Matches in SemOpenAlex for { <https://semopenalex.org/work/W33262517> ?p ?o ?g. }
Showing items 1 to 80 of
80
with 100 items per page.
- W33262517 startingPage "47" @default.
- W33262517 abstract "As the United States resets in the wake of Iraq and Afghanistan, and in the face of growing uncertainty in the South China Sea, a good and important debate is occurring about how best to provide for our national security. Reasonable arguments can be made about the threats posed by potential peer competitors such as China, rogue nations such as North Korea, and prospective revisionist powers such as Russia. Arguments can be made about threats arising from political instability or intrastate conflicts, such as in Pakistan, Uganda, and Syria. Arguments can also be made about the threats posed by jihadi terror groups, organized crime syndicates, and drug trafficking organizations. The dangers highlighted by any one of these arguments are real and perhaps grave. They are not, however, novel.For each of these dangers, we have established procedures, tools, and resources for deterring, mitigating, and perhaps even resolving their associated risks. Yet there are threats for which we lack well-established security mechanisms. Chief among them are the hybrid threats woven from the hazards above to directly endanger the safety and security of our society and citizens at home - as well as our national interests abroad.What follows is an argument for casting greater focus on the dangers posed by hybrid threats at the strategic level.1 We use Iran and the availability of proxy capabilities to illustrate the mechanics of, and risk posed by, strategic hybrid threats. We also offer a general model for what is needed to detect and respond to hybrid threats. Still, increased attention is not enough. It is our intent that this argument serve as fuel for a richer discussion about the doctrine, strategies, material resources, and organizational behaviors the United States ought to develop to respond to strategic hybrid threats in both theory and practice.Hybrid ThreatsHybrid threats have been part of the security vernacular since the late 1990s. Despite a surge of recent attention, the concept remains ill-defined. Various authors, proponents and opponents of the idea, have added or removed defining traits. This has often confused rather than clarified the issue. As a result, discussions tend to devolve into debates about whether hybrid threats represent a novel class of security challenges. The two central issues - the degree to which such threats currently pose a danger and how the United States ought to deal with them - risk being lost in the rhetoric.2 To correct this and return to the crux of the matter, this argument begins with a proposal of how hybrid threats might be better defined and differentiated from other threats.As a means of clearing away the conceptual confusion produced by past debates, let us begin by explaining what we would remove from past treatments of the term. We are not talking about multimodal wars or the threats they pose. The ability of adversaries to move up or down the spectrum of warfare, or engage in multiple phases of warfare simultaneously, may be intensifying - but it is not new.3 Such was the case during many of the insurgencies and civil wars of the 20th century, including those in Russia, China, Vietnam, and Nicaragua. We are not talking about asymmetric threats. That idea has itself devolved to a level of questionable utility. The principle of attempting to match one's strength against an enemy's weakness is a well-established military dictum. All combatants seek to maximize asymmetric threats or engage in asymmetrical warfare, for the successful asymmetrical alignment of capabilities maximizes one's leverage and increases the probability of success. Nor are we talking about irregular tactics or unconventional warfare. Those terms describe indirect actions taken by an actor to undermine the legitimacy, influence, or position of an occupying power or government.4 Because they may be employed in the service of nation-states and their interests, hybrid threats should not be confused with the irregular use of forces or capabilities that is commonly, but not exclusively, observed during insurgencies. …" @default.
- W33262517 created "2016-06-24" @default.
- W33262517 creator A5048419161 @default.
- W33262517 creator A5056005552 @default.
- W33262517 date "2012-12-01" @default.
- W33262517 modified "2023-09-23" @default.
- W33262517 title "Thinking about Strategic Hybrid Threats - in Theory and in Practice" @default.
- W33262517 hasPublicationYear "2012" @default.
- W33262517 type Work @default.
- W33262517 sameAs 33262517 @default.
- W33262517 citedByCount "0" @default.
- W33262517 crossrefType "journal-article" @default.
- W33262517 hasAuthorship W33262517A5048419161 @default.
- W33262517 hasAuthorship W33262517A5056005552 @default.
- W33262517 hasConcept C127576917 @default.
- W33262517 hasConcept C138921699 @default.
- W33262517 hasConcept C144024400 @default.
- W33262517 hasConcept C144133560 @default.
- W33262517 hasConcept C162853370 @default.
- W33262517 hasConcept C17744445 @default.
- W33262517 hasConcept C185592680 @default.
- W33262517 hasConcept C190253527 @default.
- W33262517 hasConcept C191935318 @default.
- W33262517 hasConcept C199539241 @default.
- W33262517 hasConcept C2779304628 @default.
- W33262517 hasConcept C36289849 @default.
- W33262517 hasConcept C38652104 @default.
- W33262517 hasConcept C41008148 @default.
- W33262517 hasConcept C528167355 @default.
- W33262517 hasConcept C55493867 @default.
- W33262517 hasConcept C94625758 @default.
- W33262517 hasConcept C98184364 @default.
- W33262517 hasConceptScore W33262517C127576917 @default.
- W33262517 hasConceptScore W33262517C138921699 @default.
- W33262517 hasConceptScore W33262517C144024400 @default.
- W33262517 hasConceptScore W33262517C144133560 @default.
- W33262517 hasConceptScore W33262517C162853370 @default.
- W33262517 hasConceptScore W33262517C17744445 @default.
- W33262517 hasConceptScore W33262517C185592680 @default.
- W33262517 hasConceptScore W33262517C190253527 @default.
- W33262517 hasConceptScore W33262517C191935318 @default.
- W33262517 hasConceptScore W33262517C199539241 @default.
- W33262517 hasConceptScore W33262517C2779304628 @default.
- W33262517 hasConceptScore W33262517C36289849 @default.
- W33262517 hasConceptScore W33262517C38652104 @default.
- W33262517 hasConceptScore W33262517C41008148 @default.
- W33262517 hasConceptScore W33262517C528167355 @default.
- W33262517 hasConceptScore W33262517C55493867 @default.
- W33262517 hasConceptScore W33262517C94625758 @default.
- W33262517 hasConceptScore W33262517C98184364 @default.
- W33262517 hasIssue "1" @default.
- W33262517 hasLocation W332625171 @default.
- W33262517 hasOpenAccess W33262517 @default.
- W33262517 hasPrimaryLocation W332625171 @default.
- W33262517 hasRelatedWork W153332161 @default.
- W33262517 hasRelatedWork W1552979091 @default.
- W33262517 hasRelatedWork W1972321172 @default.
- W33262517 hasRelatedWork W1992573814 @default.
- W33262517 hasRelatedWork W2036417815 @default.
- W33262517 hasRelatedWork W2059276208 @default.
- W33262517 hasRelatedWork W2078759794 @default.
- W33262517 hasRelatedWork W2189478272 @default.
- W33262517 hasRelatedWork W2248650689 @default.
- W33262517 hasRelatedWork W2269047146 @default.
- W33262517 hasRelatedWork W2511995096 @default.
- W33262517 hasRelatedWork W2737719774 @default.
- W33262517 hasRelatedWork W2928941458 @default.
- W33262517 hasRelatedWork W3121440183 @default.
- W33262517 hasRelatedWork W3124900810 @default.
- W33262517 hasRelatedWork W764260711 @default.
- W33262517 hasRelatedWork W916258141 @default.
- W33262517 hasRelatedWork W932097421 @default.
- W33262517 hasRelatedWork W2463726621 @default.
- W33262517 hasRelatedWork W857423881 @default.
- W33262517 hasVolume "4" @default.
- W33262517 isParatext "false" @default.
- W33262517 isRetracted "false" @default.
- W33262517 magId "33262517" @default.
- W33262517 workType "article" @default.