Asymmetric Warfare Within Hybrid Warfare. Dr Rod Thornton, King s College London

Similar documents
The StratCom-Security Nexus

Methods of Psychological Influence on Military Personnel and Civilians in Latvia. Dr.psych., OF-3 Andzela Rozcenkova

Chapter 8: The Use of Force

Appendix 5 Deterrence as a security concept against ambiguous warfare

BEYOND BORDERS: TRANSITIONING NATO TOWARDS HUMAN SECURITY NATO STUDENT POLICY PAPER COMPETITION Oscar Vejen Lacoppidan

The EU and Russia: our joint political challenge

G8 Declaration on Counter Terrorism

May ELN Issue Brief: Deterrence. NATO s Evolving Modern Deterrence Posture: Challenges and Risks. Łukasz Kulesa Thomas Frear

RUSSIAN CYBER STRATEGY AS PART OF FOREIGN POLICY

The French against the crisis of democracy:

THE CHALLENGE OF THE GRAY ZONE. Presentation to the Strategic Multilayer Assessment

To understand how USA used financial aid to fight Communism in post-war Europe (Marshall Plan) Cold War develops. Aim:

MIND HACKING : INFORMATION WARFARE IN THE CYBER AGE

CD Compilation Copyright by emilitary Manuals

Russian Next Generation/Hybrid Warfare Study: Using Crimea to Assess the Vulnerability of the Baltic States

Making Sense of the Present and Future Operating Environment: Hybrid Threats and Hybrid Strategies in a Historical Context

Criminal Justice: A Brief Introduction Twelfth Edition

INCREASING THE RESILIENCE OF LITHUANIAN DIASPORA TO DISINFORMATION KRISTINA BELIKOVA & AURELIJA OLENDRAITĖ

Some Reasons Why International Terrorism Has Not Yet Become the Common Enemy of Mankind

End of WWI and Early Cold War

Manifesto EPP Statutory Congress October Bucharest, Romania

A continuum of tactics. Tactics, Strategy and the Interactions Between Movements and their Targets & Opponents. Interactions

epp european people s party

Thought Leader Summary. Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe Program, CSIS

Countering Information War Lessons Learned from NATO and Partner Countries. Recommendations and Conclusions

#HIS311 Canadian External Relations (2016)

Current Challenges in the Euro-Atlantic Region with a Special Focus on Hybrid Aspects

Cyberspace clickskrieg represents a dramatic. The Internet and Psychological Operations ANGELA MARIA LUNGU. The Information Battlefield

DRAFT REPORT. EN United in diversity EN 2015/2001(INI) on the state of EU-Russia relations (2015/2001(INI)) Committee on Foreign Affairs

Lies, Damned Lies and Russian Disinformation. The Russian Federation. Paul Goble. Executive Summary

CONVENTIONAL WARS: EMERGING PERSPECTIVE

o I agree to continue (1) o I do not agree to continue (2)

Countering Color Revolutions

The combination : an instrument in Russia s information war in Catalonia

LIMITE EN COUNCIL. Brussels, 14 November 2008 THE EUROPEAN UNION 15175/08 LIMITE JAI 597 ENFOPOL 209 COTER 78. "A" ITEM NOTE from : COREPER

CRIMORG 197 ENFOPOL 244 ENFOCUSTOM 106 NIS 160 PARTIAL DECLASSIFICATION

Den Haag October 2016

Joya criticizes big media for complicity in the atrocities of war/occupation

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo

Robbins Part 3. Resistance and Rebellion

Patterns of Conflict and Cooperation in Northern Europe. Prof. Dr. Mindaugas Jurkynas Vytautas Magnus University (Kaunas)

Image: NATO. Report NATO and Russia: managing the relationship Wednesday 21 Friday 23 October 2015 WP1437. In association with:

Accompagnement de la mise en place et du fonctionnement de la Commission Vérité et Réconciliation au Burundi

Addressing Unhealthy Policies

Russian Information Warfare Trend Analysis

Policy Recommendations and Observations KONRAD-ADENAUER-STIFTUNG REGIONAL PROGRAM POLITICAL DIALOGUE SOUTH CAUCASUS

o I agree to continue (2) o I do not agree to continue (3)

TWELVE FACTS AND FALLACIES ABOUT THE CONVENTION ON CLUSTER MUNITIONS

INNOVATIVE SOLUTIONS IN MODERN SCIENCE 2 (2), 2016

Dear Chairman Esteemed Red Cross and Red Crescent leaders and colleagues

Public Schools: Make Them Private by Milton Friedman (1995)

NATIONAL DEFENCE AND SECURITY

Document No. 1: CIA Intelligence Assessment, Gorbachev s. Domestic Gambles and Instability in the USSR. September 1989

Conference RUSSIA S INFLUENCE STRATEGY IN EUROPE: MOSCOW AND EUROPEAN POPULIST PARTIES OF THE FAR-RIGHT AND FAR-LEFT

International Council on Social Welfare. Global Programme 2005 to 2008

Conflict in the 21 st Century

Security Union and the digital sphere: unpacking securitization processes

Political Science Courses, Spring 2018

Shared Vision, Common Action, Stronger Europe Is the Implementation of the EU Global Strategy Meetings Expectations?

Examiners Report June GCE Government and Politics 6GP03 3D

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

Name: Period 7: 1914 C.E. to Present

Examiners Report June GCE Government and Politics 6GP03 3D

Examiners Report June GCE Government and Politics 6GP03 3D

The EU and the Black Sea: peace and stability beyond the boundaries?

RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO

WORLD HEALTH ORGANIZATION (WHO)

BIOMETRICS - WHY NOW?

Europe and North America Section 1

Modern Terrorism and Counter-Terrorism Strategies

Estonia and Russia through a Three-Way Mirror VIEWS OF THE POST-SOVIET GENERATION

Analysis of the Draft Defence Strategy of the Slovak Republic 2017

The 2017 Israeli Foreign Policy Index of the Mitvim Institute

Mr Speaker, Mr Deputy Prime Minister, Madam Special Representative, dear Miroslav, Members of Parliament, General, Ladies and Gentlemen;

The Legacies of WWII

Examiners Report June GCE Government & Politics 6GP03 3D

Introduction to the Cold War

Obama vs. McCain on Peacekeeping By: Josh Rovenger. The end of World War II signified a transition from one era in international

PROPAGANDA. Prepared by Thomas G. M. Associate Professor, Pompei College Aikala DK

The Demands of Strategic Leadership: Quo vadis Europe?

NATO s Challenge: The Economic Dimension

Testimony by Joerg Forbrig, Transatlantic Fellow for Central and Eastern Europe, German Marshall Fund of the United States

PONARS Eurasia Policy Conference

Absolute Monarchy In an absolute monarchy, the government is totally run by the headof-state, called a monarch, or more commonly king or queen. They a

"U.S. Objectives with Respect to the USSR to Counter Soviet Threats to U.S. Security," NSC 20/4, 23 November 1948

RISING TO THE CHALLENGE AS INFORMATION TAKES CENTRE STAGE

THE NUCLEAR REVOLUTION AND WORLD POLITICS

UK DELEGATION PROPOSED AMENDMENTS IN RED (paragraphs 31, 32 and 42)

Colloquium Brief DEFENSE, DEVELOPMENT, AND DIPLOMACY (3D): CANADIAN AND U.S. MILITARY PERSPECTIVES

Advancing the Disarmament Debate: Common Ground and Open Questions

THE AIMS OF THE EUROPEAN MONETARY SYSTEM (EMS) AND THE EUROPEAN PARLIAMENT J. POSADAS

ANNUAL SURVEY REPORT: ARMENIA

Security Implications of Russian Strategic Communication and Information Warfare in the Eastern Partnership Countries

Non-Proliferation and the Challenge of Compliance

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism

The Differences Between the 2 Sides Under Soviet communism, the state controlled all property & economic activity In capitalistic America, private

Global Counterterrorism Forum Official Launch 22 September 2011 New York, NY. Political Declaration

Poland s Rising Leadership Position

'Choice vs Fairness': The Australian Industrial Relations Battleground. Professor Margaret Gardner 1 RMIT University

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?

Transcription:

Asymmetric Warfare Within Hybrid Warfare Dr Rod Thornton, King s College London

Asymmetric warfare and hybrid warfare Both are seen as different from the norm of warfare. Both tend to be products of the weak. Current Russian hybrid warfare employs asymmetric techniques.

What is asymmetric warfare? Not merely weak vs strong. Warfare that cannot be mirror-imaged. It works fundamentally on the principal that the strengths of the stronger actor should be turned into vulnerabilities by the weaker actor.

Differences between hybrid warfare and asymmetric warfare Hybrid Strength from synergy Long-term planning Targets civilian mindsets mostly Undermining morale is main aim (helps generate inner decay ) Asymmetric Independent actions Ad hoc Military targets mostly Undermining morale is minor aim

Inner decay Principal aim of Russian hybrid warfare is to create instability in a targeted state it can then be more easily manipulated by Moscow. Russian government publication: Instead of straightforward occupation and the use of force, it is recommended that indirect approaches be used and efforts made to subdue the adversary to cooperation either by coercion or by allowing the adversary to lead itself towards the desired direction. (V. I. Lutovinov, The Military Policy of the Russian Federation in the Conditions of Globalisation, 2009)

Asymmetric techniques within hybrid warfare turning strengths into vulnerabilities Mode of hybrid warfare: Information warfare A strength of liberal democracies is that they allow free speech. This is turned against them as they cannot adequately prevent propaganda designed to generate the inner decay.

Asymmetric techniques within hybrid warfare turning strengths into vulnerabilities Mode of hybrid warfare: Generating protest To make use of internal opposition throughout the adversary s area as a permanent front. (General Valerii Gerasimov, 2015) Generates inner decay. Strength of democracies is to allow protest. Turned against them.

Asymmetric techniques within hybrid warfare turning strengths into vulnerabilities Mode of hybrid warfare: Contactless war Military power used mostly as tool to generate psychological effect. Goals will be achieved by using clandestine military operations, information confrontation and special operations. (Gerasimov, 2015) Thus is does not matter how good an adversary state s military is if that state is given no legal excuse to use it. Idea also is not to do anything that will allow the use of action under NATO s Article 5. Strength is turned into vulnerability. Spreads disunity in NATO.

Asymmetric techniques within hybrid warfare turning strengths into vulnerabilities Mode of hybrid warfare: Integration Russian hybrid warfare shows close coordination between military and civilian realms synergy (force multiplier). Therefore responses, to be truly effective, have to show a similar coordination. But almost impossible. A great strength of liberal democracies is the separation of powers military and civilian. This is turned into a vulnerability by Russian hybrid warfare.

Conclusion Asymmetric warfare seeks to turn the strengths of an opponent into vulnerabilities. Russian hybrid warfare techniques use this asymmetric principle to great advantage. Recognising this is occurring is one thing, but actually countering it is something else it is very difficult.