Jagello Hybrid Warfare: A New Phenomenon in Europe s Security Environment
|
|
|
- Magdalen Norman
- 10 years ago
- Views:
Transcription
1 Jagello 2000 Hybrid Warfare: A New Phenomenon in Europe s Security Environment Road to WARSAW SECURITY FORUM 2015
2 1. Hybrid warfare as a concept The war in Clausewitz s concept is seen as a continuation of the policy of the state by violent means, which are used to force the opponent to execute our will. The primary role in this concept is played by the use of armed violence in its symmetrical or asymmetrical form. To this end all the resources of society are used as later elaborated in the concept of total war. Although hybrid warfare serves the same purpose, namely the achievement of political goals, which can be very diverse, it differs from war in Clausewitz s concept (further referred to as classic war ) in many different characteristics. Expert debate about hybrid warfare began in foreign literature long before the Russian invasion of Ukraine. In our opinion, this debate s weakness consists in the fact that the available definitions do not set explicit demarcation criteria for distinguishing between classical and hybrid warfare. If we want to differentiate between hybrid warfare and classic war, the main demarcation criterion, in our judgment is the use of the means that are primarily used to achieve the objectives of war. In hybrid warfare, it is important that non-military means of subversive nature play the leading role. Ideally, an attacking state need not make explicit use of military force. The aim of the attacker is to control the minds of the political leadership and the population of the attacked state through propaganda (psychological operations), deceptive campaigns and intimidation by terror. If military force is used, it is used in secret. Use of demarcation criteria, prioritising non-military tools of subversion and conducting secret warfare, these aspects clearly distinguish hybrid warfare from other types of war. 1.1 Working definition of hybrid warfare Hybrid warfare is an armed conflict conducted by a combination of non-military and military means and aiming with their synergistic effect to compel the enemy to take such steps that he would not do of his own accord. At least one side of the conflict is the state. The main role in achieving the objectives of war is played by non-military means such as psychological operations and propaganda, economic sanctions, embargoes, criminal activities, terrorist activities, and other subversive activities of a similar nature. The attacker s military operations are conducted in secret by irregular forces combining symmetric and asymmetric methods of combat operations against the whole society and, in particular, against its political structures, state authorities and local govern- Hybrid Warfare: A New Phenomenon in Europe s Security Environment 2
3 ment, the state economy, the morale of the population and against the armed forces. 2. Use of elements of hybrid warfare against Georgia and Ukraine 2.1 Georgia 2008 The Russia-Georgia armed conflict in the summer of 2008 broke out at the time of the Beijing Olympics and aroused deep concern in the international community. According to some experts, it was the first armed confrontation between the East and the West after the end of the Cold War. The main aim of Russia was to retain its influence through military operations, to recognise the independence of the regions concerned, and to maintain a significant military presence in those territories. Last but not least, Russia buried the chances of Georgia to achieve NATO membership in the near future, which Georgia has sought since In this case, it was not a hybrid warfare within the meaning of the above-proposed definition. It was a war according to the classical definition, in which Russia openly intervened with militarily force and used some elements of hybrid warfare to prepare and support the conduct of combat operations. The policy goals of the operation were primarily achieved by military force whereas elements of hybrid warfare (economic sanctions and embargoes, information war, war in cyberspace) played more of a supporting role. Both sides of the armed conflict waged an intensive information war, making it difficult to separate facts from intentionally disseminated disinformation. This information war was dominated by three main themes: 1. Georgia and especially President Saakashvili were aggressors. 2.Russia was forced to intervene to defend its citizens and to prevent a humanitarian catastrophe (defensive purpose); 3. The West has no legitimate reason for criticizing Russia because Russia simply does what the West did in Kosovo in Parallel to the information war against Georgia, cyber war also took place. A total of 38 Georgian websites were attacked, including the website of the Georgian president, Ministry of Foreign Affairs, Road to WARSAW SECURITY FORUM
4 National Bank, Parliament, and Supreme Court. These attacks were centrally managed and coordinated. It is difficult to evaluate the performance of the Russian armed forces, as it is still not entirely clear whether it was a pre-planned and carefully prepared military operation, or whether it was on both sides an unexpected war, for which neither of the conflicting parties were prepared. However, the rapidity of the deployment of Russian military forces in the mountainous terrain, the early opening of a second front in Abkhazia, Russian espionage activities in the region, military provocations on the eve of war, the downing of a Georgian unmanned aircraft and, last but not least, the Russian military exercises in the region ( Caucasus 2008 ) demonstrate the readiness of Russia to escalate the conflict. The conflict nevertheless revealed many Russian shortcomings, particularly weaknesses in the coordination of ground, naval and air forces. According to available sources, an important role in military operations was played by airborne units and special forces. The reforms announced by the Russian president immediately after the war reflect the intention to improve Russia s ability to effectively lead the campaign by employing modern technologies and operating procedures. 2.2 Ukraine Russia used and is still using against Ukraine a wide range of military (asymmetric and symmetric), economic, propagandistic, diplomatic and perhaps even cyber means of combat. The activity of Russian diplomacy, of course, cannot be summed in a text of this scope and purpose, but in brief, we can say that Russia is seeking to weaken Kiev at forums of international organisations, in particular by promoting the federalisation of Ukraine. Concerning the economic means, Moscow manipulates the price of imported Russian natural gas and adopts restrictive non-tariff measures on Ukrainian food products. For the Ukrainian economy, the most severe sanction is a ban on the use of Russian air space by Ukrainian airlines. Russia uses the so-called new propaganda that does not seek to persuade the recipient, but to obfuscate what is truth and what the recipient can trust. To enlist support for the war in the Russian population it uses a broad variety of media channels, particularly state television, which in its coverage of Ukraine can significantly influence the local public opinion. These include Russia Today, Voice of Russia, Sputnik, press agency ITAR-TASS and the agency RIA Novosti. It is also worth mentioning that mul- Hybrid Warfare: A New Phenomenon in Europe s Security Environment 4
5 tiple sources have confirmed the existence of an army of trolls paid by the government. These are Internet bloggers and debaters who post views preferred by the Russian government to domestic and foreign websites. Concerning the cyberspace area, several attacks against the Ukrainian government websites and systems have been recorded (e.g. the Ukrainian electoral counting electronic system, the Ukrainian transport network, and attacks on websites of volunteer battalions). However, it is not possible to determine with certainty whether it has been the work of the Russian forces. It is also necessary to emphasise that all cyber-attacks are only the tip of the iceberg. The extent of Russian cyber-attacks using malware or spyware can never be determined with certainty unless Russia discloses this information voluntarily (or if it is leaked). In the military dimension, Russia and the separatists are able to deploy a wide spectrum of units in the conflict. According to the US Department of Defense, in November 2014 Russia had 7,000 regular troops in Ukraine (excluding the Crimea). To this day, it is alleged that more than 40,000 Russian troops have been rotated in Ukraine. Russia and Russian organisations actively support the separatists (with logistics, material and personnel), who are a combination of the local population, Russian citizens and, occasionally, citizens of many other countries. Without extensive logistical support from the outside, it is impossible for the separatists to conduct combat operations to the extent that we see in eastern Ukraine. Russia is the only country in the region that has the capacity and motivation. If we apply the working definition in the introduction, then we can speak of hybrid warfare in particular to describe the Russian occupation of the Crimea and Russian operations until the summer of Evaluation of the conflict since the summer of 2014 is not so clear-cut. Since summer 2014, it is quite obvious that regular Russian troops operate in eastern Ukraine and if necessary (e.g. imminent defeat of the separatists) even entire organic military units can be used. Denying this direct participation of the Russian military belongs to the hybrid warfare tools. On the other hand, the direct military intervention of Russia suggests that hybrid warfare has reached its limits. 3. Is this a new approach? Road to WARSAW SECURITY FORUM
6 The bedrock of the hybrid warfare concept is that of subversion, which comprises four main stages: 1. demoralisation of the target society, 2. destabilisation of the target society, 3. precipitation of a crisis in the target society, 4. seizing control of the target society by internal forces acting in concert with the attacker. This is an old Soviet (Marxist-Leninist) concept, applied towards the West by the USSR throughout its existence. Attacks on the adversary s political authorities, propaganda, fomenting unrest, creating people s republics, these are well-known components under the cloak of the new hybrid warfare. Modern information technologies allow multiplication of the effect that brings a new quality and dangerous nature of this phenomenon. 4. Potential of hybrid warfare Hybrid warfare in the media space is considered extremely dangerous. The proponents of this view usually refer to the Russian general Gerasimov, who claims that hybrid war can disrupt even a well-governed and prosperous state. This optimism (or pessimism, depending on one s perspective) is difficult to sustain in the light of the current empirical evidence. In a security analysis of this phenomenon, it is important neither to underestimate nor to overestimate its possibilities. The main problem for the defender is to identify the moment when he is the target of a hybrid attack. Therefore, defence against hybrid warfare depends in the first line on intelligence services and in the second line on an authentic civil society. To wage a hybrid war aiming to achieve political goals, a number of specific necessary however not sufficient conditions must be met. Only their right configuration generates a suitable battlefield for hybrid warfare. Empirical evidence to date indicates that these are at least the following necessary but not sufficient conditions in isolation: 1. the attacked country has been mismanaged in the long term and it does not fulfil its basic functions, 2. its population is divided along several dividing lines, Hybrid Warfare: A New Phenomenon in Europe s Security Environment 6
7 3. the potential attacker holds a certain attraction for a part of the attacked-country population and can therefore use soft-power instruments, 4. the attacked country borders the attacker and is unable to effectively control its borders, 5. the attacked country has no dependable allies, and 6. the attacker has a certain degree of credibility in the international community, which allows him to influence the international community with his version of events. Even in the case of Ukraine, which is in the post-communist milieu the prototype of a poorly governed state, managed like a company that lays golden eggs for oligarchs, the hybrid warfare succeeded only in the first stage in the Crimea. However, by the second stage, when Russia, encouraged by its success in the Crimea, tried to split Ukraine along the Odessa Kharkov line, this concept fatally failed and the defeat of Russian irregular forces fighting in secret until then in the east of Ukraine had to be prevented by an open intervention of Russian regular forces in the summer This intervention continues till today, producing negative political, economic and military consequences Russia. If we think about further potential of hybrid warfare used against the West and the countries close to it, we must take into account that Russia has lost the element of surprise. Potential targets of this type of warfare, which in our region means primarily the Baltic States and indirectly NATO, would now be less shocked than in This is relevant also to the other countries of the West. Whether this conclusion applies to Belarus and the Central Asian countries is a question, however. Some steps taken by Belarus indicate that Lukashenko is aware of these risks. Hybrid warfare has to be carefully analysed and preparations have to be made for waging it. The Central European countries should devote particular attention to Russia. A fight against an opponent that wages a hybrid war is the task for the entire society and must be conducted in all areas. Last but not least, the society must be prepared to make hybrid counterattacks in the area of information war and in cyberspace against the attacker. However, in our opinion, a much more dangerous form of Russian aggression against members of NATO would be a repeat of the Georgian scenario, especially if it is supported by nuclear threats from Russia. Road to WARSAW SECURITY FORUM
8 5. Proposed measures for improving the ability of states to face hybrid warfare Strengthen the state s ability to fulfil its basic functions and hence the loyalty of citizens to the state. Carry out intelligence and analytical activities in order to detect enemy preparations for a hybrid warfare, and, particularly, the launch of hybrid attacks using subversion. Continually single out countries that might resort to hybrid warfare and focus attention on them already in peacetime. Continuously draw up plans of countermeasures of both defensive and offensive nature against these countries in all areas relevant to hybrid warfare. Systematically prevent the infiltration of political leadership of the state carried out by agents of influence of a potential hybrid attacker. Acquaint the public in a suitable form with influence networks which a potential hybrid attacker constructs in the attacked-to-be country as well as with their modus operandi. Strengthen social cohesion of the country. By the active state policy do not allow the creation of variously defined socially excluded areas (e.g. based on ethnicity, religion or social status), which a potential attacker could rely on and which he could exploit in his campaign. Develop and build political relations with other potential targets of hybrid aggression. Exchange experience both on appropriate multilateral platforms (NATO and EU) as well as bilaterally. In the area of foreign policy, strive to address the threats associated with hybrid warfare in international organisations for collective defence of which the state is a member. Reduce to a minimum the necessary level of diplomatic, economic, military and cultural relations with countries that have been evaluated as potential hybrid attackers. Develop an adequate form of homeland defence consciousness and educational activities among the population concerning hybrid warfare and ways to face it. Systematically develop cooperation in this area with an authentic civil society. Enhance flexibility and the ability of independent action at all Hybrid Warfare: A New Phenomenon in Europe s Security Environment 8
9 levels of state, local government and the armed forces. Develop a wide range of capabilities needed for hybrid warfare, particularly intelligence capabilities, including the abilities to operate in cyberspace and to use information operations. Build military capabilities to be usable at all types of expeditionary operations and in defending territory. Create legislative conditions to ensure that police forces could be rapidly reinforced on the national territory by the military in their fight against unidentified armed formations at a time when the state has not formally been declared a war. Pursue scientific study of the issue of hybrid warfare using the approaches of all relevant scientific disciplines. Strengthen the ability of the police to act against irregular and hostile unidentified armed formations fighting incognito at the very moment they attempt to paralyse the authority of state and local government. Research and presentation paper by Jagello 2000 in cooperation with Faculty of Social Studies, Masaryk University, Brno and European Commission Representation in the Czech Republic. This is an edited and translated version of a text published in Czech as Hybridní válka jako nový fenomén v bezpečnostním prostředí Evropy (ISBN ) in September 2015 by Jagello The original text was written by Zdeněk Kříž, Zinaida Shevchuk, Peter Števkov (Masaryk University, Czech Republic). Jagello 2000, 2015 Road to WARSAW SECURITY FORUM
10 Jagello 2000 Jagello 2000 is a leading Czech non-profit civic organization active in public and defence diplomacy. Its main goal is to build a well-informed public that is more understanding in terms of defence, security, transatlantic relations and NATO. The main impulse to establish Jagello 2000 came with the 1999 membership of the Czech Republic and Poland in NATO. Jagello 2000 s flagship project is NATO Days in Ostrava & Czech Air Force Days the biggest security show in Europe. Other key projects include the natoaktual.cz news portal, the Aliante international student competition and the NATO Information Centre in Prague. Jagello 2000 has been the representative of the Czech Republic in the Atlantic Treaty Association since
11
12 Project of warsawsecurityforum.org facebook.com/warsawforum twitter.com/warsawforum
Does NATO s Article V Genuinely Protect Its Members?
Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful
Home Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016
Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 NATO is anything but obsolete. It is needed more now than at any point since the end
REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT
REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT Riga 2013 Introduction In accordance with the National Security Concept, information technology threats or
Cyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session
ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session Note by the Chairman I attach for your information a list of the decisions
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
The Defence Strategy of the Slovak Republic
The Defence Strategy of the Slovak Republic approved by the National Council of the Slovak Republic 23 September 2005 TABLE OF CONTENTS Introduction I II III IV V Slovak Republic in the Changing Security
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
UNDERSTANDING NATO THE ORIGINS OF THE ALLIANCE
UNDERSTANDING NATO THE ORIGINS OF THE ALLIANCE In the aftermath of the Second World War, East and West Europe found themselves separated by the ideological and political divisions of the Cold War. Eastern
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
Option 1: Use the Might of the U.S. Military to End the Assad Regime
1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger
Active Engagement, Modern Defence
Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,
Although the dominant military confrontations of the 20 th century were centered on the
To what extent were the policies of the United States responsible for the outbreak and development of the Cold War between 1945 and 1949? Although the dominant military confrontations of the 20 th century
The European Security Strategy Austrian Perspective
Erich Reiter and Johann Frank The European Security Strategy Austrian Perspective The following essay gives the Austrian view on the ESS from a security political perspective and analyses the needs and
From Blind Love to Strategic Alliance?
From Blind Love to Strategic Alliance? BALTIC-GEORGIAN RELATIONS REVISITED PONARS Eurasia Policy Memo No. 201 June 2012 Kornely Kakachia Tbilisi State University Since the restoration of independence,
NATIONAL SECURiTY STRATEGY OF THE REPUblic Of Poland
NATIONAL SECURiTY STRATEGY OF THE REPUblic Of Poland 2014 NATIONAL SECURiTY STRATEGY OF THE REPUblic Of Poland Warsaw 2014 Bronisław Komorowski, President of the Republic of Poland, approved the National
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
RUSSIA CHINA NEXUS IN CYBER SPACE
RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest
International Relations Networking of the Austrian Armed Forces
International Relations Networking of the Austrian Armed Forces Address given by General Roland ERTL Chief of General Staff, Austrian Armed Forces Ladies and Gentlemen, distinguished guests, The Austrian
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.
Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information
APPROVED VERSION. Centro de Estudios Estratégicos de la Defensa Consejo de Defensa Suramericano Unión de Naciones Suramericanas.
CEED S PRELIMINARY REPORT TO THE SOUTH AMERICAN DEFENSE COUNCIL ON THE TERMS OF REFERENCE FOR THE CONCEPTS OF SECURITY AND DEFENSE IN THE SOUTH AMERICAN REGION The Centre for Strategic Defense Studies
peace, Security and Development in BRICS
BRICS ACADEMIC FORUM 2014: THE ELEPHANT IN THE ROOM: PEACE AND SECURITY IN THE BRICS PARTNERSHIP TOWARDS THE 6 TH BRICS SUMMIT Dr Candice Moore Senior Researcher (ACCORD) and Research Associate (UJ, Faculty
Ukraine Document Based Question (DBQ) Central Question: What is happening in Ukraine?
Ukraine Document Based Question (DBQ) Central Question: What is happening in Ukraine? Map of the Soviet Union and Eastern Europe during the Cold War: Located in Eastern Europe, Ukraine became a part of
"The European Union's Security Architecture and its role to strengthen Peace and Security"
Chairman EU Military Committee General Patrick de Rousiers at the 29 th Asia Pacific Round Table in Kuala Lumpur 02 June 2015 "The European Union's Security Architecture and its role to strengthen Peace
Foreign Affairs and National Security
Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the
NORTH ATLANTIC MILITARY COMMITTEE COMITE MILITAIRE DE L ATLANTIQUE DE NORD
NORTH ATLANTIC MILITARY COMMITTEE COMITE MILITAIRE DE L ATLANTIQUE DE NORD (Final) 16 January 1968 FINAL DECISION ON A REPORT BY THE MILITARY COMMITTEE to the DEFENCE PLANNING COMMITTEE on OVERALL STRATEGIC
Raimonds Rublovskis Latvia
Global Security and Defence Environment in the 21 st Century. Is Constitution of Latvia an Effective Legal Tool to Counter Security Challenges and Threats? Raimonds Rublovskis Latvia Abstract: Fundamental
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
A Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations
CYBER SECURITY THREATS AND RESPONSES
CYBER SECURITY THREATS AND RESPONSES AT GLOBAL, NATION-STATE, INDUSTRY AND INDIVIDUAL LEVELS Heli Tiirmaa-Klaar* Although cyber security has accompanied the ICT sector since the first computer systems
Cybersecurity. Canisius College
Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never
Resources projected in the previous development plan and the reality
NATIONAL DEFENCE DEVELOPMENT PLAN 2013-2022 Resources projected in the previous development plan and the reality 1. The previous 10-year development plan approved in 2009 (Military Defence Development
Assessment Profile: Establishing Curricular Categories for Homeland Security Education
Assessment Profile: Establishing Curricular Categories for Homeland Security Education During any examination or assessment of the subject, homeland security, it becomes quite evident that by the definition(s)
Energy Security: Role of Regional Cooperation
Energy Security: Role of Regional Cooperation Traian Chebeleu Today s Conference is dedicated to a topic that has deeply preoccupied the governments and the business communities in the Emerging Europe,
EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on
TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members
2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS
CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
GOOD SECURITY IS A GROUP EFFORT
THE OFFICE OF SECURITY Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT Operations Security (OPSEC) "Even minutiae should have a place in our collection, for things of a seemingly trifling nature,
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
Final reports on deepened defence cooperation between Finland and Sweden
Final reports on deepened defence cooperation between Finland and Sweden Report by the Finnish Defence Forces and the Swedish Armed Forces 1 Background In this joint final report the Finnish Defence Forces
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout
Team of Training Center Patriot
Team of Training Center Patriot Patriot Training center is a team of military professionals who are instructors from the USA, Israel, Georgia and Ukraine. Combat experience of the team members: Deployments
MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION
MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION WHAT IS MSS The interdisciplinary Military Strategic Studies program is concerned with understanding, analyzing and explaining the military dimension
The Alliance's Strategic Concept
The Alliance's Strategic Concept Approved by the Heads of State and Government participating in the meeting of the North Atlantic Council in Washington D.C. Introduction 1. At their Summit meeting in Washington
Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011
Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011 Notes abstracted from Desmond Ball, China s Cyber Warfare Capabilities, Security Challenges, Vol. 7, No. 2, Winter 2011, pp. 81-103).
COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS
COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS Course Code 2507205 Course Name International Relations of the Middle East In this course the student will learn an historical and
The Meaning of Russia s Campaign in Syria
Defense and Intelligence The Meaning of Russia s Campaign in Syria By S.R. Covington Foreword by Kevin Ryan December 2015 Defense and Intelligence The Meaning of Russia s Campaign in Syria By S.R. Covington
Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325
Erbil Declaration Regional Women s Security Forum on Resolution UNSCR 1325 The Women s Security Forum on Resolution No 1325 for the Middle East and North Africa (MENA) region concluded its work in Erbil
SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF
SPEECH Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH BY PERMANENT SECRETARY (DEFENCE) MR CHAN YENG KIT, AT THE CYBER DEFENDERS DISCOVERY CAMP AWARDS CEREMONY
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Hybrid Warfare & Cyber Defence
Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency
Assessment of the Terror Threat to Denmark
19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals
Russian National Security Policy in 2000
Russian National Security Policy in 2000 Celeste A. January 2000 PONARS Policy Memo 102 Harvard University Although signing a decree granting the new National Security Concept the status of law in January
WHITE HOUSE OFFICE, OFFICE OF THE SPECIAL ASSISTANT FOR NATIONAL SECURITY AFFAIRS: Records, 1952-61 NSC Series, Briefing Notes Subseries
WHITE HOUSE OFFICE, OFFICE OF THE SPECIAL ASSISTANT FOR NATIONAL SECURITY AFFAIRS: Records, 1952-61 NSC Series, Briefing Notes Subseries CONTAINER LIST Box No. Contents 1 AEC--Policy on Use of Atomic Weapons
INTERVIEW WITH ANDERS FOGH RASMUSSEN *
INTERVIEW WITH ANDERS FOGH RASMUSSEN * In this exclusive interview with TPQ, the Honorable Secretary General provides an overview of the major developments of the past two years in Turkey s neighborhood,
The Implication of TMD System in Japan to China s Security
The Sixth ISODARCO Beijing Seminar on Arms Control October 29-Novermber 1, 1998 Shanghai, China The Implication of TMD System in Japan to China s Security Institute of World Economics & Politics Chinese
JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises
EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY Brussels, 11.12.2013 JOIN(2013) 30 final JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL
Long Term Defence Study
Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1 Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges
Eurocentrum Praha 4 th October 2007. A stronger Europe for a better world is the motto of the current Portuguese Presidency.
Eurocentrum Praha 4 th October 2007 Portuguese Presidency of the European Union A stronger Europe for a better world A stronger Europe for a better world is the motto of the current Portuguese Presidency.
Chapter 2 Strengthening of the Japan-U.S. Alliance
Chapter 2 Strengthening of the Japan-U.S. Alliance Based on the Japan U.S. Security Treaty, the Japan-U.S. Security Arrangements, together with Japan s own efforts, constitute the cornerstone for Japan
PROHIBITION OF MERCENARY ACTIVITIES AND PROHIBITION AND REGULATION OF CERTAIN ACTIVITIES IN AREAS OF ARMED CONFLICT BILL
REPUBLIC OF SOUTH AFRICA PROHIBITION OF MERCENARY ACTIVITIES AND PROHIBITION AND REGULATION OF CERTAIN ACTIVITIES IN AREAS OF ARMED CONFLICT BILL (As introduced in the National Assembly as a section 75
Description of the program
Study program Faculty Cycle Public Administration Public Administration and Political Sciences Undergraduate ECTS 180 Offered in Tetovo and Skopje Description of the program The program for Public Administration
SECOND INVESTIGATION DEPARTMENT UNDER THE MINISTRY OF NATIONAL DEFENCE ASSESSMENT OF THREATS TO NATIONAL SECURITY
SECOND INVESTIGATION DEPARTMENT UNDER THE MINISTRY OF NATIONAL DEFENCE ASSESSMENT OF THREATS TO NATIONAL SECURITY Vilnius 2014 2 Contents INTRODUCTION... 3 REGIONAL SECURITY... 4 Russia... 4 Belarus...
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
Regional Anti-Corruption Action Plan for Armenia, Azerbaijan, Georgia, the Kyrgyz Republic, the Russian Federation, Tajikistan and Ukraine.
Anti-Corruption Network for Transition Economies OECD Directorate for Financial, Fiscal and Enterprise Affairs 2, rue André Pascal F-75775 Paris Cedex 16 (France) phone: (+33-1) 45249106, fax: (+33-1)
Ministry of Defence Bosnia and Herzegovina
Centre for Security Cooperation Military Academy "General Mihailo Apostolski"-Skopje Ministry of Defence Bosnia and Herzegovina Ministry of Foreign Affairs Bosnia and Herzegovina Ministry of Security Bosnia
EXPERT EVIDENCE REPORT
Criminal Justice Act 1988, s.30 Magistrates Courts Act 1980, s.5e Criminal Procedure Rules (2014), r.33.3(3) & 33.4 EXPERT EVIDENCE REPORT NOTE: only this side of the paper to be used and a continuation
An Interactive Planning Approach to Shaping U.S.-Russian Relations
An Interactive Planning Approach to Shaping U.S.-Russian Relations PONARS Eurasia Policy Memo No. 172 September 2011 Dmitry Gorenburg Harvard University U.S. policy toward Russia, as toward the rest of
1 FOCUS Foresight Security Scenarios
New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military
Georgia: Five Years of Non-Action
Georgia: Five Years of Non-Action The Failure to Investigate the Crimes of the Russian- Georgian War of August 2008 No. 4-2014 After the brief war in Georgia in August 2008, when Russia invaded and for
Action Plan 2010-2015 for Canada s Cyber Security Strategy
Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
Dr.Karoly Gruber (Szechenyi Istvan University of Gyor, Hungary): The European Union, Central Europe and Russia: Cooperation and/or containment?
Dr.Karoly Gruber (Szechenyi Istvan University of Gyor, Hungary): The European Union, Central Europe and Russia: Cooperation and/or containment? Perspectives on Political Transformation in Central and Eastern
Europol External Strategy. Business Case: Cooperation with Georgia
A EX 3 The Hague, 4 April 2012 File no. 2641-127 Edoc # 595554v8 Europol External Strategy Business Case: Cooperation with Georgia 1. Aim The purpose of this Business Case is to provide additional information
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
EU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
ENERGY PRIORITIES OF THE POLISH PRESIDENCY OF THE EU COUNCIL: THE CZECH PERSPECTIVE
ENERGY PRIORITIES OF THE POLISH PRESIDENCY OF THE EU COUNCIL: THE CZECH PERSPECTIVE Petr Binhack Energy Security as a Part of the EU Agenda Energy is an important precondition for European economic development.
The Future of the ENP
Open Europe Programme Warsaw, June 2015 The Future of the ENP Some remarks and recommendations Grzegorz Gromadzki (Stefan Batory Foundation) Bastian Sendhardt (Friedrich-Ebert-Stiftung, Representation
MINISTRY OF NATIONAL DEFENCE BUDGETARY DEPARTMENT. BASIC INFORMATION ON THE MoND BUDGET FOR 2016
MINISTRY OF NATIONAL DEFENCE BUDGETARY DEPARTMENT BASIC INFORMATION ON THE MoND BUDGET FOR 2016 Warsaw, February 2016 Basic Macroeconomic Indicators 2016 National budget 2016 Defence budget 2016 2,00%
Master of Arts in International Affairs
Master of Arts in International Affairs Introduction The Master of Arts in International Affairs program at NGCSU is designed to provide an advanced understanding of the international system along with
CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC
124 CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC Vladimíra Trnkócyová 56 General background Historical overview and future vision of investigation in the Slovak Republic The 2001 Accession Partnership
F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations
Brussels, 24 March 2014 140324/01 F A C T S H E E T EU-US Summit (Brussels, 26 March 2014) and EU-US relations The Leaders of the European Union and the United States of America will meet on 26 March 2014
A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note
A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,
m a s t e r o f s c i e n c e i n
m a s t e r o f s c i e n c e i n Global affairs The M.S. in Global Affairs is the flagship graduate program of the Center for Global Affairs (CGA), ranked by the Foreign Policy Association in 2010 and
The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices
The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices Hans Born, Senior Fellow, DCAF Geneva Brussels, 29 April 2004 Presentation given at the Book
Espionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
The National Counterintelligence Strategy of the United States
The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence
