Javascript must be enabled to continue!
THE CONCEPT OF HYBRID THREATS
View through CrossRef
In 2016, during the Warsaw summit, NATO and EU reached an agreement to improve the cooperation in the fight against the hybrid threats, describing the security situation in Europe as space where many hybrid activities take place. The security environment of the modern democratic societies is endangered due to the intensive hybrid activities that are manifested via campaigns aimed to misinform, hostile cyber-activities and radicalisation of vulnerable groups in the society.The security environment during the Cold War was defined with the two confronting super powers, with each trying to surpass the other building an international security system of bipolar relations. Today, in state of hybrid threats, when the security environment is not more secure than during the Cold War, the security setting is much harder to define. The threats, methods of action and activities are multidimensional and the relations among various actions remain unclear.The state actor constantly try to become stronger, while the non-state actors seek own statehood or recognition of their activities. Seeking to achieve their own ambitions, the non-state actors challenge the West and its institutions, representing thus hybrid threats for their security. Dealing with the hybrid threats includes synchronised use of military and non-military means against specific weaknesses of the enemy. Unless detected and dealt within timely manner, the state of dealing with hybrid threats will reach the state of hybrid warfare.We live in a time of hybrid influences, where state and non-state actors challenge the modern western democracies and their institution that are considered to be a threat or competition in meeting their goals and interests. The aim of the hybrid threats is to create – by detecting the adversary’s weaknesses, such as ideological differences, technological deficiency, society polarisation, geostrategic factors and infrastructure – conditions to achieve their own goals.If the desired goals are not achieved with the hybrid methods, the hybrid threats can create conditions for future conflict, when the situation can escalate in hybrid war with significant increase of the armed violence. The modern democratic states should have coordinated coherent approach to understand, detect and respond to hybrid threats as collective interest.
Title: THE CONCEPT OF HYBRID THREATS
Description:
In 2016, during the Warsaw summit, NATO and EU reached an agreement to improve the cooperation in the fight against the hybrid threats, describing the security situation in Europe as space where many hybrid activities take place.
The security environment of the modern democratic societies is endangered due to the intensive hybrid activities that are manifested via campaigns aimed to misinform, hostile cyber-activities and radicalisation of vulnerable groups in the society.
The security environment during the Cold War was defined with the two confronting super powers, with each trying to surpass the other building an international security system of bipolar relations.
Today, in state of hybrid threats, when the security environment is not more secure than during the Cold War, the security setting is much harder to define.
The threats, methods of action and activities are multidimensional and the relations among various actions remain unclear.
The state actor constantly try to become stronger, while the non-state actors seek own statehood or recognition of their activities.
Seeking to achieve their own ambitions, the non-state actors challenge the West and its institutions, representing thus hybrid threats for their security.
Dealing with the hybrid threats includes synchronised use of military and non-military means against specific weaknesses of the enemy.
Unless detected and dealt within timely manner, the state of dealing with hybrid threats will reach the state of hybrid warfare.
We live in a time of hybrid influences, where state and non-state actors challenge the modern western democracies and their institution that are considered to be a threat or competition in meeting their goals and interests.
The aim of the hybrid threats is to create – by detecting the adversary’s weaknesses, such as ideological differences, technological deficiency, society polarisation, geostrategic factors and infrastructure – conditions to achieve their own goals.
If the desired goals are not achieved with the hybrid methods, the hybrid threats can create conditions for future conflict, when the situation can escalate in hybrid war with significant increase of the armed violence.
The modern democratic states should have coordinated coherent approach to understand, detect and respond to hybrid threats as collective interest.
Related Results
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
The Rice (Oryza Sativa L.) Rc Gene, Which Imparts Resistance To Pre-Harvest Sprouting, Retains Seed and Milled Rice Quality
The Rice (Oryza Sativa L.) Rc Gene, Which Imparts Resistance To Pre-Harvest Sprouting, Retains Seed and Milled Rice Quality
Abstract
Pre-harvest sprouting (PHS) in cereal crops, including rice ( Oryza sativa L.), causes substantial yield and end-use quality losses worldwide. These losses could b...
Modifikasi Model Rak Alat Pengering Tipe Hybrid Pada Pengeringan Ikan Keumamah
Modifikasi Model Rak Alat Pengering Tipe Hybrid Pada Pengeringan Ikan Keumamah
Abstrak. Pengeringan hybrid merupakan pengeringan yang menggunakan dua atau lebih sumber energi untuk proses penguapan air. Teknologi ini merupakan alternatif teknologi untuk penge...
Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model
Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model
The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering. However, unlike functional requirement...
Law, Hybrid Threats and Counter-Terrorism
Law, Hybrid Threats and Counter-Terrorism
The article analyzes the concept of hybrid threats formed in recent decades. It shows that in many well-known documents there is a direct connection between hybrid threats and the ...
MORPHOLOGICAL FEATURES OF THE KIDNEYS OF DAY-OLD TURKEY CHICKS OF HYBRID CONVERTER AND HYBRID CONVERTER NOVO CROSSES
MORPHOLOGICAL FEATURES OF THE KIDNEYS OF DAY-OLD TURKEY CHICKS OF HYBRID CONVERTER AND HYBRID CONVERTER NOVO CROSSES
Kidneys of poultry, in particular turkeys, are poorly studied in terms of morphology and histology depending on age and cross. The aim of the study is to investigate the anatomical...
Hybrid Zones
Hybrid Zones
AbstractA hybrid zone occurs where two distinct genetic forms meet, mate and produce offspring with mixed genomes. Such zones may vary in width, length and patchiness, and are foun...
Modeling Hybrid Metaheuristic Optimization Algorithm for Convergence Prediction
Modeling Hybrid Metaheuristic Optimization Algorithm for Convergence Prediction
The project aims at the design and development of six hybrid nature inspired algorithms based on Grey Wolf Optimization algorithm with Artificial Bee Colony Optimization algorithm ...


