The comprehensive defence framework introduced in 2019 in Latvia has the potential to accelerate the implementation of national defence priorities, thus strengthening Latvia as one of NATO’s external border states. In a time of geopolitical turbulence and increasing hybrid threats, a whole-of-society approach is required and work in ever-new directions. As dimensions of psychological resilience and strategic communication are becoming an important part of the defence studies debate, the study focuses on the role of the private sector within Latvia’s strategic defence documents and aims to investigate where these dimensions are situated and how they have evolved in the strategic landscape. To study the role and evolution of the private sector within Latvia’s strategic defence documents, quantitative content analysis and qualitative text analysis were used for in-depth analysis of the documents. The study finds that the role of the private sector in the strategic defence documents has generally increased over the years and there has not been a significant change regarding private sector involvement in dimensions of psychological resilience and strategic communication. The long-term pattern indicates that dimensions of psychological resilience and strategic communication appear rare in strategic documents, suggesting that the private sector is not seen as a significant actor in achieving defence goals. Meanwhile, in more practical dimensions,an upward trend towards strengthening ties and sharing responsibilities is identified. The study therefore opens up a discussion regarding the need for a more institutionalised framework for psychological and strategic communication dimensions in order to achieve the strategic goals of comprehensive defence.
{"title":"Role of the private sector within Latvia’s strategic defence documents: Dimensions of psychological resilience and strategic communication","authors":"Lita Juberte Krūmiņa","doi":"10.35467/sdq/186719","DOIUrl":"https://doi.org/10.35467/sdq/186719","url":null,"abstract":"The comprehensive defence framework introduced in 2019 in Latvia has the potential to accelerate the implementation of national defence priorities, thus strengthening Latvia as one of NATO’s external border states. In a time of geopolitical turbulence and increasing hybrid threats, a whole-of-society approach is required and work in ever-new directions. As dimensions of psychological resilience and strategic communication are becoming an important part of the defence studies debate, the study focuses on the role of the private sector within Latvia’s strategic defence documents and aims to investigate where these dimensions are situated and how they have evolved in the strategic landscape. To study the role and evolution of the private sector within Latvia’s strategic defence documents, quantitative content analysis and qualitative text analysis were used for in-depth analysis of the documents. The study finds that the role of the private sector in the strategic defence documents has generally increased over the years and there has not been a significant change regarding private sector involvement in dimensions of psychological resilience and strategic communication. The long-term pattern indicates that dimensions of psychological resilience and strategic communication appear rare in strategic documents, suggesting that the private sector is not seen as a significant actor in achieving defence goals. Meanwhile, in more practical dimensions,an upward trend towards strengthening ties and sharing responsibilities is identified. The study therefore opens up a discussion regarding the need for a more institutionalised framework for psychological and strategic communication dimensions in order to achieve the strategic goals of comprehensive defence.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"104 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141124873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses Poland’s involvement in “Operation Bridge,” which aimed to transport Jewish citizens from the Soviet Union to Israel between 1989 and 1992. The study is based on recently declassified documents from the former intelligence and counterintelligence services, the Foreign Ministry, and the Prime Minister’s Office, supplemented by accounts of policymakers, secret service officers, and militia involved in protecting Soviet Jews during transit operations. The author argues that this operation was not just a humanitarian effort but also had significant geopolitical implications. The newly elected non-communist government under Tadeusz Mazowiecki saw this as a critical move to establish stronger ties with the United States and Israel. The author also highlights how the cooperation between Poland and the United States in intelligence sharing, counterterrorism, and security operations paved the way for Poland’s strategic partnership with the United States and its eventual entry into NATO. The paper contributes significantly to our understanding of the role played by Poland in the post-Cold War era and sheds new light on the development of US–Polish relations.
{"title":"Anti-terrorist cooperation as part of Poland’s geopolitical shift. “Operation Bridge” and the rise of a strategic partnership with the United States","authors":"Tomasz Piotr Kozłowski","doi":"10.35467/sdq/186332","DOIUrl":"https://doi.org/10.35467/sdq/186332","url":null,"abstract":"This paper discusses Poland’s involvement in “Operation Bridge,” which aimed to transport Jewish citizens from the Soviet\u0000Union to Israel between 1989 and 1992. The study is based on recently declassified documents from the former intelligence and\u0000counterintelligence services, the Foreign Ministry, and the Prime Minister’s Office, supplemented by accounts of policymakers, secret\u0000service officers, and militia involved in protecting Soviet Jews during transit operations. The author argues that this operation was not\u0000just a humanitarian effort but also had significant geopolitical implications. The newly elected non-communist government under\u0000Tadeusz Mazowiecki saw this as a critical move to establish stronger ties with the United States and Israel. The author also highlights\u0000how the cooperation between Poland and the United States in intelligence sharing, counterterrorism, and security operations paved the\u0000way for Poland’s strategic partnership with the United States and its eventual entry into NATO. The paper contributes significantly\u0000to our understanding of the role played by Poland in the post-Cold War era and sheds new light on the development of US–Polish\u0000relations.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":" 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140995262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper focuses on the principles and values that guide human behaviour as well as judgements about what is considered ethical. The objectives of this analysis are threefold: (1) to explore the role of morale as an essential dimension of combat power, (2) to identify perceptions and representations related to the importance of military morale in managing stress during wartime or on a field mission, and (3) to identify possible ways to improve the resilience of military personnel deployed on the battlefield within the organisational culture. This study adopts a mixed-methods approach, including qualitative methodologies to examine the role and impact of psychological training and self-confidence in military settings along with quantitative methodologies that include specific questions regarding demographics and military experiences. Semi-structured interviews were conducted with thirty-two military personnel with direct experience in missions, conflict zones, or theatres of operations. Soldiers’ perceptions, formed by their states of necessity and subjective character, contribute to satisfaction, shaping the scope of motivation, and confirming that soldiers’ morale directly influences their actions on the battlefield. Accomplishing a mission requires not only the precise definition of objectives and the provision of the necessary tools but also an appeal to factors that stimulate, raise awareness, and activate personnel. The findings reveal measures that can be taken to manage stress in combat, including subjective ones, deriving from the military’s confidence and conviction in the legitimacy of the cause and the justice of the war, group integration, personal beliefs and hopes as well as objective ones, such as external mass influences, the media or the states involved, which affect the security of the military. The results of the study emphasise the importance of the initial training of the military at individual and group levels, or under leadership of superiors, together with the solidarity of the North Atlantic Treaty Organization and European Union member states in supporting the families of the military and improving their situation from various perspectives: economic, material, orale, civil protection, and child protection.
{"title":"The role of military morale as an essential dimension of combat power","authors":"Mioara Șerban","doi":"10.35467/sdq/174832","DOIUrl":"https://doi.org/10.35467/sdq/174832","url":null,"abstract":"This paper focuses on the principles and values that guide human behaviour as well as judgements about what is considered ethical. The objectives of this analysis are threefold: (1) to explore the role of morale as an essential dimension of combat power, (2) to identify perceptions and representations related to the importance of military morale in managing stress during wartime or on a field mission, and (3) to identify possible ways to improve the resilience of military personnel deployed on the battlefield within the organisational culture. This study adopts a mixed-methods approach, including qualitative methodologies to examine the role and impact of psychological training and self-confidence in military settings along with quantitative methodologies that include specific questions regarding demographics and military experiences. Semi-structured interviews were conducted with thirty-two military personnel with direct experience in missions, conflict zones, or theatres of operations. Soldiers’ perceptions, formed by their states of necessity and subjective character, contribute to satisfaction, shaping the scope of motivation, and confirming that soldiers’ morale directly influences their actions on the battlefield. Accomplishing a mission requires not only the precise definition of objectives and the provision of the necessary tools but also an appeal to factors that stimulate, raise awareness, and activate personnel. The findings reveal measures that can be taken to manage stress in combat, including subjective ones, deriving from the military’s confidence and conviction in the legitimacy of the cause and the justice of the war, group integration, personal beliefs and hopes as well as objective ones, such as external mass influences, the media or the states involved, which affect the security of the military. The results of the study emphasise the importance of the initial training of the military at individual and group levels, or under leadership of superiors, together with the solidarity of the North Atlantic Treaty Organization and European Union member states in supporting the families of the military and improving their situation from various perspectives: economic, material, orale, civil protection, and child protection.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140250034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamila Trochowska-Sviderok, Yvonne Rose Masakowski, M. McFate, Anne Holohan
The article focuses on the need for a paradigm shift in diversity management for sustainable peace and security. We discuss the bidirectional influence of security and defence organisations and society; the intersectionality of issues related to social justice, health, race, and ethnicity; sexual abuse and exploitation; and cultural factors that influence the functioning of LGBTQ+ personnel and the gender/technology nexus in the context of North Atlantic Treaty Organization (NATO). During the application of the Sustainable Security Paradigm to gender diversity management, we found that ecofeminism and the ideas of post-colonial theory should inform the transformational shift of contemporary security and defence organisational cultures. This approach was used by the multinational NATO Science & Technology Organization Exploratory Team ET-197 Gender, Peace and Sustainable Security (2022-23) and its successor, the NATO HFM-368 Research Task Group (2023-26). Our research efforts were triangulated by an analysis of doctrinal textual, audiovisual and art sources that relate to gender diversity and its management. Given the complexity of future warfare, there is a strategic imperative to develop an inclusive defence strategy that reconfigures the traditional white male-focused military paradigm. It is evident that the root cause of gender inequality cannot be solved solely by doctrine and training solutions—rather a transformational organisational culture shift is pivotal and critical to the future global security. This is the first article that addresses the issues of gender diversity management for sustainable security and peace in an interdisciplinary and holistic manner. Our approach is relevant to any organisation with internal gender and intersectional diversity and systemic discrimination.
{"title":"Gender diversity management in NATO for sustainable security and peace","authors":"Kamila Trochowska-Sviderok, Yvonne Rose Masakowski, M. McFate, Anne Holohan","doi":"10.35467/sdq/183658","DOIUrl":"https://doi.org/10.35467/sdq/183658","url":null,"abstract":"The article focuses on the need for a paradigm shift in diversity management for sustainable peace and security. We discuss the bidirectional influence of security and defence organisations and society; the intersectionality of issues related to social justice, health, race, and ethnicity; sexual abuse and exploitation; and cultural factors that influence the functioning of LGBTQ+ personnel and the gender/technology nexus in the context of North Atlantic Treaty Organization (NATO). During the application of the Sustainable Security Paradigm to gender diversity management, we found that ecofeminism and the ideas of post-colonial theory should inform the transformational shift of contemporary security and defence organisational cultures. This approach was used by the multinational NATO Science & Technology Organization Exploratory Team ET-197 Gender, Peace and Sustainable Security (2022-23) and its successor, the NATO HFM-368 Research Task Group (2023-26). Our research efforts were triangulated by an analysis of doctrinal textual, audiovisual and art sources that relate to gender diversity and its management. Given the complexity of future warfare, there is a strategic imperative to develop an inclusive defence strategy that reconfigures the traditional white male-focused military paradigm. It is evident that the root cause of gender inequality cannot be solved solely by doctrine and training solutions—rather a transformational organisational culture shift is pivotal and critical to the future global security. This is the first article that addresses the issues of gender diversity management for sustainable security and peace in an interdisciplinary and holistic manner. Our approach is relevant to any organisation with internal gender and intersectional diversity and systemic discrimination.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"63 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140254792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mateusz Twardawa, Marek Smolik, F. Rakowski, Jakub Kwiatkowski, Norbert Meyer
SCADvanceXP is an industrial network intrusion detection system that scans and monitors data exchange between engineering stations, field divides, controllers, supervisory control and data acquisition (SCADA), and other elements of the operational technology network in detail. SCADvanceXP has the potential to detect advanced attacks on industrial infrastructures with the use of rulebased, signature-based, and behavioural detection methods, which are supported by sophisticated machine and deep learning models. As a system developed in Poland, it addresses the needs of industry in that region of Europe. The goal of this work was to assess SCADvanceXP’s potential to detect common industrial threats. In order to check SCADvanceXP’s potential, an effort was undertaken to evaluate its functionality on major industrial threats. For that purpose, twelve malware strains interfering with industrial systems were described. Later, the SCADvanceXP functionality was overlapped on malware behavioural and detection markers, pointing out exact mechanisms in SCADvanceXP that would detect analysed threats. The results show that SCADvanceXP is able to detect a wide range of attacks on industrial networks. SCADvanceXP’s rich functionality is able to provide a high standard of security. However, if a threat is affecting systems not directly connected with industrial networks, SCADvanceXP will not be able to detect it. SCADvanceXP only monitors industrial systems; hence, corporate networks must be protected by a different solution to provide the required level of security. Nonetheless, SCADvanceXP is dedicated to operating within industrial networks and does not have access to regular IT networks. It can be concluded that SCADvanceXP is a specialist tool providing desired security for industrial networks.
{"title":"SCADvanceXP—an intelligent Polish system for threat detection and monitoring of industrial networks","authors":"Mateusz Twardawa, Marek Smolik, F. Rakowski, Jakub Kwiatkowski, Norbert Meyer","doi":"10.35467/sdq/177655","DOIUrl":"https://doi.org/10.35467/sdq/177655","url":null,"abstract":"SCADvanceXP is an industrial network intrusion detection system that scans and monitors data exchange between engineering\u0000stations, field divides, controllers, supervisory control and data acquisition (SCADA), and other elements of the operational technology network in detail. SCADvanceXP has the potential to detect advanced attacks on industrial infrastructures with the use of rulebased, signature-based, and behavioural detection methods, which are supported by sophisticated machine and deep learning models. As a system developed in Poland, it addresses the needs of industry in that region of Europe. The goal of this work was to assess SCADvanceXP’s potential to detect common industrial threats. In order to check SCADvanceXP’s potential, an effort was undertaken to evaluate its functionality on major industrial threats. For that purpose, twelve malware strains interfering with industrial systems were described. Later, the SCADvanceXP functionality was overlapped on malware behavioural and detection markers, pointing out exact mechanisms in SCADvanceXP that would detect analysed threats. The results show that SCADvanceXP is able to detect a wide range of attacks on industrial networks. SCADvanceXP’s rich functionality is able to provide a high standard of security. However, if a threat is affecting systems not directly connected with industrial networks, SCADvanceXP will not be able to detect it. SCADvanceXP only monitors industrial systems; hence, corporate networks must be protected by a different solution to provide the required level of security. Nonetheless, SCADvanceXP is dedicated to operating within industrial networks and does not have access to regular IT networks. It can be concluded that SCADvanceXP is a specialist tool providing desired security for industrial networks.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of this study was to determine possible future scenarios if 3D printed firearms were to be manufactured in society. These scenarios provide a closer examination of the factors influencing the use of this relatively new method of firearms production. We reviewed the factors in 3D printed firearms that are relevant to various security authorities. Scenario analysis enables the examination of problem-solving for this multi-dimensional, multi-layered and multi-scale phenomenon. The topic was approached from a systemic perspective based on complexity thinking. The scenario-creation method employed five forecasting techniques applicable to the Playbook for Strategic Foresight and Innovation (Carleton, 2013). A context map created the basis for factor analysis, generational arcs, white spots and expert panel. The scenarios were developed into a structural format, allowing for the description of coherent entities. Upon analysing the scenarios, it was found that the ease of manufacturing 3D printed firearms could lead to a rapid increase in their numbers, potentially resulting in decreased internal and external security. The networking of manufacturers could also enable the production of weapons for individuals who previously did not have access to firearms. On the other hand, 3D printed firearms could open up new legal uses and possibilities. The networking of manufacturers could also enable the production of weapons for individuals who previously did not have access to firearms. On the other hand, 3D-printed firearms could open up new legal uses and possibilities.
本研究的目的是确定未来社会制造 3D 打印枪支可能出现的情况。这些情景提供了对使用这种相对较新的枪支生产方法的影响因素的更深入研究。我们审查了 3D 打印枪支中与各安全部门相关的因素。通过情景分析,可以研究如何解决这种多维度、多层次和多规模的现象。本专题从基于复杂性思维的系统角度切入。情景创建方法采用了适用于《战略前瞻与创新手册》(Playbook for Strategic Foresight and Innovation)(卡尔顿,2013 年)的五种预测技术。背景地图为因素分析、代际弧线、白点和专家小组奠定了基础。情景被发展成一种结构格式,允许描述连贯的实体。在对情景进行分析后发现,制造 3D 打印枪支的便利性可能会导致枪支数量的快速增长,从而可能导致内部和外部安全的下降。制造商之间的联网也可能使以前无法获得枪支的个人生产武器成为可能。另一方面,3D 打印枪支可以开辟新的合法用途和可能性。制造商联网还可以为以前无法获得枪支的个人生产武器。另一方面,3D 打印枪支可以开辟新的合法用途和可能性。
{"title":"Security scenarios: 3D Printed Firearms","authors":"Samu Rautio, Mika Broms","doi":"10.35467/sdq/181047","DOIUrl":"https://doi.org/10.35467/sdq/181047","url":null,"abstract":"The aim of this study was to determine possible future scenarios if 3D printed firearms were to be manufactured in society. These scenarios provide a closer examination of the factors influencing the use of this relatively new method of firearms production. We reviewed the factors in 3D printed firearms that are relevant to various security authorities. Scenario analysis enables the examination of problem-solving for this multi-dimensional, multi-layered and multi-scale phenomenon. The topic was approached from a systemic perspective based on complexity thinking. The scenario-creation method employed five forecasting techniques applicable to the Playbook for Strategic Foresight and Innovation (Carleton, 2013). A context map created the basis for factor analysis, generational arcs, white spots and expert panel. The scenarios were developed into a structural format, allowing for the description of coherent entities. Upon analysing the scenarios, it was found that the ease of manufacturing 3D printed firearms could lead to a rapid increase in their numbers, potentially resulting in decreased internal and external security. The networking of manufacturers could also enable the production of weapons for individuals who previously did not have access to firearms. On the other hand, 3D printed firearms could open up new legal uses and possibilities. The networking of manufacturers could also enable the production of weapons for individuals who previously did not have access to firearms. On the other hand, 3D-printed firearms could open up new legal uses and possibilities.\u0000\u0000\u0000\u0000\u0000","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"238 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140450977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Book Review Frank Close (2019) Trinity: The treachery and pursuit of the most dangerous spy in history. London: Penguin Books, 500 pp., ISBN 978-0-141-98644-9’","authors":"Ben de Jong","doi":"10.35467/sdq/183020","DOIUrl":"https://doi.org/10.35467/sdq/183020","url":null,"abstract":"","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"23 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139776245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Book Review Frank Close (2019) Trinity: The treachery and pursuit of the most dangerous spy in history. London: Penguin Books, 500 pp., ISBN 978-0-141-98644-9’","authors":"Ben de Jong","doi":"10.35467/sdq/183020","DOIUrl":"https://doi.org/10.35467/sdq/183020","url":null,"abstract":"","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"281 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139835712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Countries in Europe have experienced radio frequency interference from Russian electronic warfare units, affecting navigation systems without discrimination. Interference has been identified as coming from the Russian mainland, Kaliningrad, and in the areas where it is engaged in conflicts abroad, creating serious hazards for aircraft. Previous research has identified the technical vulnerabilities to aviation from radio frequency interference, but it has yet to be contextualised in light of the ongoing geopolitical tensions. Using literature review analysis, the aim of the article is to place the jamming and spoofing threat in the context of ongoing political tensions between Russia and the region and to establish worse-case scenarios based on the former’s motives. Focusing on the threats to aircraft, it finds that the likely motivations are to (1) complement political narratives of Western aggression; (2) to deny service for intimidation, harassment, economic loss, and to portray a dominant Russian cyber influence; and (3) to use spoofing to enable hostage diplomacy via the seizure of people and assets. It argues that reporting mechanisms for aviation risks assumes geographical staticism, which does not correspond adequately to the threat. It also creates arbitrary “predictability” in otherwise unpredictable environments, which could ultimately affect vigilance and due diligence in the areas not considered problematic.
{"title":"Aircraft vulnerability to politically motivated Radio Frequency Interference (RFI) in Eastern Europe","authors":"Tegg Westbrook","doi":"10.35467/sdq/178249","DOIUrl":"https://doi.org/10.35467/sdq/178249","url":null,"abstract":"Countries in Europe have experienced radio frequency interference from Russian electronic warfare units, affecting navigation systems without discrimination. Interference has been identified as coming from the Russian mainland, Kaliningrad, and in the areas where it is engaged in conflicts abroad, creating serious hazards for aircraft. Previous research has identified the technical vulnerabilities to aviation from radio frequency interference, but it has yet to be contextualised in light of the ongoing geopolitical tensions. Using literature review analysis, the aim of the article is to place the jamming and spoofing threat in the context of ongoing political tensions between Russia and the region and to establish worse-case scenarios based on the former’s motives. Focusing on the threats to aircraft, it finds that the likely motivations are to (1) complement political narratives of Western aggression; (2) to deny service for intimidation, harassment, economic loss, and to portray a dominant Russian cyber influence; and (3) to use spoofing to enable hostage diplomacy via the seizure of people and assets. It argues that reporting mechanisms for aviation risks assumes geographical staticism, which does not correspond adequately to the threat. It also creates arbitrary “predictability” in otherwise unpredictable environments, which could ultimately affect vigilance and due diligence in the areas not considered problematic.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":"10 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139850334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Countries in Europe have experienced radio frequency interference from Russian electronic warfare units, affecting navigation systems without discrimination. Interference has been identified as coming from the Russian mainland, Kaliningrad, and in the areas where it is engaged in conflicts abroad, creating serious hazards for aircraft. Previous research has identified the technical vulnerabilities to aviation from radio frequency interference, but it has yet to be contextualised in light of the ongoing geopolitical tensions. Using literature review analysis, the aim of the article is to place the jamming and spoofing threat in the context of ongoing political tensions between Russia and the region and to establish worse-case scenarios based on the former’s motives. Focusing on the threats to aircraft, it finds that the likely motivations are to (1) complement political narratives of Western aggression; (2) to deny service for intimidation, harassment, economic loss, and to portray a dominant Russian cyber influence; and (3) to use spoofing to enable hostage diplomacy via the seizure of people and assets. It argues that reporting mechanisms for aviation risks assumes geographical staticism, which does not correspond adequately to the threat. It also creates arbitrary “predictability” in otherwise unpredictable environments, which could ultimately affect vigilance and due diligence in the areas not considered problematic.
{"title":"Aircraft vulnerability to politically motivated Radio Frequency Interference (RFI) in Eastern Europe","authors":"Tegg Westbrook","doi":"10.35467/sdq/178249","DOIUrl":"https://doi.org/10.35467/sdq/178249","url":null,"abstract":"Countries in Europe have experienced radio frequency interference from Russian electronic warfare units, affecting navigation systems without discrimination. Interference has been identified as coming from the Russian mainland, Kaliningrad, and in the areas where it is engaged in conflicts abroad, creating serious hazards for aircraft. Previous research has identified the technical vulnerabilities to aviation from radio frequency interference, but it has yet to be contextualised in light of the ongoing geopolitical tensions. Using literature review analysis, the aim of the article is to place the jamming and spoofing threat in the context of ongoing political tensions between Russia and the region and to establish worse-case scenarios based on the former’s motives. Focusing on the threats to aircraft, it finds that the likely motivations are to (1) complement political narratives of Western aggression; (2) to deny service for intimidation, harassment, economic loss, and to portray a dominant Russian cyber influence; and (3) to use spoofing to enable hostage diplomacy via the seizure of people and assets. It argues that reporting mechanisms for aviation risks assumes geographical staticism, which does not correspond adequately to the threat. It also creates arbitrary “predictability” in otherwise unpredictable environments, which could ultimately affect vigilance and due diligence in the areas not considered problematic.","PeriodicalId":52940,"journal":{"name":"Security and Defence Quarterly","volume":" 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139790829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}