Hybrid Threats & Asymmetric Warfare
Hybrid Threats & Asymmetric Warfare
Hybrid Threats & Asymmetric Warfare
What to do?
Stockholm 14-15 November, 2017
at
the Swedish Defence University, Stockholm, Sweden
Conference proceeding
February 2018
Funded by:
1
The conference was organised by
in collaboration with
Funded by:
Organising committee
Principal Investigator:
Dr. Mikael Weissmann, Assoc. Prof. in War Studies (military operations), Land Operations
Section, SEDU.
Dr. Håkan Gunneriusson, Head of research & deputy head of Land Operations Section, SEDU
Per Thunholm, Senior Analyst at the Center for Asymmetric Threat Studies (CATS), SEDU
2
Hybrid Threats and Asymmetric Warfare:
What to do?
The international security environment has seemingly departed from a post-cold war
period of everlasting peace and has instead evolved into a volatile and increasingly
grey area of war and peace. Security challenges arising from both hybrid wars and
hybrid threats are high on security agendas in Sweden and Europe as well as
internationally. However, despite the attention there is a lack of research that
addresses how such “new” wars and threats should be handled. While studies do
exist on specific issues, a comprehensive approach to how hybrid wars and threats
are to be handled is still lacking. This is particularly the case when it comes to the
sharing of experiences between states. This workshop constituted a first step
towards developing such a comprehensive approach.
These proceedings include a summary of the key points made by the presenters,
along with conclusions and policy recommendations derived from the ensuing
discussions. Conference programme and a list of abstracts for the papers and
presentations can be found in the appendix.
3
Summary of key points from the proceedings
• There is general agreement that Hybrid Warfare does include both multiple
and synchronised threats that aim to target state vulnerabilities at different
levels of intensity over time:
• Swedish Officer training is based on the 2015 curriculum and does not
include Hybrid Warfare training.
4
• A survey of different officers demonstrated a wide variance in
understanding of what Hybrid Warfare was and how relevant it should be
for different parts of the Armed Forces.
• Hybrid Warfare blurs the distinction between civilian and combatant and
both demands and permits all activities deemed necessary to achieve
success. This could include full spectrum capabilities, including long
distance weapons and Special Forces. The concept of strategic Key Terrain
is also important, with increasingly potent Anti-Access Area Denial
(A2AD) systems used to protect or threaten these areas.
• The role for the military in Hybrid Warfare will be varied, spanning the
tactical to the strategic levels and including policing functions alongside
more traditional military ones.
5
have been used as shaping instruments to create the conditions for
conventional military intervention.
Session 1 Conclusions:
o Authoritarian Rule.
o A sense of vulnerability.
o Threat Perception.
o A messianic mission to save Europe.
6
o A sense of being a Great Power.
o A Clausewitzian approach and a belief in the utility
of force.
o The concept of being permanently in conflict.
o The use of asymmetric capabilities to conduct
Hybrid Warfare.
7
o Allow humans to become more efficient and to be free to conduct
more empathetic activities instead.
o Drive consensus faster in detecting and attributing Hybrid
Warfare activity.
o Enhance cyber resilience by reducing cyber vulnerabilities.
o Offer the chance to overmatch Hybrid Warfare capabilities.
Session 2 Conclusions:
• States should not underestimate and should instead seek to exploit the good
will and significant capabilities within their civilian and private sectors.
8
SESSION 3: Russia’s neighbours
The August 2008 war against Georgia by the Russian Federation combined cyber and
conventional attacks against governmental, media and financial institutions.
Moreover, the increasing dependence on ICT clearly demonstrated that Georgia’s
national security could not be protected without the provision of cybersecurity.
In the period after 2008, Georgia started to develop these cybersecurity capabilities
and improve its IT resilience through:
• Russian “Gybrid Warfare” uses the normal Russian approach but with the
elements used in different intensities. They are different portions of the
same pie chart, used like a graphic equaliser but still with the traditional
Russian aim of striking deeply over a broad front:
9
Dimensions Actors Actions (operations)
History and myth Academia Documentaries
Religion Church Historical Literature
Economy State/Private Local and International
Military Army, Militia, Security Pressure
Information Service, Private Military Direct, covert actions
Cyber Companies
Media
Diplomatic
• The Russian Government arguably bases its thinking around four ‘Russian
truths’:
o ‘War is eternal’.
o War is fought by the state and not (just) the military of a state.
o ‘You fight your way, I fight mine’.
o Victory does not require the capture or occupation of
territory…’you have a territory, you have a problem … you have
the king, you have the territory’.
• In completing its last ‘Zapad’ exercise this year, Russia was able to test all
three of its strategic exercise objectives:
10
• Besides its existing brigades, Russia is also moving towards re-establishing
a divisional level within its Armed Forces as a possible framework for the
use of its combat brigades in larger scale operations. The new Russian
Defence Management Centre is the main state command and control centre,
allowing Russia the ability to analyse any situation and run operations
continuously.
• Some of the key concepts in the latest Russian National Security Strategy
include sovereignty, independence and state and territorial integrity.
• Hybrid Warfare says more about the West than it does about Russia. Russia
plays on the lack of desire on the part of western nations to engage in
existential conflict due to their unwillingness to sacrifice their high standard
of living.
11
• Western countries accept and even facilitate Russian ‘tactical truths’
because they choose not to call out disinformation as it would hurt their
economic rationality. Meanwhile, Russia uses reflexive control to paint the
West as weak.
•
• Russian disinformation is an interactive process that requires both the actor
and the audience. Putin is an artist and we (the western states) are the
consumer!
12
The logic of Russian asymmetric warfare
Peter Mattson, SEDU
• Its methods include technological means, will power, moral authority and
organisational ability. The dimensions within which these methods operates
vary:
o Positive or negative.
o Short or long duration.
o Low or high risk.
o Discrete or integrated.
o Material or psychological.
• Politically, Russia can also use South Ossetia and Abkhazia as levers with
Georgia. On the softer side, NGOs are also used by Russia to facilitate
Russian-Georgian links.
13
Session 4 Conclusions:
• Ukraine perhaps shows the limits of Russian Hybrid Warfare: once Western
actors actively called out hybrid activity and named Russia as the
aggressor, it became possible to apply real countermeasures (primarily in
the form of economic sanctions).
14
SESSION 5: Hybrid war and threats: the legal grey area
• In time of conflict, the media tend to support their government’s line (“it’s
better to be viewed as a foot soldier for Bush than a spokeswoman for Al
15
Qaeda “, Irene Briganti, Fox News spokeswoman). The question is, how far
should this go?
• The legal provisions for countering propaganda are weak – the ICCPR
prohibits propaganda for war, but most countries have entered reservations
to this provision, citing freedom of expression. The Rome Statute of the
International Criminal Court in practice only prohibits propaganda
promoting genocide, crimes against humanity and war crimes. By contrast,
this falls far short of the sort of provisions in domestic laws to cover e.g.
hate speech and support for terrorism.
• People tend to continue to believe media statements that they have heard
even when those statements have been retracted; ... unless people are
suspicious about motives surrounding the events in question.
• The best way to counter propaganda is to tell the truth and demonstrate that
this is indeed the case.
16
reinterpreting legal grey areas and changing customary international law by
practice.
• Notably, however, these practices are not new and have been applied also
by Western actors in a number of cases. This has attracted far less publicity
in the West.
• LOAC, however, allows states to assign soldiers the right to kill persons
who do not present direct threats if identified as combatants. In asymmetric
warfare, threats emerge among those who appear to be civilians. The
concept of a civilian taking a “direct participation in hostilities” is important
because it allows soldiers to target and kill those committing or preparing
hostile or warlike acts against the State’s war efforts.
17
definition within self-defence, giving the soldier much more discretion in
using force against a civilian’s hostile or warlike acts.
• The concept of hybrid warfare is not new as a concept of warfare but serves
as a new platform that allows the discussion of threats beyond the concepts
of war, peace and kinetic warfare. The definition of Hybrid warfare should
remain open as a means to discuss other non-kinetic methods such as
lawfare and information operations, both of which have the potential to
become fully fledged new warfighting domains.
• Lawfare is a warfighting domain on its own. Lawfare refers to the use
and/or abuse of the rule of law in a defensive and offensive capacity to
achieve operational success without the need to employ kinetic methods of
warfighting. There is no operational lawfare unit at NATO level but there
are some member states which have such offensive/defensive capabilities.
• Russia is essentially mirroring the West when it comes to lawfare – arguing
that they were responding to lawfare threats posed by the West.
Session 5 Conclusions:
18
• While these actors can be assigned the status of belligerents and thereby
targetted, they exist worldwide and need to be addressed through broader
approaches. We need to find ways to address the problem of sovereign
states allowing violence on their territories according to different unified
definitions of status. It is legally difficult to counter insurgent ideology.
Some organizations can operate under the radar without consequences
since hostile actions cannot be connected to them. Soldiers need training to
know that they are exercising the status assigned to them by the state.
Otherwise, we risk prolonging the war.
19
• If we really want to develop a deterrent against hybrid threats, we cannot
only focus on “hardware” and “fixing” things. Because hybrid warfare
entails a strong ‘battle for the narrative’, one of the future battlefields is our
populations and elite’s mindset and the harnessing of a new defensive spirit.
• NATO: HW is not new. What is new is that it has moved from the
operational to the strategic level, underpinned by new dimensions such as:
globalization; complex geostrategic environment; advanced technologies
(cyber); and information demand.
• Russia is always inside the western OODA-loop by being swift in its
decision making. NATO needs an agreement between its member states to
mitigate the organisation’s long decision processes.
20
• The 3 pillars of NATO response vs hybrid: 1) Prepare, 2) Deter, 3) Defend.
Special Forces and hybrid scenarios: “Diplomat warriors” in small states and
medium powers
Njord Wegge, NUPI
• Small/medium size states like Norway and Sweden can, and should consider
to develop SOF designated to counter warfare also in the political, societal
and diplomatic domain. Such a development might demand the
development of new legal mandates and involve parts of the emergency and
contingency apparatus.
Session 6 Conclusions:
21
Appendix
Conference Programme
Tuesday, Nov 14
0900-1040 Presentations:
1. Modelling hybrid warfare: a generic and
holistic approach
Patrick Cullen, Norwegian Institute of
International Affairs (NUPI)
2. Hybrid warfare in the mind of the
Swedish officer
Michael Gustafson, Swedish Defence
University
3. Hybrid threats and warfare today and
tomorrow: bringing the army (back) in
Mikael Weissmann, Swedish Defence
University
4. Adapting mission organizational constructs
to enhance civil-military coordination to
counter hybrid threats
Scott Moreland, Center for Civil-Military
Relations, Naval Postgraduate School, United
States
22
SESSION 2: Cyber in a hybrid context
1110-1225 Presentations:
1. Theory of strategic culture – a tool to
explain Russian cyber threat perception?
Col. Martti J. Kari, University of Jyväskylä,
Finland
2. Estonian defence league cyber unit as a
hybrid national security actor
Rain Ottis, Tallinn University of Technology,
Estonia
3. The silicon hat hacker: using reinforcement
learning in hybrid warfare
Wayne Dalton, Stellenbosch University, South
Africa
1325-1425
Cyber component of asymmetric warfare: the Georgian
experience Marina Malvenishvili, Chief specialist of
development and foreign affairs section, Cyber Security
Bureau, Ministry of Defence of Georgia
Discussion
23
SESSION 4: Russia and hybrid warfare
Presentations:
1. Asymmetric measures in the Russian
Security Strategy
Katri Pynnöniemi, University of Helsinki and
National Defence University, Finland
2. Hybrid warfare – short or middle range
theory?
Håkan Gunneriusson, Swedish Defence
University
3. The logic of Russian asymmetric warfare
Peter Mattson, Swedish Defence University
4. Russian hybrid warfare in Georgia:
lessons learned
Niklas Nilsson, Swedish Defence University
Wednesday, Nov 15
Presentations:
24
1. Beyond Passportisation: when legal
grey areas leave the door open to
interventionism and rewriting post-
1945 principles on international peace
and security
Noelle Quenivet, UWE Bristol, United
Kingdom
2. The use of force in an asymmetric
conflict is not only limited to a soldier’s
right of self-defense
Mark Maxwell, Deputy Legal
Counsel, U.S. Africa Command,
United States
3. Hybrid warfare and lawfare –
the use of law as a weapon in the
context of hybrid warfare.
Sascha Dov Bachmann,
Bornemouth University, United
Kingdom
1115-1230 Presentations:
25
challenges of being
prepared
Guillaume Lasconjarias,
NATO Defence College,
Rome, Italy
3. Special forces and hybrid
scenarios: “Diplomat
warriors” in small states
and medium powers
Njord Wegge, Norwegian
Institute of International
Affairs (NUPI)
1230-1245 Conclusion
26
Abstracts
Session 1
27
Hybrid warfare in the mind of the Swedish officer: a multiple
duality view of tactics and operational art
Michael Gustafson, Swedish Defence University
Understanding hybrid warfare is challenging because it comprises among other
dimensions threats not belonging to the traditional military domain. Nevertheless,
traditional military capabilities are said to exist in hybrid warfare, in parallel with
irregular warfare: concepts such as guerrillas, terrorists, criminality and a dominant
use of information and cyberwarfare. This article examines standpoints among
Swedish officers studying at the two-year higher staff education regarding tactics and
operational art in so-called hybrid warfare. The study is a sociological mapping of
statements inspired by Pierre Bourdieu field theory, addressing the question of “How
can field theory explain contemporary military thought on tactics and operational art
in hybrid warfare?”.
The results show that military views on hybrid warfare can be distributed as a field
with opposite opinions of the same challenge. This field can be expressed in the
following way; a larger group of officers stated preferences for infantry unit concepts
in a blended military and civilian context. A smaller group argued preferences to
ranger unit concepts in a mainly military context. Even more varied thought was
expressed by a smaller, group of officers, highlighting mechanized unit concepts in a
regular warfare context. Finally another group preferred mechanized tactics and
operation in a blended military and civilian context. Also with in each tactical type
Different views also appeared within each tactical type. A multiple duality of views
can thus be argued to exist in this field, with a potential of shaping different
preconditions for collaboration, comprehensive approaches, leadership, planning and
execution of operations.
28
The paper will focus on 1) how the threats are perceived by the Swedish armed forces
in general and the army in particular, 2) what can the army do, and 3) what should the
army be able to do (and not do)? To make the picture as comprehensive as possible,
the study combines analysis of official discourse in official documents, including
doctrines and the ongoing public debates among pundits and experts, with qualitative
and structured interviews with army officers. The focus in the interviews will be on
operationalisation: what CAN the army do, what SHOULD the army be able to do,
what should it NOT BE ABLE TO DO, and HOW does it get to where it want to be?
Hybrid threats depend on our perceived lack of agility, flexibility, and resolve.
Contemporary missions - including peacekeeping, cyber security, and maritime
security - have developed modestly effective models for the practical application of a
comprehensive approach; these can be adapted and applied to counter hybrid threats.
Through existing and evolving organizational models, collective capabilities must be
better coordinated via mutual trust and understanding, enhanced interoperability, and
unassailable transparency.
29
Session 2
30
The silicon hat hacker: using reinforcement learning in hybrid
warfare
Wayne Dalton, Computer Information Systems Department, Faculty
of Military Science, Stellenbosch University, South Africa
Computers today can learn things, on their own. 20 years ago, computers were
capable of mastering human-like behaviour, but needed a lot of human expertise to
guide their performance. Today, advances in machine learning have made it possible
for computers to master very complex problems without relying on the encoding of
human expertise into their algorithms. Recently, machine learning has successfully
enabled computers to learn things that their human programmers themselves are
unable to do; like discover new molecules that might lead to new drugs (Markoff,
2012).
Computers are also vulnerable to being exploited by hostile third-parties for a wide
range of reasons, including cybercrime and cyber warfare. This endangers the safety
and security of individuals, corporations and nation states in ways that are hard to
protect against using conventional methods. Some companies have proverbially “set
a thief to catch a thief” by employing large numbers of ethical hackers and other
professionals to “pen test” their own critical infrastructure. Their goal is finding and
fixing vulnerabilities in their systems before hostile attackers can exploit them.
This paper proposes that a computer can, in a self-sufficient and proactive manner,
determine whether critical infrastructure is vulnerable to known cyber security
exploits. The goal would be to remedy these exploits before anyone else can make use
of them. The “silicon-hat hacker” is a machine-learning program that can explore and
exploit vast quantities of data and consequently make high-confidence predictions on
the existence of security exploits. This paper introduces the reader to reinforcement
learning and how it might be used in cyber security. Finally, the paper will propose an
architectural framework on how to accomplish this application of reinforcement
learning to cyber security. In hybrid warfare, the complementary collaboration
between Man and Machine will enhance capability and ultimately security and peace.
31
Session3
Hybrid Warfare has dozens of definitions and most of them are contradicting. The
purpose of this paper is not to define the term in general but to talk about its Russian
version. Hybrid Warfare is quite similar to the Russian notion of regular war; it
consists of exactly the same components. The difference is that those components are
employed in significantly different proportions and intensity. For a better
understanding of Russian warfare we need to define (1) the dimensions (battlespaces)
of Russian warfighting; (2) the actors employed; and (3) the actions (types of
operations) conducted. Usually, the battlespaces of Russian warfare are: History and
Myths, Religion, Economy, Military, Information and Cyber. War is fought in all
those dimensions either simultaneously, in combinations, or alone, depending on the
environment or the desired end state. Russian warfare is highly flexible and there are
32
no clear lines between its different forms – Hybrid and conventional. Hybrid is a
comparably new type of Russian warfare, which is partially based on the concept of
the Soviet Deep Battle. It means that Russia is operating in the entire depth of the
enemy defence but not only in the military but other dimensions as well. The so-called
Gerasimov Doctrine, which is widely seen as a bible of Russian Hybrid War is also
talking about multidimensional war and underlines that this is not a Russian invention.
Indeed, Hybrid War is neither entirely Russian, nor did it begin in Donbass. This
paper analyses Russian Hybrid Warfare during the conflict in Abkhazia in the 1990s,
which is still widely referred to as a separatist conflict. Yet in reality, it was an
instance of Russian Hybrid Warfare against Georgia.
Session 4
Since the 2014 Crimean operation, Western military analysts have reviewed Russian
military thinking in an attempt to both distinguish novel features and traditional
patterns in the Russian ways of war. This research has drawn attention to concepts of
‘nonlinearity’, full-spectrum war, an ‘asymmetric approach’, and more recently to
‘strategic deterrence’. Two of these concepts appear in the National Security Strategy,
namely the asymmetric approach and strategic deterrence. In fact, the strategy ties
these two concepts together in a way that tells a lot about the Russian approach to
conflict. The ‘asymmetric approach’ has a rich history in Western military thought. [1]
What I argue here is that its current usage in the Russian context can be traced to
lessons drawn by the retired army general and the President of the Academy of
Military Science, Makhmut Gareev after Russia’s “five day war” with Georgia. The
[1]
B. H. Liddlell Hart, Strategy: Second Revised Edition, NY: Penguin
Books, 1991.
33
paper will discuss the evolution of this ‘asymmetric approach’ in the national security
strategy (2009 and 2015).
Yet there is more to this than Russia’s relative strength and the West’s focus on
economic rationality. Each of these factors can be seen in the terms of Fernand
Braudel as a Courte Durée (that Russia’s relative military might will equal that of the
West) and a Moyenne Durée (that the West’s positivistic economic pursuit might one
again become balanced by a more autonomous political rationality). However, there is
further a current change in the perception of singular truth in society, which makes the
interpretation of war and the relativisation of war easier. This is not a temporary
(Courte) change.
34
strength. In Russia, all national power domains are coordinated under a military
command in the National Defense Management Center (NDMC). The asymmetric
approach can be used on the political-strategic, military-strategic and operational
levels, or as a combination of all of them. Asymmetry can include different methods,
technologies, values, organizations, time separation, or a combination of some of
them. Strategic vulnerabilities usually include national leadership, the elite of the
administration, as well as some strategic infrastructure.
35
Session 5
Within the realm of deception sits the concept of information operations or, more
colloquially, propaganda. Of all the forms of hybrid warfare, propaganda ops are,
perhaps, one of the most effective, as they may be used to change the perceptions of
both friend and foe. In the former case, to win support for a cause. In the latter case, to
confuse and sow seeds of doubt and fear.
In the Second World War, the allies used deception to great effect to protect the plan
for the Normandy landings (operation OVERLORD) from being discovered, and
employed a number of deception ops (Operation BODYGUARD) to disguise their
real intent. As Churchill remarked at the Tehran Conference, in November 1943, “In
wartime, truth is so precious that she should always be attended by a bodyguard of
lies”.
In more recent times, we have seen how disinformation and half-truths have won
nations support for war in Iraq, Kosovo, Libya and Syria. On all of these occasions,
the media and political establishment has played its part in disseminating the
narrative. No one has been taken to task for some of the egregious claims made, for
example, in the case of propaganda promoting WMD in Iraq.
In Syria, in the battle for East Aleppo, it became evident eventually that the reports
being broadcast every evening by western media lacked independence, as their
sources were Nusra jihadist activists within the militant-held part of the city. Images
of children were used to win the sympathies of world viewers, and social media was
employed to great effect to promote fake news or skew the truth. The truth had
become a casualty. Propaganda had had a major impact on perceptions from outside
Syria and wooed the famous and the powerful to the Islamists’ cause: Islamists who
were proscribed terrorist organizations listed by, inter alia, the United States and
United Kingdom.
36
Where leaders, be they military or political, press a narrative for war, or journalists
promote reports which they know or believe to be from a partisan and proscribed
terrorist source, whether or not intentionally to support that biased narrative, is there
any legal accountability? Does the law – international or domestic – make propaganda
for war an offence, or is that a step too far and one which offends the right of freedom
of expression and a free press?
The answer, it seems, is that there are few legal constraints on propaganda which falls
short of incitement, or aiding and abetting etc. genocide, war crimes, or crimes against
humanity, where the intent required in relation to a consequence of the narrative is
that the person means to cause that consequence or is aware that it will occur in the
ordinary course of events. In spite of the palpable bias in some quarters of the media,
it is doubtful that any journalist has crossed that Rubicon. Which means that the use
of propaganda remains a key tool of hybrid warfare.
Beyond passportisation: when legal grey areas leave the door open
to interventionism and rewriting post-1945 principles on
international peace and security
Noelle Quenivet, UWE Bristol, United Kingdom
By exploring Russia’s activities from the fall of the Soviet Union until the present
day, this paper examines how Russia uses nationality (understood in a wide sense of
the term) as a political, economic, and cultural tool to justify expansionism. Russia, so
it seems, is using grey areas in international law to implement a policy whose legal
implications are in breach of the key principles of the UN Charter relating to
international peace and security. It is argued that the policies and tools (e.g. conferral
of nationality, support for the right of self-determination, protection of nationals
abroad, etc.) developed and used by Russia are not necessarily unlawful per se; they
can indeed in some instances be justified under international law as they fall within
the grey areas of international law. That being said, the situations created as a result of
this policy are often unlawful (e.g. recognition of a State that is part of the territory of
another State, occupation and annexation, etc.). The paper concludes that Russia, by
using its ‘nationals’ abroad and legal grey areas, is attempting to rewrite the rules
carefully crafted post-1945, thereby allowing for interference in neighbouring States
to become an established international custom.
37
The use of force in an asymmetric conflict is not only limited to a soldier’s right
of self-defense
In many scenarios, the soldier is able to use lethal force under both under both
concepts: individual self-defence and LOAC’s civilians taking direct part in
hostilities. But the degree of force under each concept is profoundly different. For
example, a civilian takes part in hostilities by shooting at a soldier. After shooting, the
civilian drops his weapon and starts to run away. There is real dispute if a soldier can
shoot the civilian under the concept of individual self-defence; the threat posed by the
civilian has evaporated. However, there is no issue under LOAC: the soldier can shoot
the civilian because the civilian has taken the status of an enemy belligerent. So the
degree of force might be different depending on which authority the soldier applies;
but also, there are scenarios where both concepts do not overlap. For example, an
aggrieved father of an innocent victim attacks a soldier out of remorse – the soldier’s
38
right to respond falls squarely under individual self-defence. To the other extreme, a
civilian helping to place an improvised explosive device (IED) in a road used by
civilians is taking direct participation in hostilities. The intent of the IED is to prevent
governance by funnelling civilians away from government-provided services.
Friendly forces are not in the area, so individual self-defence is not applicable;
however, LOAC concepts of targeting still apply and the civilian can be lethally
targeted; it is part of the military’s mission accomplishment to the win the conflict.
Understanding both concepts have three long-term advantages that will assist both the
nation and military to navigate the use of force in these type of asymmetric conflicts.
First, on a strategic level, it would help educate the Nation and its polity who are
sending troops into harm’s way that there are delineations between defensive
measures, which a soldier always possesses under self-defence, and offensive
measures, which will allows the soldier to win the nation’s armed conflict. Second,
on an operational level, it would compel militaries to train and educate their military
force on the conceptual difference between the defensive use of force under individual
self-defence – which is inherent - and the offensive use of force under LOAC – which
is granted by the State to the individual soldier; this training will solidify the soldier’s
understanding of what force he or she is able to use under both concepts. In turn and
thirdly, on a tactical level, this training would help the soldier understand both his
limits and the expanse of his authority to use force on the battlefield.
39
https://www.academia.edu/34320799/Briefing_paper_Lawfare_in_Hybrid_Wars_The
_21st_Century_Warfare).
Session 6
40
This research project investigates the potential role of Special Operation Forces (SOF)
in Hybrid warfare scenarios in states of a small or middle power size. Based on
research on the advantages of SOFs in future hybrid warfare scenarios, combined with
insight into two relevant cases, Norway and Sweden, potential new roles of SOFs in
Hybrid Threat scenarios will be analysed.
The Project concludes by first by supporting the idea that small/medium size states
like Norway and Sweden can, and should, develop SOFs designated for warfare also
in the political, societal and diplomatic domain; while secondly also pointing out that
such a development might demand development of new legal mandates and a
reorganization of parts of the emergency and contingency apparatus.
41