{"title":"Implications of the war in Ukraine for the strategic communication system of the Polish Ministry of National Defence","authors":"Agnieszka Glapiak","doi":"10.35467/sdq/173070","DOIUrl":"https://doi.org/10.35467/sdq/173070","url":null,"abstract":"The paper explores the evolving role of strategic communication at the operations centre of the Minister of National Defence in Poland, particularly in the period leading up to and during the Russian Federation’s military aggression against Ukraine. The study investigates both proactive communication initiatives and reactive communication in response to citizens’ needs. Our research methodology primarily involved analysing official Polish national defence documents and comparing findings from studies conducted before and during the war in Ukraine. The results show that the conflict had a profound influence on the MOD’s strategic communication, emphasising the pivotal role of the Operations Centre of the Minister of National Defence. Furthermore, the analysis highlights the need for a comprehensive communication approach that encompasses both domestic and international audiences, spanning traditional and social media.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135127187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logistics outsourcing for armed forces: The mobilisation of civilian transportation vehicles","authors":"Nebojsa V. Nikolic","doi":"10.35467/sdq/171014","DOIUrl":"https://doi.org/10.35467/sdq/171014","url":null,"abstract":"One aspect of the total defence concept involves the temporary requisition of civilian transportation vehicles to meet the increased logistical demands of a wartime army. These vehicles are selected and managed in peacetime, mobilised at the onset of the war, used by military units throughout the war, and returned to their original owners afterwards. This paper presents a model for the reception process of such civilian vehicles during mobilisation. In practice, however, reception processes are not without challenges. Under the time constraints of mobilisation, issues may arise, including inappropriate reception, missed deadlines, and compromised operational readiness. To investigate these issues, the study employs conceptual modelling, supplemented by insights from professional experience. The main contributions of this paper include a conceptual model of the mobilisation process, a framework for maintaining records of mobilised assets, and a focus on previously underexplored mobilisation issues. Proper reception of mobilised vehicles significantly affects the transportation capability and operational readiness of military units as well as the accuracy of the post-conflict return process. Implementation of the proposed solutions requires careful consideration due to interdependencies with other aspects of the mobilisation process, such as doctrinal arrangements, administrative systems, mobilisation procedures as well as the quality and regularity of both professional and reservist military training.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135471775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Earth observation IMINT with OSINT data to create added-value multisource intelligence information: A case study of the Ukraine–Russia war","authors":"Ioannis Kotaridis, Georgios Benekos","doi":"10.35467/sdq/170901","DOIUrl":"https://doi.org/10.35467/sdq/170901","url":null,"abstract":"The Russian invasion of Ukraine on 24 February 2022 heralded a new “social media war” era. This “hybrid warfare” extends beyond the military landscape and includes attacks in cyberspace and fake news with the aim of destabilising governments. The goal of this paper is to present a high-level of architecture based on imagery intelligence (IMINT) and geospatial intelligence (GEOINT) using geographic datasets and state-of-the-art methods. Integration with intelligence information (like Open-Source Intelligence [OSINT]) produces multiintelligent knowledge for security and defence decision-making end users. The results depict a harmonious and creative collaboration between IMINT, OSINT, and GEOINT. OSINT data helps to identify and describe the meteorological conditions that are present, contributing to the procedure’s responsiveness. Weather and dense cloud cover above Ukraine poses a challenge for optical imaging satellites, but synthetic aperture radar (SAR) sensor satellites can operate at night and overcome the problem. We carried out OSINT and IMINT analysis, monitoring the situation shortly after the invasion. OSINT data helped in the choice of an appropriate area of interest. Using the right Earth observation satellite system and artificial intelligence/machine learning algorithms is the best way to keep an eye on many different sites over long periods, send out alerts about unusual activity, and find new places where incoherent changes might be happening.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136240362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conventional and Hybrid Actions in the Russia's Invasion of Ukraine","authors":"C. Ioniță","doi":"10.35467/sdq/168870","DOIUrl":"https://doi.org/10.35467/sdq/168870","url":null,"abstract":"The paper aims to analytically present the existing data and information regarding notable aspects of the ongoing war in Ukraine, notably through lessons identified in the political-military field, both conventionally and hybrid. The article hypothesis starts from the consideration that even the war is not over, there are some lessons identified that should be considered for the future security of Europe and the international environment. The author uses the analytical method of research to explain the cause-effect relationship between the war itself and its future influence for the European security and world order, going down to European nations living at the edge of this conflict. It will also theoretically test those implications to determine whether they fit the specified hypothesis. The conflict itself has deepened the international consequences of almost two years of the COVID-19 pandemic. It magnified the disastrous security situation not only in Europe, but all around the world, by creating additional energy (gas) and food (cereal) crises. Therefore, the Russian – Ukrainian War has significantly modified regional and international security environment and there are tendencies to challenge the current World order. What happened in Ukraine in the past year has and will continue to have direct implications for the European and Euro-Atlantic security, going down to European nations living at the edge of this conflict. Therefore, this paper is significant for advising the political-military decision-makers on better understanding the modern operational environment and addapting future defence capabilities to face 21st Century Warfare.\u0000\u0000\u0000\u0000\u0000","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41565452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lucius Paulo de Carvalho, A. Rodrigues, Marcello Beckert Zappellini
{"title":"Leadership in police work applied to critical contexts: An integrative review and scientific mapping using VOSviewer and Google Trends tools","authors":"Lucius Paulo de Carvalho, A. Rodrigues, Marcello Beckert Zappellini","doi":"10.35467/sdq/166265","DOIUrl":"https://doi.org/10.35467/sdq/166265","url":null,"abstract":"The aim of this study is to identify cutting-edge studies on the phenomenon of leadership applied to police work, especially in critical contexts, based on an integrative literature review. The integrative review made it possible to survey publications on the subject in the Scopus, Web of Science, Ebsco Host, ScienceDirect, Core, and SciELO databases. Scientific mapping is complemented with the use of VOSviewer and Google Trends tools. The integrative review resulted in 15 studies that fit the research strategy, bringing different leadership approaches, such as instrumental, transformational, charismatic, consultative, ethical, authentic, military, destructive, and laissez-faire, through qualitative and/or quantitative studies. For bibliometric analysis using VOSviewer, the research corpus was expanded to 63 articles, admitting documents that studied leadership with firefighters, military personnel, and police officers. The analysis showed almost no co-authorship link between the 129 authors. The co-occurrence analysis of keywords reveals that leadership strongly links with law enforcement, police, management, crisis management, emergency management, and decision-making, establishing a close relationship between these concepts and a semantic map that underlies the field of study. The analysis of trends by Google Trends in the science category indicates the stability of interest in the topic of leadership in the world. However, the theme of police leadership produced results close to zero. The findings reveal that few studies address leadership in police organisations, and even fewer if critical, dangerous contexts are examined. The trends analysed indicate that worldwide scientific interest in the subject remains low and the theme must be further explored.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45627409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conclusions from the use of aviation in the first half of the first year of the Ukrainian-Russian war","authors":"Sylwester Lubiejewski","doi":"10.35467/sdq/161959","DOIUrl":"https://doi.org/10.35467/sdq/161959","url":null,"abstract":"The aim of the article is to suggest a desirable direction in which the Polish air force, and indeed the air forces of other NATO countries, should develop so that they are better prepared for the challenges identified in the conflict in Ukraine so far. In order to achieve the aim of the research and answer the formulated research question, the collection and qualitative analysis of texts and documents, observation and interviewing took place. In order to have the ability to deter and gain air superiority during a defensive operation, the Polish air force, and air forces of other NATO countries, should have a large resource of fighter, multi-role, and fighter-bomber aircraft. An object-oriented multi-layer air defence of every military airfield needs to be organised and certain roads reconstructed as runways in the event of war. In turn, helicopter aviation units should be able to organise forward arming and refuelling points for helicopters to effectively support land forces. Attack helicopters should also have integrated fire systems that allow them to attack from a distance beyond the range of man-portable air-defence systems. All warplanes should be equipped with proven and modern systems of active and passive self-defence to make them less susceptible to enemy influence. To sum up, in light of the war in Ukraine, the article explains what aviation equipment is necessary and what actions should be taken to increase both Polish air force’s ability and other NATO air forces’ ability to perform tasks during wartime.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48378230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trojan spoofing: A threat to critical infrastructure","authors":"Tegg Westbrook","doi":"10.35467/sdq/164760","DOIUrl":"https://doi.org/10.35467/sdq/164760","url":null,"abstract":"This article explores the phenomenon of location spoofing—where the spoofer is able to “teleport” systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the “teleportation” out of real, defined zones in the physical world. The research relied on a qualitative methodology, utilising academic research findings, media reports, hacker demonstrations, and secondary data from these sources, to situate the spoofing threat in the context of international security. This conceptual, argumentative essay finds that signal spoofing, the methods of which can be followed via online scripts, allows users the ability to overcome geographically defined territorial restrictions. This, as this article finds, allows violent actors to weaponise systems, such as unmanned aerial systems, potentially leading to the escalation of political tensions in extreme but unfortunately ever-frequent episodes. The article concludes that, while Trojan spoofing (in particular) poses a real and an existential threat to international security, it is only a sum-of-all parts in considering other threats to critical functions in society. If geofences are used as a single point of security to protect assets against hostile actors, managers need to be aware of the vulnerability of intrusion and the resulting geopolitical consequences.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42158867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Akinyetun, Victor Chukwugekwu Ebonine, Iyase Osariyekemwen Ambrose
{"title":"Unknown gunmen and insecurity in Nigeria: Dancing on the brink of state fragility","authors":"T. Akinyetun, Victor Chukwugekwu Ebonine, Iyase Osariyekemwen Ambrose","doi":"10.35467/sdq/163462","DOIUrl":"https://doi.org/10.35467/sdq/163462","url":null,"abstract":"There is a compelling need to address the protracted and recurring multidimensional insecurity in Nigeria. The prevalence of insecurity in the country is multipronged and caught in a cyclic web. Insecurity in Nigeria comprises insurgency, killer herdsmen, extrajudicial killings, ethnoreligious conflict, armed robbery, militancy, banditry, cybercrime and attacks by unknown gunmen, among other things. The incidence of attacks by unknown gunmen is pervasive and symptomatic of a fragile state where the government’s monopoly of force is challenged and where marginalisation, crises and contested spaces are ubiquitous. The thrust of this paper is that the menace of unknown gunmen is pervasive and threatens to plunge Nigeria into a cesspit of fragility. The argument is predicated on the conceptual and theoretical suppositions of a fragile state. To this end, the paper adopts the documentary method of data collection and uses qualitative descriptive analysis to expound on the phenomenon. The findings reveal that the words unknown gunmen – terminology that is used to describe the spate of insecurity in the country – are a bane to peaceful coexistence. The paper also shows that the insecurity caused by these armed attacks and other forms of threat is emblematic of a fragile state. Consequently, policy recommendations – state-building and peace-building – are proffered.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45810206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systemic Operational Design – a study in failed concept","authors":"Łukasz Przybyło","doi":"10.35467/sdq/163292","DOIUrl":"https://doi.org/10.35467/sdq/163292","url":null,"abstract":"One of the many reasons for the failure of the Israel Defence Forces’ (IDF) in the Second Lebanon War was the concept of Systemic Operational Design (SOD), translated into de facto military doctrine. The story of the rise and fall of the SOD idea is a warning sign for all militaries faced with “modern” and “fashionable” ideas. The purpose of this paper is therefore to describe and evaluate the Systemic Operational Design created and introduced into the IDF by Brigadier General Shimon Naveh and the Operational Theory Research Institute (OTRI). The study is based on the literature created by the State of Israel, the IDF, and its main proponent Shimon Naveh, as well as other militaries (mainly the US Army). This theoretical background is confronted with the IDF’s operations during the Second Lebanon War of 2006 and their effects on the war’s outcome. The over intellectualised, ambiguous, and not properly\u0000structured concept of the SOD, introduced as the IDF’s doctrine and approach to operations, led to military failure (which also had more root causes) in Lebanon. A study of the SOD failure should lead to a careful approach being taken to all new military concepts and ideas. Both change and continuation need to be properly balanced and evaluated, while enhanced military effectiveness could be of great value. At the same time, the impact of concepts which are not well anchored in military science/history and untested, like the SOD, could be devastating for militaries.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69838368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defensive lawfare and deterrence: Analysis of Latvia’s approach to legal bases in the context of hybrid warfare (2014-2022)","authors":"Valērijs Bodnieks","doi":"10.35467/sdq/163435","DOIUrl":"https://doi.org/10.35467/sdq/163435","url":null,"abstract":"Following the ‘hybrid form’ of Russian aggression in Ukraine that emerged in 2014, the period after February 24th, 2022 is referred to as the ‘new reality’. Hence, the question that needs to be addressed is how to deter and prevent Russian aggression of this kind. The national legal framework against the aggressor is a part of the deterrence policy and can be construed as defensive lawfare. Focusing on Latvia, the aim of the paper is to analyse defensive lawfare and deterrence in the context of hybrid warfare. The following research question has been identified: What is Latvia’s approach to establishing defensive lawfare in terms of hybrid warfare? For the empirical analysis, the chronological framework has been set from 2014 to 2022. To complete the empirical analysis of the present paper, both qualitative and quantitative research has been implemented comprising document analysis and semi-structured interviews, as well as content analysis, respectively. The improvement of a regulatory base and the development of deterrence, whilst using regulatory acts, is an element of deterrence and a way to act legally. The law can be used as a weapon. Lawfare, a concept with three definitions, has two forms: defensive a nd offensive. Latvia’s legal base includes a regulation to overcome hybrid threats and to implement a broad-spectrum of defence measures. Latvia’s regulatory framework is designed for defence purposes, whilst also being a way of promoting deterrence. Decision makers must be able to manoeuvre with the powers assigned to them.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46561256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}