ..................................................................................................16 2. China ...................................................................................................18 3. Iran ......................................................................................................19 4. Terrorist/ Non-State Actors (NSAs) .................................................20 C. CASE STUDY: THE COMMUNIST TAKEOVER OF EASTERN EUROPE .........................................................................................................21 1. Historical Background.......................................................................22 2. Infrastructure Development .............................................................24 3. Destabilization ....................................................................................26 4. Crisis....................................................................................................28 5. Consolidation ......................................................................................28 6. Conclusion ..........................................................................................28 D. CASE STUDY: THE COMMUNIST TAKE OVER OF CZECHOSLOVAKIA 1921-1948 ................................................................29 1. Infrastructure Development:
Recommended publications
  • The Brezhnev Era (1964–1982)
    Name _______________________________________________ Date _____________ The Brezhnev Era (1964–1982) Next to Stalin, Leonid Brezhnev ruled the Soviet Union longer than any other leader. Brezhnev and his supporters stressed the ties with the Stalinist era by focusing on his good points and ignoring his crimes. 1. What is the KGB? Brezhnev strengthened the Soviet bureaucracy as well What was its as the KGB (Committee of State Security)—formed in purpose? (list 2) 1954; its mission was to defend the Soviet government from its enemies at home and abroad. The KGB suppressed dissidents who spoke out against the government at home and in the satellite countries. The Soviets also invested in a large military buildup and were determined to never again suffer a humiliating defeat, as happened in the Cuban Missile Crisis. Yet Brezhnev proceeded cautiously in the mid-1960s and sought to avoid confrontation with the West. He was determined, however, to protect Soviet interests. Brezhnev Doctrine (1968) 2. What was the Prague In 1968, Alexander Dubček (1921–1992) became head of the Czechoslovakia Spring? Communist Party and began a series of reforms known as the Prague Spring reforms, which sought to make communism more humanistic. He lifted censorship, permitted non-communists to form political groups, and wanted to trade with the West, but still remain true to communist ideals. Brezhnev viewed these reforms as a capitalistic threat to the socialist ideologies of communism and, in August of 1968, sent over 500,000 Soviet and Eastern European troops 3. How did Brezhnev to occupy Czechoslovakia. In the Brezhnev Doctrine, he defended the Soviet react to the Prague military invasion of Czechoslovakia, saying in effect, that antisocialist elements Spring? in a single socialist country can compromise the entire socialist system, and thus other socialist countries have the right to intervene militarily if they see the need to do so.
    [Show full text]
  • Allen W. Dulles and the CIA
    THE GILDED AGE Allen W. Dulles and the CIA Allen W. Dulles spent his tenure as the Director of Central Intelligence (DCI) entrenched in secret power struggles that would ensure his ultimate power over the foreign and domestic aff airs for the United States. Th roughout his childhood, Dulles learned to use political power in order to get ahead, and to use secrecy to make unilateral deci- sions. Aft er analyzing examples of his treatment of various foreign aff airs disasters, as well as his manipulation of American media and politicians, Dulles is exposed as a man whose legacy lives in the CIA, as a legendary fi gure who is in fact much more of a craft ed legend than a man of truth. By Sada O. Stewart ‘16 Princeton University of the CIA’s own making, the product of the publicity and the political propaganda Allen Dulles manufactured in the 1950s.”4 How, though, did Dulles craft a fl awless, genius im- age for the CIA? What methods did Dulles use to manipulate the press, the public, and even the other branches of govern- ment to bring forth an agency with “a great reputation and a terrible record?”5 Dulles made the CIA seem like an elite agency full of top agents resulting in high risk, high reward missions—how is this reconciled with the reality of the CIA under Dulles’ reign? INTELLIGENCE IN YOUTH To begin, it is vital to identify the signifi cance of developing and running an intelligence agency in an open democratic system.6 Sun Tzu, author of Th e Art of War, insists the best A Bas-relief of Allen Dulles at the Original Headquarters of (only) way to fi ght a war is to know the enemy.
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Transformación Del Significado Del Feminismo. Análisis Del Discurso
    Transformación del Significado del Feminismo. Análisis del Discurso Presente en la Marcha del 8 de marzo del 2020 en la Ciudad de Quito Fátima C. Holguín Herrera Facultad de Comunicación Lingüística y Literatura Pontificia Universidad Católica del Ecuador Trabajo de Titulación previo a la Obtención del Título de Licenciado(a) en Comunicación con Mención en Periodismo para Radio Prensa y Televisión Bajo la dirección de Dr. Fernando Albán Quito, Ecuador, 2020 1 2 Resumen En el presente trabajo se usa el análisis del discurso, como herramienta de investigación para examinar el discurso presentado en la marcha del ocho de marzo del dos mil veinte. El mismo que tienen que ver un concepto de emancipación ¿qué conlleva este concepto de emancipación? Supone que hay un estado de opresión, subordinación del cual debemos liberarnos, es justamente de este concepto que hace uso, en este caso, el feminismo, aquí analizado; toma la noción de emancipación del sistema opresor que oprimiría a las mujeres, incluso a los hombres, por lo que hay que liberarse de este sistema denominado patriarcado el que estaría inherentemente anclado al neoliberalismo, capitalismo como se menciona. Palabras clave: feminismo, marxismo, ideología, patriarcado, genero, opresión, violencia. 3 Tabla de Contenido INTRODUCCIÓN .................................................................................................................... 6 METODOLOGÍA ..................................................................................................................... 8 EL PROBLEMA
    [Show full text]
  • What Is Counterintelligence? and How Lessons on Counterintelligence Might Enrich Their Courses
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com , E-mail: [email protected] Volume 20 • Number 2 • $15 single copy price Fall/Winter 2013 ©2013, AFIO measure what an adversary knows about us? How do we determine whether or not we are successful in keeping our secrets and projecting the image we wish Guide to the Study of Intelligence to project? How do we know what and whom to trust?3 This article is a short cut to some basic concepts about counterintelligence: what it is and is not. Educa- tors in history, government, political science, ethics, law and cognitive psychology should consider whether What is Counterintelligence? and how lessons on counterintelligence might enrich their courses. Recommended additional readings are suggested in the footnotes. A Guide to Thinking A general introductory course on U.S. counter- and Teaching about CI intelligence should have five key learning objectives: Understanding the meaning of counterintelli- gence, its place within intelligence studies, and by Michelle K. Van Cleave its role in international relations as an instrument of statecraft.4 Understanding the difference between tactical WHY STUDY COUNTERINTELLIGENCE? and strategic CI,5 the difference between CI and security,6 and the range of foreign intelligence he study of “counterintelligence” is rare in aca- 3. Consider for example the deception paradox: “Alertness to demia. While modern courses on international deception presumably prompts a more careful and systematic relations often include intelligence, they usually review of the evidence.
    [Show full text]
  • The Psychological Impact of Child Soldiering
    Chapter 14 The Psychological Impact of Child Soldiering Elisabeth Schauer and Thomas Elbert Abstract With almost 80% of the fighting forces composed of child soldiers, this is one characterization of the ‘new wars,’ which constitute the dominant form of violent conflict that has emerged only over the last few decades. The development of light weapons, such as automatic guns suitable for children, was an obvious pre- requisite for the involvement of children in modern conflicts that typically involve irregular forces, that target mostly civilians, and that are justified by identities, although the economic interests of foreign countries and exiled communities are usually the driving force. Motivations for child recruitment include children’s limited ability to assess risks, feelings of invulnerability, and shortsightedness. Child soldiers are more often killed or injured than adult soldiers on the front line. They are less costly for the respective group or organization than adult recruits, because they receive fewer resources, including less and smaller weapons and equipment. From a different per- spective, becoming a fighter may seem an attractive possibility for children and adolescents who are facing poverty, starvation, unemployment, and ethnic or polit- ical persecution. In our interviews, former child soldiers and commanders alike reported that children are more malleable and adaptable. Thus, they are easier to indoctrinate, as their moral development is not yet completed and they tend to listen to authorities without questioning them. Child soldiers are raised in an environment of severe violence, experience it, and subsequently often commit cruelties and atrocities of the worst kind. This repeated exposure to chronic and traumatic stress during development leaves the children with mental and related physical ill-health, notably PTSD and severe personality E.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
    Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD.
    [Show full text]
  • ON the EFFECTIVE USE of PROXY WARFARE by Andrew Lewis Peek Baltimore, Maryland May 2021 © 2021 Andrew Peek All Rights Reserved
    ON THE EFFECTIVE USE OF PROXY WARFARE by Andrew Lewis Peek A dissertation submitted to Johns Hopkins University in conformity with the requirements for the degree of Doctor of Philosophy Baltimore, Maryland May 2021 2021 Andrew Peek All rights reserved Abstract This dissertation asks a simple question: how are states most effectively conducting proxy warfare in the modern international system? It answers this question by conducting a comparative study of the sponsorship of proxy forces. It uses process tracing to examine five cases of proxy warfare and predicts that the differentiation in support for each proxy impacts their utility. In particular, it proposes that increasing the principal-agent distance between sponsors and proxies might correlate with strategic effectiveness. That is, the less directly a proxy is supported and controlled by a sponsor, the more effective the proxy becomes. Strategic effectiveness here is conceptualized as consisting of two key parts: a proxy’s operational capability and a sponsor’s plausible deniability. These should be in inverse relation to each other: the greater and more overt a sponsor’s support is to a proxy, the more capable – better armed, better trained – its proxies should be on the battlefield. However, this close support to such proxies should also make the sponsor’s influence less deniable, and thus incur strategic costs against both it and the proxy. These costs primarily consist of external balancing by rival states, the same way such states would balance against conventional aggression. Conversely, the more deniable such support is – the more indirect and less overt – the less balancing occurs.
    [Show full text]
  • Wh Owat Ches the Wat Chmen
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Seeking Justice for Pavel Sheremet
    July 20, 2017 IN BRIEF One Year Later: Seeking Justice for Pavel Sheremet Concerning Trends for Press Freedom in Ukraine When investigative journalist Pavel Sheremet died in a car explosion in central Kyiv on July 20, 2016, his assassination garnered global media attention. Upon learning the tragic news, then- OSCE Representative on Freedom of the Media Dunja Mijatović condemned the murder, saying, “This killing and its circumstances must be swiftly and thoroughly investigated, and the 1 perpetrators brought to justice.” However, one year later, virtually no progress has been made on his case. Furthermore, the An internationally acclaimed journalist, Pavel Sheremet received the International escalating harassment and attacks against jour- Press Freedom Award from the Committee nalists in Ukraine, coupled with a culture of im- to Protect Journalists in 1998, and the punity for perpetrators, is worrisome for OSCE’s Prize for Journalism and Democracy Ukraine’s democratic future. To ensure they in recognition of his human rights reporting meet the aspirations of the Ukrainian people, in the Balkans and Afghanistan in 2002. (Photo credit: Okras) authorities in Kiev must reaffirm their com- mitment to freedom of the press by ensuring the perpetrators of Sheremet’s murder—and left Russia—again as a result of mounting hos- similar cases of killing, assault, and harass- tility from the host regime he criticized—and ment—are brought to justice. moved to Kyiv. At the time of his death, Shemeret had lived in Kyiv for five years with Investigative Journalist and Outspoken Critic Ukrainska Pravda editor-in-chief Olena Prytula. A regular contributor to popular news site Ukrainska Pravda, Sheremet was known for In 2000, Sheremet’s cameraman, Dmitry Zavad- challenging the authorities in his home country sky, disappeared in Minsk after shooting a doc- of Belarus as well as in his adopted homes of umentary about the war in Chechnya.
    [Show full text]