01666nas a2200193 4500000000100000000000100001008004100002653002000043653001900063653001300082653002000095653002500115653002100140100002000161245007000181300001000251490000700261520120400268 2018 d10adecision making10ahybrid warfare10asecurity10asystem approach10aunrestricted warfare10aWarden’s rings1 aNebojsa Nikolic00aConnecting Conflict Concepts: Hybrid Warfare and Warden’s Rings a21-340 v413 a
This article explores connections among existing descriptive concepts of conflict. The focus is on connecting the “five rings” concept of John Warden and hybrid threats in a wider sense. The motivation is three-fold: firstly, to explore, compare and complement old and new concepts; secondly, to contribute to the systematization of numerous modes of security violation; and thirdly, to propose some basics for the creation of a tool for optimal choice of hybrid activities and countermeasures. Contemporary security violations are complex, not always visible, hard to detect, hard to be attributed and very different by nature and characteristics. Systemic analyses of indicated attempts of hybrid security violations through the prism of Warden’s rings contribute to better perception and recognition of the real purpose of hybrid attack and even indicate possible initiators. For the defender’s side, this approach is useful to analyse and recognize own vulnerabilities, which is a good starting point to prepare defences and countermeasures. For a hybrid attacker, this approach offers good tool for optimal choice of appropriate options from the spectrum of hybrid warfare tools.