SPECIFICITY OF USE OF ASYMMETRIC APPROACHES IN INFORMATION CONFRONTATION

Keywords: asymmetric approaches, asymmetric action, asymmetric warfare, information asymmetry, asymmetric influence, informational psychological operations, information weapons, manipulative information technologies

Abstract

The article deals with the actual issues of the use of asymmetric approaches in information confrontation. In the era of post-industrial society, the role of information wars in conflicts of varying degrees and origins is significantly enhanced. Information weapons allow the efficient use of limited financial, human and other resources to achieve victory or inflict the enemy “unacceptable losses”, which will offset all of its previous achievements. There is a transformation of the information confrontation from the element of the support of the fighting to a separate tool for solving the tasks of the tactical and strategic level. In turn, an asymmetric war becomes one of the dominant ones for confrontation at the local and global level. Meanwhile, in the long run, the preservation of the predominantly political nature of the conflict base is expected.

 Information asymmetry is an important element of hybrid wars, which plays a significant role in organizing the protection of the information space of any state. In modern conditions, asymmetric algorithms are actively used during information and psychological operations (IPSO). With a relatively small amount of information technology, IPSO has a reverse proportional impact on collective and individual consciousness. As a result, a radical change in the situation, even globally in the global context, is potentially possible.

 In this connection, the problem of creation and further application by the state bodies of Ukraine of new methods of information struggle of increased efficiency becomes a matter of great significance. Due to its powerful suggestive potential, high elasticity and versatility, information asymmetry is now becoming one of the most promising instruments of information confrontation.

References

1. Liddell Hart, B. (2017). Stratehiia nepriamykh deistvii [The Strategy of Indirect Action]. Moscow: AST. (508 p.) [in Russian].

2. Spencer, A. (2004). Questioning the Concept of New Terrorism. Journal of International Politik, 2, 1–11. www.bradford.ac.uk. Retrieved from https://www.bradford.ac.uk/social-sciences/peace-conflict-and-development/ issue-8/Questioning-the-Concept.pdf (viewed 30.01.2019) [in English].

3. Colwell, B. (2016). 4IR Geopolitics: Investing in Russias Asymmetrical Warfare. briandcolwell.com. Retrieved from https://briandcolwell.com/2016/08/4ir-geopolitics-investing-in-russias-asymmetrical-warfare/.html (viewed 30.01.2019) [in English].

4. Plant, J. T. (2008). Asymmetric Warfare: Slogan or Reality? www.obranaastrategie.cz. Retrieved from https://www. obranaastrategie.cz/en/current-issue-1-2008/articles/asymmetric-warfare-slogan-or-reality.html (viewed 03.02.2019) [in English].

5. Meigs, M. S. (2001). Operational Art in the New Century. ssi.armywarcollege.edu. Retrieved from https://ssi. armywarcollege.edu/pubs/parameters/articles/01spring/meigs.html (viewed 04.02.2019) [in English].

6. Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy vid 29 hrudnia 2016 roku «Pro Doktrynu informatsiinoi bezpeky Ukrainy»: Ukaz Prezydenta Ukrainy vid 25.02.2017 № 47/2017 [On the decision of the National Security and Defense Council of Ukraine dated December 29, 2016, «On the Doctrine of Information Security of Ukraine»: Decree of the President of Ukraine dated 25.01.2017 № 47/2017]. (2017). www.president.gov.ua. Retrieved from http://www.president.gov.ua/documents/472017-21374 (viewed 03.02.2019) [in Ukrainian].

7. Pro rishennia Rady natsionalnoi bezpeky i oborony Ukrainy vid 06 travnia 2015 roku «Pro Stratehiiu natsionalnoi bez peky Ukrainy»: Ukaz Prezydenta Ukrainy vid 26.05.2015 № 287/2015 [On the decision of the National Security and Defense Council of Ukraine dated May 06, 2015 «On the Strategy of National Security of Ukraine»: Decree of the President of Ukraine dated 05.26.2015 № 287/2015]. (2015). www.president.gov.ua. Retrieved from http://www. president.gov.ua/documents/472017-21374 (viewed 03.02.2019) [in Ukrainian].

8. Pocheptsov, H. (2006). Teoriia kommunikatsyi [The Theory of Communication]. Kyiv: Vakler. (656 p.) [in Russian].

9. Shediakov, V. (2010). Orhanizatsiia asymetrychnykh vplyviv informatsiinykh system [Organization of asymmetric influences of information systems]. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony – Modern Information Technologies in the Field of Security and Defense, 2, 72–78 [in Ukrainian].

10. Manoilo, A. V. (2003). Hosudarstvennaia informatsionnaia politika v osobykh usloviiakh [State Information Policy in Special Conditions]. Moscow: MIFII. (388 p.) [in Russian].

11. Szafranski, C. R. (1995). A Theory of Information Warfare. USAF. www.iwar.org.uk. Retrieved from http://www.iwar. org.uk/iwar/resources/airchronicles/szfran.html (viewed 03.02.2019) [in English].

12. O finansirovanii RPTs is biudzheta [On the financing of the ROC from the budget]. (2013). www.rbc.ru.

Retrieved from http://www.rbc.ru/rbcfreenews/20131118205003.shtml (viewed 08.02.2019) [in Russian].

13. Panaryn, Y. N. (2006). Informatsyonnaia voina i geopolitika [Information Warfare and Geopolitics]. Moscow: Pokolenie. (560 p.) [in Russian].
Published
2019-07-02
How to Cite
Aulina, O. (2019). SPECIFICITY OF USE OF ASYMMETRIC APPROACHES IN INFORMATION CONFRONTATION. Strategic Priorities, 49(1), 37-43. Retrieved from https://niss-priority.com/index.php/journal/article/view/236