Center for Security Research Articles Psychological aspects of modern warfare

Psychological aspects of modern warfare

Aleksandar Nacev

While war has long been viewed as a competition between adversaries, peace has been defined by absence of such conflict. But what happens when the line between war and peace is blurred and hardly visible? Countries today face a number of actors who use a wide range of political, informational, military, and economic measures to influence, coerce, intimidate, or undermine its interests or those of its friends and allies. To accomplish military goals without putting one’s nation, civilians, or even opposition troops at mortal risk is certainly the ideal manner in which to win a war.

This is one of the reasons why psychological warfare is the preferred form of warfare by both state and non-state actors today. Psychological warfare is the planned tactical use of propaganda, threats, and other non-combat techniques during wars, threats of war, or periods of geopolitical unrest to mislead, intimidate, demoralize, or otherwise influence the thinking or behavior of an enemy. All the global and regional powers have their unique brand of psychological warfare, but also terrorist groups like the Islamic State—employ political warfare to varying degrees. Modern psychological warfare, however, extends beyond proxy and covert uses of force. The US employs it’s multifaceted soft-power approach globally, Russia employs insignia-less “little green men,” China uses “civilian” fishing vessels to assert its claims in the South China Sea. Iran employs its shadowy Quds Force, the covert arm, to control a network of proxies throughout Iraq, Syria and the Middle East.

In warfare, each dimension of psychological warfare and every strategy are to be used together in an integrated and comprehensive manner. Just as a traditional military will not rely exclusively on fighter jets to accomplish their mission, psychological operations must rely on more than a single strategy to accomplish their goals. Every strategy has strengths and weaknesses, and proper planning must account for these weaknesses by utilizing combinations of functions simultaneously or consecutively. Psychological operations are intended to accomplish certain goals by managing the ideas, emotions, and behaviors of the opponent, as a less harmful and less risky alternative to traditional forms of warfare. The ability to program the opponent for the purposes of controlling his actions to accomplish military goals without necessarily putting oneself in harmful situations is the heart of psychological warfare. Like any programming language, the language of the mind is complicated, based on human instinct, environmental conditioning, complex and conflicting incentives, exposure to information, and so much more. Although psychological operations have seen a formal presence in many world militaries since the early twentieth century, the military potential for the application of psychology has not reached its limit, because a great number of ethical issues began to arise. It is generally seen as immoral to intentionally harm another person using psychological methods. Generally speaking, it is considered unethical to shoot another person, yet the shooting of other people tends to be a defining trait of warfare. But, it is important to consider that it is a far simpler matter to treat emotional or behavioral distortions in the brain than it is to treat a bullet in the brain. In pursuing the military applications for psychology, a nation not only greatly strengthens its military through highly effective means of accomplishing its goals, while reducing the amount of risk to which it exposes its soldiers, but it also reduces the amount of actual violence that must be used in accomplishing those goals.

The information arena is also an increasingly important battleground. Thanks to relatively low barriers to entry to social media, even non-state actors can wage sophisticated information campaigns to recruit and propagandize. Varying forms of economic pressure—bribes, blockades, or highly conditioned aid packages—are long-standing tools of statecraft that are now used for psychological warfare. Both state and non-state actors continually innovate in search of means of wreaking havoc far from their home bases, without firing a shot. Using such mechanisms of psychological warfare, these actors can advance their territorial interests without provoking a full-fledged military response by their opponents, and always shield themselves with the cloak of deniability.                

It is safe to say that security leaders and strategists must consider that psychological effects will matter as much as the kinetic ones in the hybrid dimensions of modern warfare.  Today every nation must build methods to develop the skill sets needed for the new dimensions of conflict, not only in their militaries and other government agencies, but across their societies and within the community of their security partners.

Related Post

When an order endsWhen an order ends

By Alessandro Politi, Director of the NATO Defense College Foundation

This article intends to discuss three points: the quest for a new world order, echoing the one established in 1945, is pointless; what should be done when an existing order cannot be adapted, and how the transition to a different order should be presently governed, taking into account also the new US administration.

The solutions proposed are to: adopt a flexible globalisation model where shared responsibilities and decision-making are realistically rebalanced; to refuse a fragmenting multipolarism; to relaunch global sustainability by redressing social imbalances at home and abroad in order to tackle climate change and to phase out an outdated model of consumerist capitalism. The overarching global priorities are essentially two: ensuring human security vis-à-vis climate change (and attendant pandemics) and favouring shared prosperity, which means the transition to a fairer hybrid economic system where economic policies are fully accountable to the taxpayer.

Will the Biden presidency understand these two strategic priorities? In short, the answer is: in word yes, in deed yo, with a strong tendency towards a no. Political handicaps in Congress and American socio-cultural conditions may significantly limit the President’s concrete choices, reducing complex decisions to a zero-sum game with China and risking an economic stalemate that could turn into hot confrontation. (more…)

Crime and its Profits from the Corona CrisisCrime and its Profits from the Corona Crisis

Tamara Mitkovska

From December until today, we are facing a disease that took the world by surprise. The pandemic caused an economic and social crisis that diverted the attention of the authorities from crime. Police and the military are being used to implement quarantine, many businesses have collapsed and many jobs have been lost. Hospitals have been, and still are, overflooded with patients for whom there is no cure, and those suffering from other diseases have remained almost neglected. This set of circumstances is ideal for the rise of criminal activity around the world.

In the overall situation we are in, we wonder where are the additional activities of the police during the pandemic? Until now, they have included enforcing curfews, as well as conducting state quarantine,compliance with the orders for self-isolation, supporting the staff from public health facilities in establishing contacts with an infected person, specific tasks and responsibilities of border police officers, and so on. It is more than clear that these additional activities carry an additional, but also a very large burden on the already stretched resources. (more…)

Cyber Espionage and its ImpactsCyber Espionage and its Impacts

Blagoja Janakievski

In the newest operational warfare domain, cyberspace, there are armies of nefarious hackers from around the globe who use cyber warfare for economic, political, or military gain. One aspect of cyber warfare that needs to be looked upon more closely is cyber espionage. Cyber spying is the act of engaging in an attack or series of attacks that let an unauthorized user or users view classified of sensitive material. These attacks are often subtle, amounting to nothing more than an unnoticed bit of code or process running in the background of a mainframe or personal workstation, and the target is usually a corporate or government entity. The goal is typically to acquire intellectual property or government secrets. Attacks can be motivated by greed or profit, and can be used in conjunction with a military operation or as an act of terrorism. Consequences can range from loss of competitive advantage to loss of materials, data, infrastructure, or loss of life. (more…)