scholarly journals ANCAMAN STRATEGI HYBRID WARFARE RUSIA: SEBUAH PERSEPSI DAN MANIFESTASI KEBIJAKAN ESTONIA

2019 ◽  
Vol 1 (1) ◽  
Author(s):  
Dyah Lupita Sari

In recent years, Russia has developed a hybrid warfare strategy as a tactic to carry out war operations to achieve their national interests. Estonia is considered the most vulnerable country in the face of the threat of a Russian hybrid warfare strategy. In this case, Estonia has historical, geopolitical and political value for Russia. Estonia has received signs of the Russian threat manifested through their aggressive actions in Estonia with hybrid projections that have been projected in a real way. Thus, the Russian hybrid warfare strategy can influence the perception of the Estonian threat which was finally responded through a policy to stem the threat of hybrid itself. Underlying the analysis of the Threat Perception theory proposed by Raymond Cohen, this paper will explain how the Estonian threat is perceived by the Russian hybrid warfare strategy by looking at the threatening cue and responses to the  threats. This paper has the argument that the hybrid warfare strategy is a threat to Estonia. The historical factor of Russian-Estonian relations and past experience of threats is a sign of a threat that influences the perception of Estonian threats. Estimation of the threat was then manifested by Estonia in the form of anticipatory actions through increased cooperation with NATO, an increase in Estonia's military capabilities, and other non-military approaches in counter Russian warfare hybrid strategy. Keywords: Hybrid Warfare, Russia, Estonia, threat perception, threatening cue, asymmetric threat, cyber security, disinformation, NATO

2021 ◽  
Vol 7 (2) ◽  
pp. 309
Author(s):  
Novky Asmoro ◽  
Andi Sutomo ◽  
Teguh Haryono ◽  
Rizki Putri

<div><p class="Els-history-head">Defense Doctrine and Strategy are designed to be able to synergize the performance of military and non-military components to protect and maintain Indonesia's national interests. The current doctrine of the Indonesian Armed Forces (TNI) Military Campaign is still dominant in dealing with military threats, even though based on the 2018 Indonesian Defense White Paper, the TNI must also be able to deal with hybrid threats. With its adaptive nature to changing threats, problems will arise if the military campaign doctrine has not accommodated the TNI's strategy and way of acting in dealing with hybrid threats. The defense doctrine must be able to accommodate the integration of military and non-military components is facing various types of warfare and threats such as military threats, non-military threats, and hybrid threats. Especially for the kind of hybrid threats namely cyber threats, terrorism, and other unconventional threats. Through an analytical descriptive analysis based on qualitative methods, it is hoped that the proper organization and doctrine will be disentangled in the face of this model war. Indonesian Armed Forces (TNI) as the war organizations that prioritize a modern universal perspective are a necessity as one of the efforts offered. This needs to be supported by the doctrine of national defense which accurately defines how an effort against hybrid warfare can transform from conventional to unconventional warfare and the actors involved.  Military or TNI organizations that prioritize a modern universal perspective are supported by the doctrine of national defense which accurately maps how an effort against hybrid warfare could transform from conventional warfare to unconventional.</p></div>


2017 ◽  
Vol 36 (1) ◽  
pp. 9-33
Author(s):  
Ieva Karpavičiūtė

Abstract The paper addresses the security threat perception and securitization of existential threats in Lithuania. It focuses upon the securitization theory and its ability to explain the change of national security agendas as affected by the changes in national identity and existential security threats. It takes into account the internal and external factors that are shaping the objective and subjective national threat perception. The paper applies O. Waever’s securitization theory with an aim to explain how the national security threats are being addressed and perceived in Lithuania. Moreover, the paper is developed against the backdrop of the most recent developments in securitization theory and evolution of its theoretical perceptions of identity, existential threats, and legitimacy. It also discusses the possibility of inclusion of hybrid security threats into an analysis of securitization. The empirical part of the article assesses the most recent security challenges, provides evaluation of changes in national security perception, and portrays the dynamics of national security threats as defined in the National Security Strategies and the Military Doctrine. The paper focuses upon the most recent dynamics in security policy of Lithuania. It also takes into account the hybrid nature of security threats and the reaction to hybrid security elements such as: cyber security, information security, and international terrorism.


Author(s):  
Igor Diorditsa

The article proposes to consider the author's results of determining the conceptual provisions for optimizing the areas of administrative and legal regulation of state cybersecurity policy. The content of the current state of state policy in the field of cybersecurity is considered. Theoretical and practical aspects of optimization of legal relations in the field of state cybersecurity policy are analyzed. The interpretation of the state cybersecurity policy of Ukraine is determined – the activity of state and legal institutions to manage real and potential cyber threats and dangers to meet the cyber needs of man and citizen, as well as the realization of national interests in this area. The own vision of directions of the state cybersecurity policy according to the maintenance of a number of regulatory legal acts is offered, namely: directions of the state cybersecurity policy according to the Law of Ukraine «About the basic principles of maintenance of cybersecurity of Ukraine»; directions of the state cybersecurity policy in accordance with the Law of Ukraine «On Fundamentals of National Security of Ukraine»; directions of the state cybersecurity policy in accordance with the Doctrine of Information Security of Ukraine. It is concluded that the priority areas for optimizing state policy to strengthen the administrative and legal regulation of cybersecurity of the state are the following reforming cyber law as a segment of information legislation of Ukraine, especially in terms of not only clearly defining current threats and threats to cyber security, but also mechanisms public policy, including symmetric cyber measures; research on the protection of critical infrastructure from cyberattacks; promoting the development of domestic innovative products that can be used to strengthen the cybersecurity of the state; completion of the implementation of the provisions of the Council of Europe Convention on Cybercrime into national law; optimization of the training system in the field of cybersecurity for the needs of the Armed Forces of Ukraine and other bodies of the security and defense sector of Ukraine; promoting a more active policy of state security institutions to inform the public about cyber threats; promoting the militarization of cyberspace; support for both existing multilateral training sessions on countering cyberattacks on the state information infrastructure, and initiating new types of such training sessions. Key words:cybersecurity, cyberspace, state policy, cybersecurity policy, cybercrime.


2019 ◽  
Vol 12 (5) ◽  
pp. 12-23 ◽  
Author(s):  
V. P. Nazarov

The purpose of this article is to provide an overview of the best Western practices in strategic planning with the view to improve the effectiveness of the Russian Federation national security policy in the face of new challenges and threats.Having analyzed Western approaches to ensuring national security, the article concludes that the political and governance practice needs to include more of strategic planning elements, such as strategic forecasting, monitoring, and national security assessment. Based on applicability to the Russian environment, the article particularly focuses on the American experience in strategic planning and discusses the origins and nature of the ideologeme of Americentrism that has dominated the American politics since 1990s. The author reveals how important role the use of soft power in specific national interests plays in the government policy for national security purposes and concludes that interrelation and mutual influence between planning and governance are indispensable.Having analyzed the Western practices, the article demonstrates the need to adjust significantly the strategic goal setting, first and foremost in Russia’s essential strategic planning documents.


2020 ◽  
Vol 2020 (27) ◽  
pp. 20-24
Author(s):  
Hazlina Shaik Md Noor Alam

This paper discourses several issues stemming from whistleblowing. These include, but are not limited to, imposition of liability for inaction in the face of wrongdoing, to scrutinising the available legislative protections for whistleblowers. This paper will also discuss whistleblowing in relation to cyber whistleblowing, which essentially means making disclosures on any misconduct that occurs on the internet. Cyber whistleblowing can provide the basic framework for combating misdeeds online, as it forms a central part of cyber security. Whistleblowing has its roots in less than desirable circumstances, often offering little to no benefit to whistleblowers involved. The act of blowing the whistle, all share common traits, to call attention too, and to punish any and all wrongdoings. Legitimising whistleblowing would enormously help to remove the stigma that is often tied to whistleblowers. This would also give rise to more voluntary whistleblowing in relation to cyber security.


2017 ◽  
Vol 11 (6) ◽  
pp. 24
Author(s):  
Omar Salim Kidege ◽  
Stanislaw Paul MAJ

In advanced societies all aspects of commerce and industry are now based on networked IT systems. Failures of these systems have the potential to be extremely disruptive. The term Critical Infrastructure (CI) is used to define systems (private and public) considered vital to national interests whose interruption would have a debilitating effect on society. It is recognized cyber security threats to CIs range from malicious to state sponsored. The threats are typically continuous and evolving in sophistication. This paper is primarily focused on Process Control Networks (PCNs). PCNs are used as the basis of industrial process control in a wide range of applications (manufacturing, oil and gas, water etc.). Given the importance of this industrial sector there are a range of guidelines considered to be exemplars of best practice. However given the constantly evolving sophistication of hackers the true measure of security is penetration testing – not something that is practical in industrial systems.


2015 ◽  
Vol 5 (1) ◽  
pp. 19-29 ◽  
Author(s):  
Oliver Burmeister ◽  
Jackie Phahlamohlaka ◽  
Yeslam Al-Saggaf

Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack to their national interests and to prepare for a cyber offence in response to an attack. A discourse analysis of the “0x Omar”-Israeli conflict of 2012, as reported in the Arabic and English media and on the Internet, is used to explore ethical issues that this case raises and to examine how the risks posed could be mitigated in relation to relevant elements of the South African cybersecurity policy framework. Questions raised include: At what point does the policy require a nation state to prepare for a cyber offence in response to a cyber attack? Ethically, how are such actions consistent with the principle of good governance?


2018 ◽  
pp. 325-336
Author(s):  
Oliver Burmeister ◽  
Jackie Phahlamohlaka ◽  
Yeslam Al-Saggaf

Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack to their national interests and to prepare for a cyber offence in response to an attack. A discourse analysis of the “0x Omar”-Israeli conflict of 2012, as reported in the Arabic and English media and on the Internet, is used to explore ethical issues that this case raises and to examine how the risks posed could be mitigated in relation to relevant elements of the South African cybersecurity policy framework. Questions raised include: At what point does the policy require a nation state to prepare for a cyber offence in response to a cyber attack? Ethically, how are such actions consistent with the principle of good governance?


Author(s):  
Edward Newman

This chapter describes the evolution of the role of the UN Secretary-General in the context of international relations, paying particular attention to the historical origins of the office within the international civil service. It explores the challenges faced by the Secretary-General in seeking to act independently on behalf of the global interest, in a political environment characterized by competing national interests and power politics. It also considers whether the process that resulted in the appointment of António Gutteres in 2016—seen as the most transparent, meritocratic, and inclusive in the history of the UN—might enable the Secretary-General to be more effective in the face of the many pressures upon the office.


2020 ◽  
Vol 11 (1) ◽  
pp. 297-314
Author(s):  
Christian Chidi Okeke

Citizen diplomacy as a key component of diplomacy is fundamental in international relations. Through it, individual citizens help realize their countries’ national interests through unofficial interactions. For Nigeria however, the worry is whether citizen diplomacy can effectively complement official diplomatic activities in the face of the low human-capital development of her citizens. United Nations Development Pro-gramme in 2019 placed Nigeria’s human-development-index value for 2018 at 0.534, positioning the country at 158 out of the 189 countries and territories surveyed. It also classified 51.4 percent of Nigerian population as being multi-dimensionally poor with an additional 16.8 percent categorized as being vulnerable to multidimensional pov-erty. In view of this challenge therefore, this paper examined the implication of the low human-capital development on foreign relations of Nigeria. Data was collated from secondary sources while qualitative descriptive technique was used for analysis. The paper found that Nigeria’s current human capital development trajectory is incapable of stimulating citizen diplomacy into complementing the coun-try’s official diplomatic relations with other states. It also found that this situation accounts for the failure by Nigeria to actualize most of her foreign policy objectives. The paper therefore recommended improved investment in wellbeing of Nigerians for better outing in foreign relations.


Sign in / Sign up

Export Citation Format

Share Document