Evolution of Hybrid Warfare and Key Challenges, Committee on Armed
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Words That Work: It's Not What You Say, It's What People Hear
ï . •,";,£ CASL M T. ^oÛNTAE À SUL'S, REVITA 1ENT, HASSLE- NT_ MAIN STR " \CCOUNTA ;, INNOVAT MLUE, CASL : REVITA JOVATh IE, CASL )UNTAE CO M M XIMEN1 VlTA • Ml ^re aW c^Pti ( °rds *cc Po 0 ^rof°>lish lu*t* >nk Lan <^l^ gua a ul Vic r ntz °ko Ono." - Somehow, W( c< Words are enorm i Jheer pleasure of CJ ftj* * - ! love laag^ liant about Words." gM °rder- Franl< Luntz * bril- 'Frank Luntz understands the power of words to move public Opinion and communicate big ideas. Any Democrat who writes off his analysis and decades of experience just because he works for the other side is making a big mistake. His les sons don't have a party label. The only question is, where s our Frank Luntz^^^^^^^™ îy are some people so much better than others at talking their way into a job or nit of trouble? What makes some advertising jingles cut through the clutter of our crowded memories? What's behind winning campaign slogans and career-ending political blunders? Why do some speeches resonate and endure while others are forgotten moments after they are given? The answers lie in the way words are used to influence and motivate, the way they connect thought and emotion. And no person knows more about the intersection of words and deeds than language architect and public-opinion guru Dr. Frank Luntz. In Words That Work, Dr. Luntz not only raises the curtain on the craft of effective language, but also offers priceless insight on how to find and use the right words to get what you want out of life. -
The Effectiveness of Influence Activities in Information Warfare
The Effectiveness of Influence Activities in Information Warfare Cassandra Lee Brooker A thesis submitted in fulfilment of the requirements for the degree of Master of Research School of Business May 2020 Thesis/Dissertation Sheet Surname : BROOKER Given Name/s : CASSANDRA LEE Abbreviation for degree : MRes Faculty : UNSW Canberra School : School of Business Thesis Title : The Effectiveness of Influence Activities in Information Warfare Abstract Rapid, globalised power shifts, technological advances, and increasingly interconnected, ungoverned communications networks have resulted in the rise of asymmetric grey zone threats. The lines are now blurred between political, civil, and military information environments. The rise of influence activities is the new ‘sharp power’ in information warfare (the iWar). Western democracies are already at war in the information domain and are being out-communicated by their adversaries. Building on the commentary surrounding this contemporary threat, and based on a review of the literature across three academic disciplines of: Systems Thinking, Influence, and Cognitive Theory; this study aimed to investigate solutions for improving Australia’s influence effectiveness in the iWar. This study asked how systems thinking can offer an effective approach to holistically understanding complex social systems in the iWar; as well as asking why understanding both successful influencing strategies and psychological cognitive theories is central to analysing those system behaviours. To answer the aim, a systems thinking methodology was employed to compare two contrasting case studies to determine their respective influencing effectiveness. The successful case system comprising the terrorist group ISIS was compared and contrasted with the unsuccessful case system of Hillary Clinton’s 2016 election campaign – using a single stock of influence to determine relevant reinforcing and balancing feedback. -
Is the European Migrant Crisis Another Stage of Hybrid War?
IS THE EUROPEAN MIGRANT CRISIS ANOTHER STAGE OF HYBRID WAR? Yurii Punda, Vitalii Shevchuk, Viljar Veebel Abstract: This article provides an overview of the roots of large-scale migration flows to the European Union (EU) during the past ten years. In addition, the article also explores the potential link between such migration flows and modern hybrid warfare, characterised by the coordination of various types of warfare (i.e. military and non-military means, conventional and non-conventional capabilities, state and non-state actors, etc.), all employed with an aim to cause instability and disorder. In the 2010s, the migration flows to EU countries increased significantly, particu- larly from the conflict areas in Syria, Iran, Iraq, Afghanistan, and Pakistan, as well as from Albania, Kosovo and Ukraine. The analysis focuses on the question of whether the increase in migration flows could be linked to the ongoing confronta- tion between Russia and the West. Specifically, the article focuses on two particular cases: Syria and Ukraine. The article explores the commonalities of the resulting migration flows to the EU and proposes policy recommendations for reducing the negative impact of such events in the future. Keywords: migration, hybrid warfare, security, European Union, Ukraine, Syria 1. Introduction During the 2015 European migration crisis, an unusually large number of refugees flowed into the European Union. During the past decade, the number of first-time asylum applications submitted by non-EU citizens has increased exponentially, peaking in 2015–2016 when more than a million people from non-EU countries applied for asylum in the EU over the course of just one year (Figure 1(a)). -
Dog Whistling Far-Right Code Words: the Case of 'Culture
Information, Communication & Society ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/rics20 Dog whistling far-right code words: the case of ‘culture enricher' on the Swedish web Mathilda Åkerlund To cite this article: Mathilda Åkerlund (2021): Dog whistling far-right code words: the case of ‘culture enricher' on the Swedish web, Information, Communication & Society, DOI: 10.1080/1369118X.2021.1889639 To link to this article: https://doi.org/10.1080/1369118X.2021.1889639 © 2021 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group Published online: 23 Feb 2021. Submit your article to this journal Article views: 502 View related articles View Crossmark data Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=rics20 INFORMATION, COMMUNICATION & SOCIETY https://doi.org/10.1080/1369118X.2021.1889639 Dog whistling far-right code words: the case of ‘culture enricher’ on the Swedish web Mathilda Åkerlund Sociology Department, Umeå University, Umeå, Sweden ABSTRACT ARTICLE HISTORY This paper uses the Swedish, once neo-Nazi expression culture Received 21 August 2020 enricher (Swedish: kulturberikare) as a case study to explore how Accepted 31 January 2021 covert and coded far-right discourse is mainstreamed, over time KEYWORDS and across websites. A sample of 2,336 uses of the expression Far-right; mainstreaming; between 1999 and 2020 were analysed using critical discourse fi dog whistling; critical analysis. The ndings illustrate how the expression works like a discourse analysis; coded ‘dog whistle’ by enabling users to discretely self-identify with an language use imagined in-group of discontent white ‘Swedes’, while simultaneously showing opposition to the priorities of a generalised ‘establishment’. -
Using Language to Conceal the Message in a Political, Military and Medical Context
JAHR Vol. 4 No. 7 2013 Original scientific article Pavel Tsvetkov*, Nadezhda Amudzhieva** Doblespeak: Using language to conceal the message in a political, military and medical context ABSTRACT Half a century has passed since Marshall McLuhan's 'The Gutenberg Galaxy: The Making of Typographic Man' came into being, introducing the now famous term 'global village', but the passing years have only added to the actuality of the phrase. In 2012 the world seems to have shrunk to the dimensions of one's own living room, where one can witness Alexander the Great's army defeating the Persians in the Battle of Issus in 333 BC, and contemporary Baghdad being bombed at night, all while having dinner. In a world, where economic interests dictate the unleashing of global wars, controlling the proliferation of message content in the global village has become exponentially important. Confucius' rectification of names seems to have fallen from grace with the rulers of today: those in power have found a way to use language as a smoke screen – or a concave mirror – and words have been utilized to conceal meaning rather than convey it. Doublespeak has become the norm of political and military language, as well as certain as- pects of communication within a medical context: the general public has been willfully de- ceived into misinterpreting the message. Keywords: doublespeak, deceptive language, spin, conceal message, global village, rectifica- tion of names, medical insurance * Correspondence address: Pavel Tsvetkov, Medical University – Varna "Prof. Dr. Paraskev Stoyanov", 55 "Prof. Marin Drinov" Str., 9002 Varna, Bulgaria, e-mail: [email protected] ** Correspondence address: Nadezhda Amudzhieva, Medical University – Varna "Prof. -
Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. -
Bipolarity, Proxy Wars, and the Rise of China
We encourage you to e-mail your comments to us at: [email protected]. Bipolarity, Proxy Wars, and the Rise of China Mark O. Yeisley, Lieutenant Colonel, USAF The modern international system in which nation-states compete for survival has historically assumed three primary configurations: uni polarity, in which a single state acts as a hegemon;1 bipolarity, in which two states control the majority of power with weaker states aligning with one or the other; and multipolarity, where three or more nations are powerful enough to act as poles in the system. Since the 1648 Treaties of Westphalia, multipolarity with various great-power states jockeying for supremacy has been the norm. As the fortunes of these states waxed and waned, war typically has been the ultimate result of perceived power im balances among them. While there have been historical instances of bi polarity, each of these was regional rather than global in scope.2 Many scholars argue that the international system has assumed a unipolar orientation since 1991, with the United States the sole remaining “super power.”3 Perhaps more important are predictions of what will follow for international relations. For example, some believe the United States will face no viable challengers in the near term, with unipolarity a stable and long-term likelihood.4 Others see a return to a multipolar environment wherein many nations will possess military and economic might sufficient to be recognized as great-power states.5 Still others foresee a return to bipo larity with the United States and one future great power locked once again in a struggle for primacy.6 This last possibility is increasingly influenced by Brazil, Russia, India, and China (BRIC). -
British Anti-Communist Propaganda and Cooperation with the United States, 1945-1951. Andrew Defty
British anti-communist propaganda and cooperation with the United States, 1945-1951. Andrew Defty European Studies Research Institute School of English, Sociology, Politics and Contemporary History University of Salford Submitted in fulfilment of the requirements of the Degree of Doctor of Philosophy, January 2002 British anti-communist propaganda and cooperation with the United States, 1945-1951 Contents Acknowledgements................................................................................................. .......ii Abbreviations.................................................................................................................iii Abstract..........................................................................................................................iv Introduction....................................................................................................................! Chapter 1 The Origins of Britain's anti-communist propaganda policy 1945-1947.............................28 Chapter 2 Launching the new propaganda policy, 1948.....................................................................74 Chapter 3 Building a concerted counter-offensive: cooperation with other powers, 1948-1950 ........123 Chapter 4 'Close and continuous liaison': British and American cooperation, 1950-1951 .................162 Conclusion .....................................................................................................................216 Notes Introduction .........................................................................................................226 -
ON the EFFECTIVE USE of PROXY WARFARE by Andrew Lewis Peek Baltimore, Maryland May 2021 © 2021 Andrew Peek All Rights Reserved
ON THE EFFECTIVE USE OF PROXY WARFARE by Andrew Lewis Peek A dissertation submitted to Johns Hopkins University in conformity with the requirements for the degree of Doctor of Philosophy Baltimore, Maryland May 2021 2021 Andrew Peek All rights reserved Abstract This dissertation asks a simple question: how are states most effectively conducting proxy warfare in the modern international system? It answers this question by conducting a comparative study of the sponsorship of proxy forces. It uses process tracing to examine five cases of proxy warfare and predicts that the differentiation in support for each proxy impacts their utility. In particular, it proposes that increasing the principal-agent distance between sponsors and proxies might correlate with strategic effectiveness. That is, the less directly a proxy is supported and controlled by a sponsor, the more effective the proxy becomes. Strategic effectiveness here is conceptualized as consisting of two key parts: a proxy’s operational capability and a sponsor’s plausible deniability. These should be in inverse relation to each other: the greater and more overt a sponsor’s support is to a proxy, the more capable – better armed, better trained – its proxies should be on the battlefield. However, this close support to such proxies should also make the sponsor’s influence less deniable, and thus incur strategic costs against both it and the proxy. These costs primarily consist of external balancing by rival states, the same way such states would balance against conventional aggression. Conversely, the more deniable such support is – the more indirect and less overt – the less balancing occurs. -
Covert Networks a Comparative Study Of
COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns. -
Hybrid Warfare Challenges to the Armed Forces: Realities and the Way Ahead
Hybrid Warfare Challenges to the Armed Forces: Realities and the Way Ahead Kunendra Singh Yadav In all fighting, the direct method may be used for joining the battle, but indirect methods will be needed in order to secure victory. —Sun Tzu Introduction With the recent landmark changes in the political landscape of Jammu and Kashmir (J&K), a whole new era has been ushered in. A state which was unfortunately the test-bed of Pakistan’s nefarious agendas for decades, has now been subjected to a bold, exigent and logical step. The dissonance in decision-making has finally given way, laying fresh ground for renewed endeavours. With “Hybrid Warfare Challenges to the Armed Forces: Realities and Way Ahead” being the subject of scrutiny, a certain degree of factual clarity needs to be brought in right away. Three fundamental queries need to be answered at the outset. First, is the term hybrid war a relatively recent construct? The answer is a definite no. The phenomenon is actually as old as the history of warfare itself. Chanakya,1 around 300 BC, propagated the use of sama (conciliation), dama (economic gratification), danda (use of force) Major Kunendra Singh Yadav is serving officer of the Indian Army. His areas of interest include Hybrid Warfare, Strategy and Operational Art. 122 CLAWS Journal l Winter 2019 HYBRID WARFARE CHALLENGES TO THE ARMED FORCES and bheda (dissension) i.e., all resources at the disposal of the king (in today’s context—comprehensive national power) to achieve the intended outcome. Second, are we adequately equipped to deal with the current and upcoming challenges posed by this warfare? The answer is yes. -
Monitoring Trends in Global Combat: a New Dataset of Battle Deathsz
European Journal of Population (2005) 21: 145–166 Ó Springer 2005 DOI 10.1007/s10680-005-6851-6 Monitoring Trends in Global Combat: A New Dataset of Battle Deathsz BETHANY LACINA1,2,* and NILS PETTER GLEDITSCH2,3 1Stanford University, Palo Alto, CA, U.S.A.; 2Centre for the Study of Civil War (CSCW), International Peace Research Institute Oslo (PRIO), Hausmanns gate 7, NO-0186 Oslo, Norway; 3Norwegian University of Science and Technology, Trondheim, Norway (*Author for correspondence, e-mail: [email protected]) Received 26 February 2004; accepted in final form 22 June 2004 Lacina, B. and N. P. Gleditsch, 2005, Monitoring Trends in Global Combat: A New Dataset of Battle Deaths, European Journal of Population, 21: 145–166. Abstract. Both academic publications and public media often make inappropriate use of incommensurate conflict statistics, creating misleading impressions about patterns in global warfare. This article clarifies the distinction between combatant deaths, battle deaths, and war deaths. A new dataset of battle deaths in armed conflict is presented for the period 1946–2002. Global battle deaths have been decreasing over most of this period, mainly due to a decline in interstate and internationalised civil armed conflict. It is far more difficult to accurately assess the number of war deaths in conflicts both past and present. But there are compelling reasons to believe that there is a need for increased attention to non-battle causes of mortality, especially displacement and disease in conflict studies. Therefore, it is demographers, public health specialists, and epidemiologists who can best describe the true human cost of many recent armed conflicts and assess the actions necessary to reduce that toll.