Producing Fear in the Enemy's Mind

Total Page:16

File Type:pdf, Size:1020Kb

Producing Fear in the Enemy's Mind Producing Fear in the Enemy’s Mind HOW TO ADAPT COLD WAR DETERRENCE FOR GRAY-ZONE AGGRESSION Elisabeth Braw MARCH 2021 AMERICAN ENTERPRISE INSTITUTE Executive Summary eterrence is an instinctive part of shared war or whether one would not have erupted anyway, D existence, whether among individuals, groups, the world emerged from the Cold War without a or nations. It convinces adversaries not to engage direct confrontation between the two blocs. in aggressive acts they may otherwise have viewed Gray-zone aggression directed at liberal democra- as beneficial. Locks, burglar alarms, and signs warn- cies is growing and morphing, which makes it impera- ing of biting dogs, for example, form a basic form tive for these countries to establish effective deterrence. of deterrence, designed to convince prospective As deterrence is primarily about psychology, not the intruders that burglarizing a particular property tools used, liberal democracies can build on the deter- would be unwise. rence strategy developed during the Cold War. During the Cold War, nuclear arsenals’ destructive Because deterrence works only if it is credible, the power made deterrence theory a central component deterrents used should not be primarily of a military of national security strategy. Although it is impossible nature. Instead, effective deterrence must involve all to prove whether this strategy prevented a devastating parts of society. i Producing Fear in the Enemy’s Mind HOW TO ADAPT COLD WAR DETERRENCE FOR GRAY-ZONE AGGRESSION Elisabeth Braw The reason Westminster Abbey has a hawk is not for it to eat pigeons that get into the abbey. The hawk is there to make the pigeons think it will eat them.1 —Westminster Abbey choirboy The person who best described the essence of deter- a function of grand or national strategy. It is a gen- rence did so in one sentence—and he is a fictional char- eral reputation, generated over time by a posture acter. “Deterrence is the art of producing in the mind of (and visible actions) that portrays an image of credi- the enemy the fear to attack,” Dr. Strangelove says in bility and resilience regarding any hostile intent. This Stanley Kubrick’s eponymous 1964 masterpiece.2 The reputation is built by how adversaries interpret that word stems from the Latin verb deterrere, which means posture. It is essential to understand that posture is to discourage from, avert, or frighten away. Deterrence, not the same as reputation. Any actor may choose its in other words, rests on psychology. posture, but cannot choose their reputation; that is This report, adapted from my upcoming book The for other actors to decide based upon their percep- Defender’s Dilemma: Deterring Gray-Zone Aggression, tion and interpretation of that posture.4 discusses existing forms of deterrence and how these could be adapted for gray-zone aggression. Under- General deterrence comprises deterrence by standing the nature of deterrence is vital for liberal denial and punishment, which a country can opt democracies to at least partially curtail this growing to use in different proportions when designing its form of aggression directed against them. deterrence posture. In practice, deterrence by denial consists of resilience and entanglement. It is vital to, in particular, understand the value of resilience, Forms of Deterrence indisputably the less glamorous part of deterrence and one that has long been treated as an after- Dr. Strangelove has considerable nonfictional deter- thought. Despite this neglected position, deterrence rence company. The US Department of Defense by resilience can significantly change the attacker’s describes deterrence as “the prevention of action cost-benefit calculus. by the existence of a credible threat of unacceptable In addition to general deterrence—the posture counteraction and/or belief that the cost of action out- with which a country communicates its standing weighs the perceived benefits.”3 The UK Ministry of and national security approach to other countries— Defence’s Development, Concepts and Doctrine Cen- countries maintain tailored deterrence, character- tre (DCDC), in turn, defines general deterrence as ized by DCDC as “the term used to describe specific 1 PRODUCING FEAR IN THE ENEMY’S MIND ELISABETH BRAW deterrence messages and responses for specific audi- makers will hesitate to threaten their use—let alone ences and adversaries.”5 Through targeted deterrence, use them for anything other than extremely serious countries can communicate differently to the respec- incidents—lest the tools lose power. tive recipients. During the Cold War, for example, the DCDC describes extended deterrence as United States used different tailored deterrence for the Soviet Union and Vietcong. The UK government usually taken to mean a more capable actor conduct- displayed one form of targeted deterrence vis-à-vis ing deterrence on the part of a (usually allied) actor the Warsaw Pact and another against the Irish Repub- who lacks capability or capacity. Extended deter- lican Army. rence is adversary focused, stating a commitment A third expression is immediate deterrence, the to punish the adversary for attacks on the ally. For form perhaps most commonly discussed in the pub- example, NATO’s operations and forward presence lic debate. After the SolarWinds hack against the on its eastern periphery can be viewed as a policy of United States, which came to light in December 2020 extended deterrence against external threats to the and that the US government subsequently labeled national integrity of the Baltic states.8 a Russian intelligence operation, the public debate demanded the United States respond to “deter” the Extended deterrence in the nuclear age has meant attacker, by which the discussants meant “retali- that nearly all European countries’ deterrence pos- ate.”6 Although deterrence takes place before an act tures have at some point featured nuclear weap- of aggression, retaliation can be used to try to deter ons even though most of them possessed none. future attacks. The form of deterrence closest to such West Germany, for example, had significant num- incident response is immediate deterrence, defined bers of Bundeswehr soldiers stationed along the by DCDC as including intra-German border and was backed up by allied troops stationed in West Germany, but its ultimate actions to enhance denial capabilities, as well as mak- deterrent remained the US nuclear umbrella. It was ing them more credible. In this type of deterrence therefore not surprising that, in the late 1970s, West activity, imposition-of-costs is the principal means of German Chancellor Helmut Schmidt strongly advo- influence.Denial-of -benefits may also work, but their cated bringing US nuclear weapons to West Ger- provisions will usually have to be in place already.7 many in response to the Soviet Union stationing SS-20 nuclear missiles in East Germany. Immediate deterrence, therefore, cannot be impro- That makes extended deterrence the nation-state vised in case of an attack and certainly cannot be suc- equivalent of the schoolyard conversation in which cessful without comprehensive general and tailored one child argues with another then resorts to the deterrence already in place. It is also important to argument that “my dad is stronger than yours,” remember that unlike traditional displays of military whereupon the second child counters with the same strength, certain forms of retaliation lose clout as soon argument. Having failed to determine whose dad is as they are used. This is the case with cyber weapons, stronger, the two retreat to their respective corners which begin figuratively rusting with their first use. with neither having the courage to strike the first The originators—thought to be Israel and the United blow lest they find out. By definition, extended deter- States—of Stuxnet, the computer virus that in 2010 rence is more vital to countries benefiting from the destroyed uranium enrichment centrifuges at Natanz extension than to the countries providing it. to stall Iran’s nuclear program, paid such a price. More importantly, the posture must convince Because the attack involved showing the weapon, the adversary, which means both the receiving and Iran got a chance to examine it. The weapon became extending countries’ populations have to support virtually useless. This often fleeting nature of newer the deterrence. Gen. Riho Terras, who was until 2018 tools of retaliation influences deterrence, as decision Estonia’s chief of defense, explained that 2 PRODUCING FEAR IN THE ENEMY’S MIND ELISABETH BRAW a British or German taxi driver, not to mention ordi- Long before the nuclear age, leaders followed nary Americans, need to believe that Estonia is worth Hermocrates’s commonsense insight. No king, gen- defending. That’s very difficult. How can you make eral, or other leader of any age would state that he them believe it’s important? If we don’t have that entered an armed conflict on his own volition even support by the public, it affects deterrence. That’s though doing so was certain to harm his side. Just why Estonia sends soldiers to serve with the French as no burglar would enter a house if he knew a pack in Mali.9 of bulldogs would thwart his work or harm him, no leader would attack a rival group or country if he By providing troops to Mali and Afghanistan and for were certain of defeat. This basic principle is referred other international missions, Estonia demonstrates to in deterrence theory as rational choice theory, it is a valuable ally. That makes it easier for deci- a term borrowed from the rational actor thinking sion makers in the countries extending deterrence in economics. to commit troops and resources to Estonia. If, how- Not all actors, however, pursue what their adver- ever, an adversary assumes the public will disprove saries and perhaps outside observers would consider of major support for an ally during a crisis, extended the rational choice.
Recommended publications
  • Stories, Style & Radicalization
    Stories, Style & Radicalization A Cultural and Narrative Criminological Study of Jihadi Propaganda Magazines Hans Myhre Sunde Master’s Thesis in Criminology Faculty of Law Department of Criminology and Sociology of Law UNIVERSITY OF OSLO May 22 nd 2017 ii Stories, Style & Radicalization A Cultural and Narrative Criminological Study of Jihadi Propaganda Magazines iii © Hans Myhre Sunde 2017 Stories, Style & Radicalization: A Cultural and Narrative Criminological Study of Jihadi Propaganda Magazines Hans Myhre Sunde www.duo.uio.no . Printed: Grafisk Senter, Oslo, www.grafiske.as iv ABSTRACT Title: Stories, Style & Radicalization : A Cultural and Narrative Criminological Study of Jihadi Propaganda Magazines Author: Hans Myhre Sunde Supervisor: Sveinung Sandberg Department of Criminology and Sociology of Law Faculty of Law University of Oslo Spring 2017 Stories, style and radicalization are all tired together in an intricate and complex relationship constructed within the jihadi terrorist subculture. This study is an in-depth inquiry into the jihadi propaganda magazines Inspire, Dabiq and Rumiyah that aim to highlight this relationship . The full catalogue of magazines produced, at the time, have been analysed under the scope of cultural and narrative criminology. In total 2001 pages distributed over 32 editions have been analysed using qualitative document analysis. By drawing upon frameworks of narrative and cultural criminology, this study aims to identify and present what is characteristic for jihadi narratives and subcultural style, and how they can function in radicalization. Narrative criminological research operates with stories as their main data, and view them as constitutive of crime. The stories people tell, shape their lives and constitute future behaviour. The narratives told can instigate, sustain or leave crime behind.
    [Show full text]
  • Reserve Forces Review 2030 Unlocking the Reserves’ Potential to Strengthen a Resilient and Global Britain
    Reserve Forces Review 2030 Unlocking the reserves’ potential to strengthen a resilient and global Britain May 2021 Contents Executive summary 7 Reserve Forces Review 2030 recommendations 11 Chapter 1 – Context and the imperative for change 15 Chapter 2 – Redefining the relationship between the reserves and society 25 Chapter 3 – Expanding the role of the reserves 43 Chapter 4 – Unlocking the potential of reservists 55 Chapter 5 – Transforming support to the reserves 73 Engagement log 88 Glossary 102 Reserve Forces Review 2030 3 4 Reserve Forces Review 2030 Foreword Brigadier The Rt Hon The Lord Lancaster TD VR When the Chief of the Defence Staff asked me to chair an independent review into the reserve forces, I leapt at the opportunity. For over 32 years, the Army Reserve has been an integral part of my life and perhaps the one constant of my adult years. Like many fellow reservists, my service has been part of a fairly consistent juggling act between the competing demands of a hectic professional career, private life and soldiering. In writing this foreword I recognise that so much has changed. Rather than looking ‘down and in’ at the use of The reserves have evolved from almost entirely reserves by the single services, we have been contingent forces – that trained at weekends tasked with looking ‘up and out’. and annual camps, recruited locally, and were At its heart, this Reserve Forces Review 2030 encapsulated by names such as ‘Territorial (RF30) is about people and skills, and how Army’ and ‘Royal Auxiliary Air Force’ – to the Defence, industry, government and wider reserve forces we have today across all three society can share them.
    [Show full text]
  • Defence Policy and the Armed Forces During the Pandemic Herunterladen
    1 2 3 2020, Toms Rostoks and Guna Gavrilko In cooperation with the Konrad-Adenauer-Stiftung With articles by: Thierry Tardy, Michael Jonsson, Dominic Vogel, Elisabeth Braw, Piotr Szyman- ski, Robin Allers, Paal Sigurd Hilde, Jeppe Trautner, Henri Vanhanen and Kalev Stoicesku Language editing: Uldis Brūns Cover design and layout: Ieva Stūre Printed by Jelgavas tipogrāfija Cover photo: Armīns Janiks All rights reserved © Toms Rostoks and Guna Gavrilko © Authors of the articles © Armīns Janiks © Ieva Stūre © Uldis Brūns ISBN 978-9984-9161-8-7 4 Contents Introduction 7 NATO 34 United Kingdom 49 Denmark 62 Germany 80 Poland 95 Latvia 112 Estonia 130 Finland 144 Sweden 160 Norway 173 5 Toms Rostoks is a senior researcher at the Centre for Security and Strategic Research at the National Defence Academy of Latvia. He is also associate professor at the Faculty of Social Sciences, Univer- sity of Latvia. 6 Introduction Toms Rostoks Defence spending was already on the increase in most NATO and EU member states by early 2020, when the coronavirus epi- demic arrived. Most European countries imposed harsh physical distancing measures to save lives, and an economic downturn then ensued. As the countries of Europe and North America were cau- tiously trying to open up their economies in May 2020, there were questions about the short-term and long-term impact of the coro- navirus pandemic, the most important being whether the spread of the virus would intensify after the summer. With the number of Covid-19 cases rapidly increasing in September and October and with no vaccine available yet, governments in Europe began to impose stricter regulations to slow the spread of the virus.
    [Show full text]
  • A French Sociology & Social Network Theory Approach Understanding The
    CHARLES UNIVERSITY IN PRAGUE Faculty of Social Science Institute of Political Science Senem Bekjan Islamic State Narrative on Internet: A French Sociology & Social Network theory approach understanding the propaganda Master`s Thesis Prague 2016 Author : Senem Bekjan Supervisor : Vit Stritecky Academic year: 2016 2 Bibliographical note: Bekjan, Senem Islamic State Narrative on Internet: A French Sociology Study and Social Network theory approach to understand the propaganda. Prague 2016 p.93 Master`s Thesis Charles University, Faculty of Social Sciences, Institute of Political Studies. Thesis Supervisor: PhDr. Vit Stritecky Ph.D Abstract The global Salafi jihadist movement has entered into a new era. In this era, the jihadists have gained opportunity to appeal to a much larger audience with the help of various uses of Internet. The Salafi-jihadist activities in the last years have shown that their approach was not left fruitless. The violent movement of Islamic State in Syria and Iraq, as we know it today is mostly consisting of foreign fighters from developed states, including the Western states. While the foreign fighter phenomena is not a new paradigm in the history of wars, the effective mass mobilization of jihadists shows us that something has changed since the jihadist movements of 1980s. It’s evident that Internet has played a certain role, providing these types of movements with a much bigger audience, a louder and an uncensored voice to their call of violence. What makes this call so much more effective than anything else, is its advanced used narrative, which should be analyzed in this thesis in parallel comparison with the academic radicalization theories.
    [Show full text]
  • Dabiq: Framing the Islamic State
    Radboud Universiteit Nijmegen Dabiq: Framing the Islamic State A Utopian Roadmap to the New Caliphate Jeu Delemarre, s0747602 Word count: 22.656 July 2017 Supervisor: Dr. Roel Meijer Radboud University Nijmegen Faculty of Theology, Philosophy and Religious Studies Master thesis 1 Verklaring van eigen werk Hierbij verklaar en verzeker ik, Jeu Delemarre, dat voorliggende eindwerkstuk getiteld Dabiq: Framing the Islamic State: A Utopian Roadmap to the New Caliphate, zelfstandig door mij is opgesteld, dat geen andere bronnen en hulpmiddelen dan die door mij zijn vermeld zijn gebruikt en dat de passages in het werk waarvan de woordelijke inhoud of betekenis uit andere werken – ook elektronische media – is genomen door bronvermelding als ontlening kenbaar gemaakt worden. Plaats, datum Nijmegen, 10-7-2017 2 TABLE OF CONTENTS Preface Page 3 Chapter 1, Introduction Page 4 -1.1. Background of IS Page 9 -1.2. Utopianism Page 11 -1.3. Thesis structure Page 15 Chapter 2, Jihadi Glossies: a Recent History Page 17 Chapter 3, Framing the Islamic State as Utopia Page 24 -3.1 Transcendental institutionalism Page 24 -3.2 Criticising the status quo and activating dynamic duties Page 28 -3.3 Eschatological urgency to activate dynamic duties Page 30 -3.4 The roadmap to the utopian Islamic State Page 35 -3.5 The perfect state according to Dabiq Page 37 3.5.1 Da‘wa: Enjoining in Good Page 39 3.5.2 Infrastructure Page 41 3.5.3 Medical services Page 41 3.5.4 Law enforcement Page 41 3.5.5 Coinage, economy and state exigencies Page 43 3.5.6 Slavery Page 44 3.5.7 Military and Warfare Page 45 -3.6 The perfect Muslim according to Dabiq Page 50 Chapter 4, Conclusions Page 59 Used literature Page 63 Appendix A: Glossary Page 68 Appendix B: The Apocalyptic Events Page 73 Appendix C: Attacking IS’s enemies Page 76 3 Preface I would like to thank my own sanity and stomach for being able to cope IS imagery and Vera for getting me through.
    [Show full text]
  • Support for TV Drama Production
    CREATIVE EUROPE Support for TV drama production www.creativeeuropeuk.eu @CEDUK_MEDIA #creativeeurope ARE YOU WORKING ON AN INTERNATIONAL TV DRAMA SERIES? There is €12.5 million a year available from the European Union’s Creative Europe programme for the production of European television programmes with the potential to circulate within the European Union and beyond. Non-repayable grants of up to €1 million are awarded via an annual application process, with deadlines in November and May. KEY REQUIREMENTS: • Applications should be made by independent, European production companies. • Submissions must be before the first day of principal photography. • At least three broadcasters from three European countries must contribute finance (equity, co-production, pre-sales). • At least 50% of the budget must be in place from third parties at the time of submission. • At least 50% of the budget must be from European sources. TWO TYPES OF GRANTS: • €1 million grants are available for a co-produced TV drama series of at least 6 x 45’ duration and an overall budget of at least €10 million. • Grants of up to €500,000 or 12.5% of the total eligible costs in the production budget are available for smaller scale projects, which don’t have to be co-productions (but still require at least three broadcasters). INTERESTED? Take a look at the supported TV series featured in this publication. For more information get in touch with Creative Europe Desk UK: Cover image (and opposite): German production www.creativeeuropeuk.eu/funding-opportunities/tv-programming company X Filme was awarded a €1 million grant from Creative Europe for Babylon Berlin, a [email protected] co-production with ARD, Sky Germany and Beta Film.
    [Show full text]
  • Assessing Cyber Challenges of Maritime Navigation
    Journal of Marine Science and Engineering Article Assessing Cyber Challenges of Maritime Navigation Andrej Androjna 1,*, Tanja Brcko 1, Ivica Pavic 2 and Harm Greidanus 3 1 Faculty of Maritime Studies and Transport, University of Ljubljana, 6320 Portorož, Slovenia; [email protected] 2 Faculty of Maritime Studies, University of Split, 21000 Split, Croatia; [email protected] 3 European Commission, Joint Research Centre (JRC), 21027 Ispra, Italy; [email protected] * Correspondence: [email protected] Received: 15 September 2020; Accepted: 1 October 2020; Published: 3 October 2020 Abstract: This paper provides a close investigation into the landscape of both cyber threats and actual incidents in the maritime sector, identifying the cyber trends and challenges as they relate to safe navigation and marine shipping. As an important subset of cyber threats that impact many maritime systems, the vulnerabilities of satellite navigation systems, in particular the Global Positioning System (GPS), receive special attention. For this article, a systematic literature review was conducted, complemented by the research and analysis of a specific spoofing event. Analyzing available resources, we might summarize that a shift in mind-set is essential to direct more attention and resources toward cybersecurity as well as the necessity for manufacturers to improve the cybersecurity of their products, as shipping systems currently remain vulnerable to cybercriminals. There is a need for multiple positioning, navigation, and timing (PNT) systems onboard maritime vessels to complement GPS-only navigation. The use of multiple satellite navigation constellations, public as well as private, in combination with the terrestrial components of an enhanced LOng-RAnge Navigation (eLoran) system and ports’ laser-based aid system for berthing and docking should provide the shipping industry with the direly needed increased protection from cyber-attackers for the foreseeable future.
    [Show full text]
  • Median, Most Notably Appearing in the Comedy Series Danish Dynamite
    Another Round_Production Notes_English Director Biography: Director, Thomas Vinterberg Thomas Vinterberg is one of Denmark's most important, award-winning, and internationally celebrated directors. His latest effort was the large-scale, international drama Kursk (2019), about the Russian submarine tragedy in the year 2000. Another recent success of his, The Commune (2016), was selected for the main competition at the Berlin Film Festival and netted Trine Dyrholm, a Silver Bear for Best Actress. In 2012, Thomas Vinterberg won worldwide acclaim for this Oscar and Golden Globe-nominated drama The Hunt (2013), which also won Mads Mikkelsen the Award for Best Actor at the prestigious Cannes Film Festival. Other notable works include the adaptation of the Thomas Hardy novel Far from the Madding Crowd (2015), which Matthias Schoenaerts and Carey; Dear Wendy (2005); and It's All About Love (2003). Vinterberg got his international breakthrough in 1998 with Festen – the world's first Dogme 95-film, which received several international awards, including the Cannes Jury Prize. Thomas Vinterberg made his feature debut with The Biggest (1996), after graduating from the Danish Film School in 1993. DIRECTOR’S Statement “I never drink before breakfast.” The quote is from Churchill, who helped to defeat the Germans and win World War II, while under the excessive and constant influence of alcohol. Other great thinkers, artists and writers, such as: Tchaikovsky and Hemmingway have found courage and inspiration that way. After the first mouthfuls of alcohol, we all know the feeling of the conversation growing, the room getting bigger and the problems getting smaller. With this movie, we want to examine and salute alcohol’s ability to set people free.
    [Show full text]
  • Enabling Special Operations Forces Power in a Hybrid Environment
    ENABLING SPECIAL OPERATIONS FORCES POWER IN A HYBRID ENVIRONMENT Major Jason H. Thompson JCSP 47 PCEMI 47 Service Paper Étude militaire Disclaimer Avertissement Opinions expressed remain those of the author and do Les opinons exprimées n’engagent que leurs auteurs et not represent Department of National Defence or ne reflètent aucunement des politiques du Ministère de Canadian Forces policy. This paper may not be used la Défense nationale ou des Forces canadiennes. Ce without written permission. papier ne peut être reproduit sans autorisation écrite. © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2021. © Sa Majesté la Reine du Chef du Canada, représentée par le ministre de la Défense nationale, 2021. CANADIAN FORCES COLLEGE - COLLÈGE DES FORCES CANADIENNES JCSP 47 - PCEMI 47 2020 – 2021 SERVICE PAPER – ÉTUDE MILITAIRE ENABLING SPECIAL OPERATIONS FORCES POWER IN A HYBRID ENVIRONMENT By Major Jason H. Thompson “This paper was written by a candidate « La présente étude a été rédigée par un attending the Canadian Forces College stagiaire du Collège des Forces in fulfillment of one of the requirements canadiennes pour satisfaire à l’une des of the Course of Studies. The paper is a exigences du cours. L’étude est un scholastic document, and thus contains document qui se rapporte au cours et facts and opinions which the author contient donc des faits et des opinions alone considered appropriate and que seul l’auteur considère appropriés et correct for the subject. It does not convenables au sujet. Elle ne reflète pas necessarily reflect the policy or the nécessairement la politique ou l’opinion opinion of any agency, including the d’un organisme quelconque, y compris Government of Canada and the le gouvernement du Canada et le Canadian Department of National ministère de la Défense nationale du Defence.
    [Show full text]
  • Everyone Together Now: Creating a Resilient Society in an Age of Cyber Threats
    JUNE 2021 Everyone together now: Creating a resilient society in an age of cyber threats Elisabeth Braw Introduction Cyber aggression has become a constant companion in modern life and is likely to increase as developed societies become even more dependent on digital technology, through the Internet of Things, for example. The aggres- sion is also likely to continue to morph. In the past few years, for instance, ransomware attacks have grown extremely rapidly. While governments can protect their civil societies by taking defensive and offensive cyber actions, such protection can never be complete. As a result, businesses and citizens have a role to play in helping limit the effects of cyber aggression on them- selves and the wider society. Cyber aggression: The current situation In early April this year, Swedish prosecutors announced they would drop an investigation into a string of cyber attacks against the Swedish Sports Confederation in 2017 and 2018. Thanks to the hacks, the attackers gained access to athletes’ personal details, including medical records. These details subsequently found their way into the public domain. “The information has The author of this document has worked independently and is solely responsible for the views presented here. The opinions are not necessarily those of the Macdonald-Laurier Institute, its Directors or Supporters. been published openly and, based on these details, Swedish media have writ- ten articles which follow GRU’s narrative of discrediting athletes and sports organisations in the West,” says Mats Ljungqvist, the prosecutor in charge of the case, in an April 13 statement (Swedish Prosecution Authority 2021). The hacks, in other words, had a real and detrimental effect on Swedish ath- letes.
    [Show full text]
  • The Case for Joint Military–Industry Greyzone Exercises
    ELISABETH BRAW i Royal United Services Institute for Defence and Security Studies BRIEFING PAPER The Case for Joint Military–Industry Greyzone Exercises Elisabeth Braw BRIEFING PAPER 1 EXECUTIVE SUMMARY Greyzone aggression is effective because it exploits gaps in countries’ defence. Virtually no liberal democracies are set up to defend themselves against a combination of non-kinetic attacks on civil society. It is, however, clear that the armed forces alone cannot defend their countries against this type of aggression. With businesses now finding themselves targets of geopolitically motivated aggression, such as cyber attacks, they can play a significant role in better defending themselves and, as a result, their countries of operation. Today, corporate crisis management exercises have a purely tactical scope, focusing on company-specific threats. This paper proposes joint military–industry exercises to practise defence against greyzone aggression. Such exercises would, to some extent, mirror traditional military exercises. They would, however, be purely defensive in nature and include specific companies, which would volunteer to participate or be invited to do so. The exercises would be conducted under the authority of the interior ministry and would help the armed forces and participating companies to respond to a greyzone attack in a coordinated fashion. As with traditional military exercises, industry participation should involve participants at all levels up to the chief executive. A good model on which to build these are Sweden’s ‘total defence’ exercises, which were conducted until 1987 and resumed in 2019. Businesses that participate in such joint greyzone exercises should be given International Organization for Standardization-style, industry-recognised certifications, which would signal their foresight and preparation to clients and consumers.
    [Show full text]
  • Building a Wall of Denial Against Gray-Zone Aggression Elisabeth Braw
    Building a Wall of Denial Against Gray-Zone Aggression Elisabeth Braw APRIL 2021 AMERICAN ENTERPRISE INSTITUTE Executive Summary ATO member states and partners today face national security. Countries from Finland to Singa- N national security threats that extend far beyond pore feature considerable societal participation in military aggression. Indeed, they are regularly targeted national security, but deterrence of gray-zone aggres- by nonmilitary means, so-called gray-zone aggression. sion also offers considerable potential for innovation. Because gray-zone aggression can include any mea- This report, adapted from my upcoming book The sures below the level of war, including illegal ones, it Defender’s Dilemma: Deterring Gray-Zone Aggression, is impossible for the targeted countries to deter every outlines a whole-of-society model for deterrence by act with the threat of punishment. denial and proposes measures governments could This means liberal democracies should give more take or coordinate to incentivize businesses and the attention to societal resilience. By involving all parts wider population to help keep their countries safe. of society in keeping the country safe in case of a The proposals include community stress testing, vol- crisis, they can signal to adversaries that aggression untary resilience training for teenagers and other will not have the desired effect. Today civil society demographic groups, and government-industry con- is, in most countries, a largely untapped resource in sultations on national security issues. 1 Building a Wall of Denial Against Gray-Zone Aggression Elisabeth Braw “ n case of war, please ring [the bell] twice.”1 In 1939, objectives of this Treaty, the Parties, separately I Rudolf Minger was prepared.
    [Show full text]