Russia has been using an advanced form of hybrid warfare in Ukraine since early 2014 that relies heavily on an element of information warfare that the Russians call “reflexive control.” Reflexive control causes a stronger adversary voluntarily to choose the actions most advantageous to Russian objectives by shaping the adversary’s perceptions of the situation decisively. Moscow has used this technique skillfully to persuade the U.S. and its European allies to remain largely passive in the face of Russia’s efforts to disrupt and dismantle Ukraine through military and non-military means. The West must become alert to the use of reflexive control techniques and find ways to counter them if it is to succeed in an era of hybrid war.
The United States currently faces multiple national security threats in an environment of growing disorder. ISIS is executing a sophisticated global strategy that involves simultaneous efforts in Iraq and Syria, the Middle East and North Africa, and the wider world. Homegrown terrorism is increasing in the U.S. and Europe. Civil wars are intensifying in Ukraine, Yemen, and Libya, while the U.S. attempts to pivot to the Asia-Pacific. In this complex environment, it is difficult for policymakers to discern the consequences of action or inaction even in the near future.
Topic:
International Relations and International Security
Some have claimed that ISIS is on the defensive inside Iraq and Syria. A defensive strategy, however, is not a sign of organizational weakness, but rather a sign that ISIS intends to preserve its holdings in Iraq and Syria and keep its claim to a caliphate. ISIS’s defensive strategies include expanding elsewhere in the Middle East and North Africa, while also maximizing combat power and future opportunities to launch offensives inside Iraq and Syria. Iraq and Syria are the physical foundation for ISIS’s expanding caliphate.
U.S. policymakers in April 2015 appear to be returning to the position that Syrian President Bashar al-Assad represents the “least worst option in Syria” for American strategic interests. Assad is often compared to the Islamic State (ISIS) with the implication that Assad is the lesser of two evils. Senior administration officials including Secretary of State John Kerry signaled support for diplomatic negotiations with the regime in March 2015, rather than developing a committed strategy to remove Assad from power. American leaders’ ambivalence reflects the limitations of U.S. policy which attempts to treat Syria as the backdrop for a narrow counterterrorism problem rather than a comprehensive national security issue. This outlook is dangerously flawed.
The success or failure of the U.S. mission in Afghanistan has reached a critical juncture. Newly appointed Defense Secretary Ashton Carter announced on February 21, 2015 that the United States is considering a number of changes to the U.S. mission in Afghanistan, including slowing the drawdown timetable and rethinking the U.S. counter-terrorism mission. On March 16, 2015, anonymous U.S. officials confirmed that the United States is likely abandoning its plans to cut the number of U.S. troops to 5,500 at the end of the year. The United States could allow many of the 9,800 troops in Afghanistan to remain beyond 2015. A visit by Afghan President Ashraf Ghani to Washington, DC from March 22-25, 2015 is intended to discuss these issues.
Vitaliy Kravchuk, Malgorzata McKenzie, and Mykola Ryzhenkov
Publication Date:
08-2015
Content Type:
Special Report
Institution:
Slovak Foreign Policy Association
Abstract:
This is the first report of the project on vulnerable sectors in the Eastern Partnership (EP) countries. Its aim is to provide a macroeconomic setting for future structural reports. It also provides a toolkit for the sectoral reports in the sense that it offers a set of macroeconomic points of reference.
With a view to enhancing its analytical capacity and its engagement with the research community, the Counter-Terrorism Committee Executive Directorate (CTED) launched a global research network at United Nations Headquarters, New York, on 19 February 2015
Action Agenda for Historic Preservation in Legacy Cities" is a report containing a nine-point strategy to shape new approaches to preservation, to adapt existing tools and policies used by preservationists, and to promote place-based collaboration, especially in legacy cities like Newark, Detroit, and Cleveland. By offering new strategies for protecting local cultural heritage, "Action Agenda" serves as a guide for preserving the stories of Rust Belt cities and communities and make them more equitable, prosperous, and sustainable in the face of economic shifts. Using examples from Cincinnati, Buffalo, Detroit, and more, the report offers suggested next steps, potential partners from preservation and allied fields, and financing and coalition-building toolkits for urban development and preservation advocates.
It has been nearly twenty years since section 512 of the Digital Millennium Copyright Act established the so-called notice and takedown process. Despite its importance to copyright holders, online service providers, and Internet speakers, very little empirical research has been done on how effective section 512 is for addressing copyright infringement, spurring online service provider development, or providing due process for notice targets.
This report includes three studies that draw back the curtain on notice and takedown: 1. using detailed surveys and interviews with more than three dozen respondents, the first study gathers information on how online service providers and rightsholders experience and practice notice and takedown on a day-to-day basis; 2. the second study examines a random sample from over 100 million notices generated during a six-month period to see who is sending notices, why, and whether they are valid takedown requests; and 3. the third study looks specifically at a subset of those notices that were sent to Google Image Search.