IRMO BRIE F IRMO. Hybrid Warfare

Similar documents
IRMO BRIE F IRMO. Security and Defense Challenges in the Baltic Region: The Finnish Perspective. by Elina Lepomäki. Introduction

IRMO BRIE F IRMO. Midterm elections in the United States: A boost or a setback for President Donald Trump. By Krševan Antun Dujmović.

IRMO BRIE F IRMO. Hungary Before the Elections: Assessing Foreign Policy Achievements. By Márton Ugrósdy

IRMO BRIE F IRMO. United States After the Presidential Election 2016: Continuation or Abandonment of Obama s Foreign Policy. Krševan Antun Dujmović

CONVENTIONAL WARS: EMERGING PERSPECTIVE

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

Making Sense of the Present and Future Operating Environment: Hybrid Threats and Hybrid Strategies in a Historical Context

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010

ISTANBUL SECURITY CONFERENCE 2018

WORKING DOCUMENT. EN United in diversity EN

NATO STRATEGY TO DEFEAT ENEMY FORCES IN THE HYBRID WAR

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

IRMO BRIEF 12 IRMO. Understanding China s Foreign Policy Goals in Asia Through the South China Sea Disputes

The United States, China, and the Global Commons

Policy paper. Contemporary Global Security Challenges. Dr. Sandro Knezović Nani Klepo MA

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management

Royal United Services Institute for Defence and Security Studies. Conference Report. Urban Warfare. Past, Present, Future.

United Nations Security Council (UNSC) 5 November 2016 Emergency Session Regarding the Military Mobilization of the DPRK

Militarization of Cities: The Urban Dimension of Contemporary Security.

Appendix 5 Deterrence as a security concept against ambiguous warfare

Research Report. Leiden Model United Nations 2015 ~ fresh ideas, new solutions ~

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD

Noise in the Gray Zone:

Finland's response

In U.S. security policy, as would be expected, adversaries pose the

IRMO BRIE F IRMO. Spitzenkandidaten and shifting electorates: Towards the 2019 European Parliament elections. By Milan Igrutinović.

Presidency Summary. Session I: Why Europe matters? Europe in the global context

Security Forum: Experience Sharing between Baltic and Black Sea Regions

Center for Strategic & Regional Studies

Preface to the Seventh Edition

Thinking About a US-China War, Part 2

Journal of Military and Strategic. Studies. Bradley Martin

FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE

ISTANBUL SECURITY CONFERENCE 2017 New Security Ecosystem and Multilateral Cost

Is This the Right Time for NATO to Resume Dialogue with Russia?

and the role of Japan

Press Release learning these lessons and actually implementing them are the most implication of the conclusions of the Commission.

Strategic Intelligence Analysis Spring Russia: Reasserting Power in Regions of the Former Soviet Union

for improving the quality of primary, secondary, professional and higher education?

Asymmetric Warfare Within Hybrid Warfare. Dr Rod Thornton, King s College London

IPIS & Aleksanteri Institute Roundtable 11 April 2016 IPIS Tehran, Iran

Security Education for the Prevention of Terrorism

Global View Assessments Winter 2016

CHINA IN THE WORLD PODCAST. Host: Paul Haenle Guest: Wang Yizhou

Chinese Reactions to Japan s Defence White Paper

Statement by. President of the Republic of Latvia

THE CHALLENGE OF THE GRAY ZONE. Presentation to the Strategic Multilayer Assessment

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire

PC.DEL/754/17 8 June 2017

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH

Roundtable to Discuss Russian Involvement in Ukraine s Elections

Be afraid of the Chinese bearing gifts

NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION. SACT s remarks to National University of Public Service

IRMO BRIE F IRMO. German Elections Aftermath: Self-Perceptions and Perceptions

Humanitarian Space: Concept, Definitions and Uses Meeting Summary Humanitarian Policy Group, Overseas Development Institute 20 th October 2010

THE NPT, NUCLEAR DISARMAMENT, AND TERRORISM

COLLECTIVE SECURITY AND THE USE OF FORCE

Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE"

BEYOND BORDERS: TRANSITIONING NATO TOWARDS HUMAN SECURITY NATO STUDENT POLICY PAPER COMPETITION Oscar Vejen Lacoppidan

Nato s continuing non-proliferation role

Sea of Flames. The Russia-Ukraine possible escalation in the Black and Azov Seas. A work by Fabio Seferi

Warm ups *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two?

ISTANBUL SECURITY CONFERENCE 2016

THE HOMELAND UNION-LITHUANIAN CHRISTIAN DEMOCRATS DECLARATION WE BELIEVE IN EUROPE. 12 May 2018 Vilnius

CONFERENCE BACKGROUND GUIDE

EU Global Strategy: Empty Wishes, No Real Plan

Europe s Role in Strengthening Transatlantic Security and Defense

CHINA IN THE WORLD PODCAST. Host: Paul Haenle Guest: Su Hao

Balance of Power. Balance of Power, theory and policy of international relations that asserts that the most effective

Next- Generation National Security and Public Safety in Europe

Future Japan-Australia Pathways to Defence Collaboration: The Australian Perspective

Román D. Ortiz Coordinador Área de Estudios de Seguridad y Defensa Fundación Ideas para la Paz Bogotá, Abril 30, 2009

Ontario Model United Nations II. Disarmament and Security Council

LESSONS IDENTIFIED FROM SOMALI PIRACY

U.S.- Gulf Cooperation Council Camp David Joint Statement

Germany and the Middle East

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

C I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL

Briefing on Sixth Committee of the United Nations General Assembly 1. History of the Sixth Committee

Terrorism in Africa: Challenges and perspectives

Neutrality and War (Delivered October 13, 1939)

Military- Humanitarian Integration. The promise and the peril

AP Comparative Government

Course: Government Course Title: Power and Politics: Power, Tragedy, and H onor Three Faces of W ar Year: Spring 2007

Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations

Resilience in the Western Balkans

It is my utmost pleasure to welcome you all to the first session of Model United Nations Conference of Besiktas Anatolian High School.

ÖB anförande 16 maj vid KKrVA internationella konferens Military Thinking in the 21st Century

Defence Cooperation between Russia and China

TOPICS (India's Foreign Policy)

RUSSIA'S FOOTPRINT IN THE NORDIC-BALTIC INFORMATION ENVIRONMENT PREPARED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE

ISAS Insights. Challenges of Identity and Issues. Introduction. No March South Asia and the Rapidly Changing World 1 I

D.4.4. Policy recommendations report on managing the changing relationship between CFSP/CSDP and the jurisdiction and activities of FRONTEX

Colloquium Brief DEFENSE, DEVELOPMENT, AND DIPLOMACY (3D): CANADIAN AND U.S. MILITARY PERSPECTIVES

ROMANIA - FOREIGN RELATIONS AND NATIONAL SECURITY

EUROSUR. Protecting the Schengen external borders. Protecting migrants' lives

Objectives To explore the meanings of conflict and war. To make deductions and practise reasoning skills.

Transcription:

IRMO Institut za razvoj i međunarodne odnose Institute for Development and International Relations IRMO BRIE F Ured u Zagrebu 02 2017 Hybrid Warfare By Dr. Sandro Knezović and Nani Klepo Introduction Contemporary international relations are carrying a wide range of challenges that have led to the necessity to rede ine existing national and international strategies grounded predominantly on conventional state-based threats. Recognising vulnerability to non-conventional challenges, contemporary strategies are increasingly acknowledging the importance of the changing character of warfare. Namely, not only have the non-conventional threats become increasingly perilous, but the overlapping of different classes of threats have dramatically increased the complexity of existing challenges. This leads to a conclusion that future con licts are very likely to be multidimensional, with blurring and combined forms of combat characterised by expanding dynamics and growing destructiveness, frequently called hybrid. Due to the fact that it includes a wide range of fairly unconsolidated categories, the term itself had received a signi icant amount of criticism related to an alleged lack of conceptual clarity. Still, while the mainstream transatlantic security policy elites largely operate in traditional terms and only modestly use the contemporary framework of strategic thinking, the challenges and increasingly assertive opponents are following a different path.... future con licts are very likely to be multidimensional, with blurring and combined forms of combat characterised by expanding dynamics and growing destructiveness, frequently called hybrid. 1

In practical terms, unlike the case of traditional conventional military incursion, hybrid warfare (HW) encloses a wide range of belligerent activities like economic pressure of various types, subversive IT operations, sabotages in the ield of critical infrastructure, undercover intelligence operations, informational and legal warfare, terrorist and criminal actions, as well as many others. Its main characteristics is actually the extension of the combat zone beyond the exclusively military domain and an increasingly complex combination of military and non-military methods. Also, the vagueness of hybrid threats makes them even harder to detect and increasingly lethal, due to the fact that they complicate the decision-making procedure of the opponents and expose their vulnerabilities. Furthermore, hybrid actors are capable of integrating high-tech systems into their frameworks of operation and use it beyond mainstream standards, what makes them effectively superior to the existing operational systems of the transatlantic security community. While non-state actors ind it relatively easy to acquire military and non-military capabilities in an increasingly interconnected world, states with capabilities to govern their power tools in a highly centralistic way can actually generate synergic and magnifying effects. Asymmetrically, liberal democracies with fairly complicated bottom-up decision-making procedures are inding it increasingly dif icult to respond to this challenge. De inition and characteristics Throughout history, unconventional tactics and means usually brought advantage or victory in war, therefore irregular components are nothing new in warfare. One can say that every era had its own war style that re lected its challenges, lifestyle and degree of development. Today we are living in a highly digitalized and connected world that is also fast and carrying a variety of complex and new challenges to which contemporary warfare needs to give an answer.... HW blurs modes of war and the perception of who ights and what technologies are brought to bear, producing a wide range of variety and complexity. There is a debate in academic and military circles about contemporary warfare, its de inition and name. There are terms such as compound war or unrestricted warfare that tried to de ine the complexity of modern warfare, but the most unifying term turned out to be HW. Although there is no universal de inition of the term, the most accepted one is by Frank Hoffman who argues that HW blurs modes of war and the perception of who ights and what technologies are brought to bear, producing a wide range of variety and complexity. Hoffman successfully targeted three main characteristics of HW that distinguishes it from other irregular types of warfare and describe modern wars: diversi ication of warfare actors, usage of modern technology and convergence of all means for military purpose. 2

In HW, the state loses its monopoly over the war and non-state actors equally participate in it using both military and non-military tools in particular. Non-state actors have grown capabilities and capacities to confront any state actor and be an independent player in the war. The state increasingly uses unconventional and non-military means and often sponsors non-state actors inancially, with weapons or additional force, therefore creating a hybrid army. Furthermore, in his de inition of HW, Hoffman argues that all elements of hybrid warfare can be conducted by separate units which are generally, operationally and tactically directed and coordinated within the main battlespace to achieve synergic effects. Therefore, the lines are blurred between organization, command and control structure. It is often uncertain who is leading the organisation and to which level the state is included. Modern technology has advanced contemporary warfare and maximised ef iciency, where actors have various high-tech lethal systems and devices at their disposal, usable for cyber-attacks and available to terrorist groups. Because of internet and IT technologies, cyber and information warfare are the most important dimensions of HW. Information warfare, including espionage, placement of disinformation, use of telecommunications for propaganda and possibilities of social networks became of growing importance for achieving military and political goals. Also, the complexity of cyberspace enables anonymity for the actors and leaves only speculations about the responsibility and involvement of the state. Furthermore, individuals can easily take part in the war due to internet, digitalization and its interconnectivity. The complexity of HW lies in the convergence of all available methods and modes including conventional and unconventional capabilities, tactics, weapons and formations, modern technology, terrorist and criminal acts. The fact that even states are not reluctant to use unconventional methods reveals the Machiavellian nature of HW where the end justi ies its means. Also, instead of a classical military against military con lict, all power capabilities are used against the vulnerability of the opponent. Such tactics of targeting and attacking an opponent s vulnerability in an unconventional way, using all available means, enables the diversi ication of actors and an inferior army or a group to overcome much stronger military power. HW comes as a re lection of the hybrid threats and modernity, bringing along more lethal wars. We are facing a fusion of war forms, a convergence of regular and irregular components at all levels, with unclear boundaries between actors. Examples of HW in contemporary international relations The debate about HW arose after the Russian annexation of Crimea and its actions in Eastern Ukraine which has been broadly taken as a show case of the phenomenon. Information warfare in a form of network intrusion, taking over and controlling of the information environment and infrastructure preceded the annexation of Crimea. Russian soldiers 3

removed the national and ranking signs from uniforms ( little green men ) and took over the TV and radio stations and mobile phone operators. The most popular social network in Ukraine, VKontakte, has been overtaken and blocked, furthermore, the website of the Russian opposition leaders was intruded and the e-mails and phone calls of Ukrainian government and western diplomats were intercepted. Synergy and coordination of Russian military means with intelligence, modern technology and cyberspace operations signi icantly increased the effectiveness of Russian actions. Russia strategically targeted points of action and with HW methods acted in an ambiguous way leaving the international community, and NATO in particular, little room for manoeuvre. Also, Russia exploited the possibilities of cyberspace that lacks binding regulations and operates in the grey zone, where the West has dif iculties to react properly. Synergy and coordination of Russian military means with intelligence, modern technology and cyberspace operations signi icantly increased the effectiveness of Russian actions. Wars in Georgia and especially in Chechnya were lessons learned for Russia. In Chechnya, it confronted a seemingly untrained and amateur opponent that in the end proved to be highly organised and capable of successfully implementing modern technology in warfare, creating historical background for Russian contemporary military doctrine. Furthermore, Russian HW should be perceived in context of USA s unreachable military capabilities and spending, where in order to maintain relevance, unconventional and creative tactics are necessary. The term HW, which is usually used in the West, is often rejected in Russia, however, even Russian highest military personnel, such as the Chief of the General Staff, admitted that the development of contemporary warfare is going in a somewhat hybrid direction, with increased importance of non-military and non-standard means, converged with asymmetrical actions and modern technology. Usage of HW is also increasingly relevant in China s attempts to acquire control over the geostrategically vital South China Sea. Similar to Russia s little green men, it uses little blue men to uphold and amplify the dominance over some islands with disputed territorial status. So, apart from China s navy and coast-guard, a so-called maritime militia has rapidly developed over the course of the last decade, taking an increasingly important role in implementing the country s strategy in the Southeast Asian archipelago. The curiosity is that it is comprised of thousands of civilian ishermen boats that are regularly used to rebound US navy vessels and those of neighbouring states with competing territorial assertions. In this manner, China is successfully widening its control in the South China Sea (reclaimed approximately 13 km2 in total) with relatively assertive actions that are, however, still below the threshold of open military con lict and are not up to the level of criteria for military engagement of neighbouring countries and other interested parties. These tactics have 4

ensured ambiguity and deniability, which enabled China to maintain regional stability which actually generates signi icant economic pro it for the country and consequentially strengthens its strategic position. Usage of HW is also increasingly relevant in China s attempts to acquire control over the geostrategically vital South China Sea. The ishermens s leet has expanded tenfold during the last few years, improving its overall as well as ire-power capabilities and has been assisting in a few hundreds of law enforcement operations in that period. Its signi icance for China s regional policy is visible from the fact that the maritime militia not only receives military training and equipment from the navy, but that its personnel obtains the same amount of compensation for physical disability caused during the service as other state administration employees. The USA had its own HW moments, especially in its war against ISIL, where, besides the use of conventional military power, it also supported Iraqi government troops, various opposition forces in Syria and Kurdish Peshmerga forces. Furthermore, one can note the fact that, actually, proxy wars and information warfare is nothing new to the US pragmatic approach to various challenges in the international arena throughout the decades. There are numerous examples from 20th century political developments in Latin America where the US used different methods for facilitating direct in luence over the structure and function of the political systems. There are also different examples of the usage of media for political purposes during the Cold War, when even the pro it-driven Hollywood ilm industry was not entirely cleansed from direct in luence of the US state administration. Furthermore, energy-related interests in the Middle East kept US decision makers active in attempts to in luence or sometimes even topple political regimes in that part of the world. A contemporary example of HW usage in American foreign policy is the UUV (underwater unmanned vehicle) captured by the Chinese Navy in the waters of the South China Sea. When it comes to direct con lict, the US uses its advantage conventional military force, where it has no measurable opponent but once the sphere of interest is targeted there is no hesitation for usage of intelligence and irregular methods for detecting vulnerability of the opponent and reaching its political and military goals. When it comes to direct con lict, the US uses its advantage conventional military force, where it has no measurable opponent but once the sphere of interest is targeted there is no hesitation for usage of intelligence and irregular methods for detecting vulnerability of the opponent and reaching its political and military goals. 4

In the 2006 Israel Hezbollah war, the state of Israel was seriously challenged by a non-state group Hezbollah in an unconventional and unexpected way, commencing the theory of HW. Besides conventional armament supplied by Iran, Hezbollah used guerrilla tactics, irregular forces, terrorism, crime and information warfare within a highly coordinated but multiple structure. Very similar HW characteristics can be found in ISIL s actions and tactics in Syria and Iraq, where military operations were converged with terrorism, guerrilla and technology. ISIL used the advantage of the terrain, especially the desert and urban areas, and its shape-shifting ability to demilitarize and transform from a strategic armed organization to a civil citizen groups. Mainstream interpretations of the last two mentioned examples, before Russian actions in Ukraine, could mislead to the conclusion that HW is exclusively related to irregular actors and represents only a security challenge, rather than the future form of war. But after the 2014 events, HW is accepted as a contemporary form of warfare where lines between war and peace are blurred with ambiguity and deniability and neither is related only to non-state actors and war time in the conventional sense. Conclusion Although irregular methods in warfare are not a novelty, HW with its speci ic characteristics is becoming a synonym for contemporary wars. HW is a product of the modern, digitalized and interconnected world that changed our life and values and brought many new security challenges that are also hybrid and interconnected in nature. HW developed as a converged war with the overlapping of military and non-military means, conventional and unconventional methods. We have come to the point where even states don t hesitate to use all means available for reaching their goals, successfully avoiding international law, peace conventions and declarations due to the ambiguity and blurred lines between war and peace. HW enabled actors to conduct war without declaring it and therefore creates a false picture of security and stability, while assertive actions are being undertaken. HW enabled actors to conduct war without declaring it and therefore creates a false picture of security and stability, while assertive action are being undertaken. HW is not only a security challenge that needs to be handled, but a future form of war and Russian, Chinese and US actions prove it. There is no doubt that while still being relevant, hard, conventional power is not the core of modern warfare, but, most certainly, creative strategies, modern technology and unconventional methods have a growing importance in the contemporary security context. The crucial characteristic of HW is modern technology used in unexpected and new ways, as well as the cyber dimension of war. Cyber space made HW more complex by opening another battle ield virtual, intangible and capable of doing serious damage. With its fast development and its endless possibilities for in licting harm it 5

prevents immediate response, leaving the victim only to ix the damage already done. Described examples prove that HW evolved from small and proxy wars to an adopted contemporary form of war used by the biggest powers. China s moves in the South China Sea, events in Ukraine and the US attitude towards use of intelligence and modern high-tech devices have shown that a rede inition of war and an acceptance of new game rules is evident. In that light, this is where developed capacities of intelligence sharing and other forms of cooperative approach to security come to the fore. Highly sophisticated challenges can obviously be countered only with highly sophisticated methods in a cooperative manner in the contemporary international environment where even the strongest global power cannot respond individually. Dr. Sandro Knezović is a Senior Research Associate at the Institute for Development and International Relations (IRMO). MA Nani Klepo is a Project Associate at the Institute for Development and International Relations (IRMO). IRMO Institut za razvoj i međunarodne odnose Institute for Development and International Relations Institute for Development and International Relations - IRMO Lj. F. Vukotinovića 2, Zagreb, Croatia www. irmo.hr Ured u Zagrebu Hanns Seidel Stiftung Amruševa 9, Zagreb, Croatia www. hanns-seidel-stiftung.com.hr Institute for Development and International Relations IRMO, ISSN 1849-9155