strona tytulowa Front page - translation
Transcription
strona tytulowa Front page - translation
NATIONAL DEFENCE UNIVERSITY CIENTIFIC UARTERLY QUARTERLY no 4(89) WARSAW WARSAW 2012 SCIENTIFIC COMMITTEE Associate Professor Andrzej Glen, Ph.D. – chairman, Professor Stanisław Zajas, Ph.D. – deputy-chairman, Associate Professor Waldemar Kaczmarek, Ph.D. – Management and Command Faculty, Associate Professor Waldemar Kitler, Ph.D. – National Security Faculty, Dr James Corum – Baltic defence College, Col. Miroslaw Dimitrov, Associate Professor – National Defence Academy in Sofia, Lieutenant-General Professor Teodor Frunzeti, Ph.D. – National Defence University in Bucharest, Doc. Ing. Mariana Kuffova, Associate Professor – Armed Forces Academy in Slovakia, Professor Pavel Necas – Armed Forces Academy in Slovakia, Col. Dimitar Tashkov, Associate Professor, Ph.D. – National Defence Academy in Sofia, M.A. Adam Szynal Thematic editor: Assoc. Prof. Piotr Gawliczek, PhD The list of reviewers: Colonel Instructor Stan ANTON, Ph.D.; Commander Professor Vasile BUCINSCHI, Ph.D.; Assoc. Prof. Dipl. Eng. Pavel BUČKA, Ph.D.; Colonel Assoc. Prof. Gheorghe CALOPĂREANU, Ph.D. ; Colonel Miroslav Stefan DIMITROV, Assoc. Prof.; Colonel Instructor Pascu FURNICĂ, Ph.D.; Doc. Ing. Peter LIPTAK, Cs.C.; Colonel Assoc. Prof. Iulian MARTIN, Ph.D.; Colonel Professor Dimitar NEDYLKOV; Colonel Assoc. Prof. Constantin POPESCU, Ph.D.; Colonel Professor Ion ROCEANU, Ph.D.; Researcher Alexandra SARCINSCHI, Ph.D.; Assoc. Prof. Dipl. Eng. Peter SPILÝ, Ph.D.; Assoc. Prof. Andrzej Glen, Ph.D.; Prof. Waldemar KACZMAREK, Ph.D.; Assoc. Prof. Waldemar KITLER, Ph.D.; Col. Assoc. Prof. Dariusz KOZERAWSKI, Ph.D.; Prof. Stanisław KOZIEJ, Ph.D.; Assoc. Prof.Marian KOZUB, Ph.D.; Assoc. Prof.Zdzisław KURASIŃSKI, Ph.D.; Assoc. Prof. Józef MARCZAK, Ph.D.; Col. Assoc. Prof. Maciej MARSZAŁEK, Ph.D.; Col. Assoc. Prof. Wojciech NYSZK, Ph.D.; Maj.Gen. Assoc. Prof. Bogusław PACEK, Ph.D.; Prof. Jacek PAWŁOWSKI, Ph.D.; Prof. Piotr SIENKIEWICZ, Ph.D.; Assoc. Prof. Stanisław SIRKO, Ph.D.; Assoc. Prof. Zenon STACHOWIAK, Ph.D.; Assoc. Prof.Jeremiasz ŚLIPIEC, Ph.D.; Col. Prof. Jarosław WOŁEJSZO, Ph.D.; Col. Assoc. Prof. Marek WRZOSEK, Ph.D.; Prof. Stanisław ZAJAS, Ph.D.; Assoc. Prof. Janusz ZUZIAK, Ph.D. Editorial committee: Anna Doraczyńska, M.A. – chief editor (tel. 6/813-516), Jeremy Wysakowski-Walters, M.A. – editing of papers in English Address: 00-910 Warszawa 72 al. gen. Antoniego Chruściela 103, bl. 4 tel./fax: (6)813-516 e-mail: [email protected] The papers published in the „NDU Scientific Quarterly” are reviewed by experts. They express individual opinions of the authors; they are also verified by an anti-plagiarism system. National Defence University Typesetting, printing and binding: Publishing House of National Defence University, order no 1089/2012, edition of 100 copies TABLE OF CONTENTS Assoc. Prof. Robert KUPIECKI, Ph.D. What is the future of NATO? Lecture given at the inauguration of the academic year at the National Defence University, Warsaw, 28th September 2012 ..............................................................5 NATIONAL SECURITY Maj. Gen. Assoc. Prof. Bogusław PACEK, Ph.D. New missions of the European Union ................................................................................................12 Assoc. Prof. Andrzej GLEN, Ph.D. The Cognitive basis of air defence ......................................................................................................25 Col. Leszek ELAK, Ph.D. Reasons for contemporary conflicts – an outline of the problem ........................................................46 Lt. Col. Krzysztof DABIK, Ph.D. Security in social contract theories .....................................................................................................55 Lt. Col. Jarosław JABŁOŃSKI The building of knowledge capacity in the national security system ..................................................63 Andrzej ZAPAŁOWSKI, Ph.D. Challenges to the security of Poland related with the regionalization of Ukraine ...............................74 ART OF WAR Col. Tomasz RUBAJ, D.Sc. Fire support – an integral part of contemporary operations ................................................................90 Col. Waldemar SCHEFFS, D.Sc. The Automation of Electronic Equipment in Cyberspace and Electronic Warfare ...........................104 Jarosław SOLARZ, Ph.D. CBRN reconnaissance in the Polish Armed Forces ..........................................................................126 Emilia MIKOŁAJEWSKA, Ph.D. Maj (ret.) Dariusz MIKOŁAJEWSKI MSc From swarm intelligence to multiagent systems for mobile robot navigation ..................................137 ECONOMY OF SECURITY AND LOGISTICS Col. Assoc. Prof. Wojciech NYSZK , Ph.D. Optimization of logistic system in the polish armed forces ..............................................................151 3 Lt. Col. Sylwester T. KUREK, D.Sc. Prof. Janusz PŁACZEK, Ph.D. The essence of security economics as a scientific discipline ............................................................161 Lt. Col. Sławomir BYŁEŃ, Ph.D. The Optimization of Logistics Costs in Computer Assisted Command Post Exercises ....................175 Aleksandra KACZMAREK, PhD student Corporate Social Responsibility From The Perspective of The First Decade of 21st Century in Poland ....................................................................................................193 VOCATIONAL TRAINING AND PREPARATION Prof. Józef JANCZAK, Ph.D. Maj. Grzegorz PILARSKI, M.A. The Platform of Heterogenic Simulation Environment ....................................................................199 Justyna LIPIŃSKA, Ph.D. Public information of the polish armed forces ..................................................................................206 Elżbieta OLZACKA, M.A. A "Cultural turn" in the study and conduct of warfare - a new analytical perspective ......................217 Elżbieta POSŁUSZNA, Ph.D. Typological Aspects of Single Issue Terrorism ................................................................................232 Assoc. Prof. Ilona POLITOWICZ, Ph.D. Assoc. Prof. Piotr MAKOWSKI, Ph.D. Agata NIEDZIÓŁKA, M.A. Space marketing – innovative ideas produce creative technologies ..................................................242 Marcin KRUPA, M.A. A behavioral model determining the impact of USA military activity on the global number of wars ......................................................................................................................260 EXPERIENCE Anna MILER, Ph.D. Function and responsibilities of CIMIC in operations on Balkans ...................................................277 COMMENTS, REVIEWS AND REPORTS Aneta NOWAKOWSKA-KRYSTMAN, Ph.D. Bartosz Bolechów, Terrorism, actors, extras, viewers, PWN, Warszawa 2010, ss. 399 ..................295 4 WHAS IS THE FUTURE OF NATO? NDU Scientific Quarterly no 4(89) 2012 WHAT FUTURE IS THERE FOR NATO? Lecture given at the inauguration of the academic year at the National Defense Academy, Warsaw, 28th September 2012 Assoc. Prof. Robert KUPIECKI, Ph.D. Undersecretary of Defense Honorable Minister, Honorable Rector-Commandant, Honorable Guests, Ladies and Gentlemen, It is a great honor and pleasure for me to participate in the inauguration of the academic year here at the National Defense Academy. It is the largest and by far the most important Polish academic institution educating officers and civilian experts in various specializations associated with the military, defense and national security. Good education and practice are of great importance in building effective solutions in these fields. Speaking to the academic personnel and the administrative staff under the new leadership of the Rector-Commandant Maj. Gen. Boguslaw Pacek, as well as the course participants and Academy supporters, I would like to wish you all a successful academic year and that you continue with distinction your dedicated service to Poland, the Ministry of Defense and the Polish Armed Forces. In the Ministry we expect from the Academy “fresh” military and strategic thinking and I am speaking here also on behalf of my boss, the Minister of National Defense Mr. Tomasz Siemoniak. The NDA should lead in raising the competence of state institutions and promoting the knowledge pertaining to defense among our citizens. I wish the new recipients of academic degrees good luck in their scientific research. Ladies and Gentlemen, I think that the question regarding the future of the North Atlantic Treaty Organization has not been chosen by accident as the topic of the inaugural lecture. By referring to the future "in general" I mean an inquiry into the reasons for its existence in the contemporary world while the future "in particular" means in other words the importance of NATO to the Member States. 5 ROBERT KUPIECKI In the latter case we refer to the widely perceived mission of NATO composed of the classical function of collective defense and the new expeditionary tasks taken up by the Alliance following the end of the Cold War. A regular and sound reflection on the condition of NATO is needed. Testing the value and quality of the Atlantic Alliance is fundamental for the security of the Member States and the stability of their surroundings. This also concerns Poland which develops its defense plans and capabilities in harmony with NATO planning and operational requirements. Hence, the defence and security advantages offered by the Atlantic Alliance must be of interest to Poland in a natural and obvious way. Difficult questions asked in our country and by other Allies should be perceived as guidance in the process leading to a correct strategic diagnosis. Questions about the future of the North Atlantic Alliance have remained valid since its very inception in 1949. Many have shared the view that NATO did not have a chance to become a reality. In fact, on both sides of the Atlantic it embraced countries which differed in terms of the pressure felt from the Communist bloc, the military potential they had at their disppsal, political will, aspirations and public sensitivity to military matters. Frequent internal disputes and crises in the history of NATO for many have been vivid evidence that it cannot work. Former Secretary General of NATO PaulHenri Spaak was once asked if those disputes posed an existential threat to NATO. He then accurately remarked that for an alliance of free and democratic states disputes are a proof of its vitality and a confirmation of the fact that NATO is just doing its job. It is worth to continue with this line of reasoning also today. Not to underestimate or diminish the contemporary challenges facing the Atlantic Alliance but to remind us of its essence. It is a voluntary commitment of the Member States who jointly decide on what they have in common. This quick lesson of the Alliance’s real politik does not mean praise for relativization of mutual obligations but is a reminder that they function in the real world. It is defined by both the needs and opportunities, but also limitations. In order to overcome them the Atlantic Alliance has developed unprecedented instruments of consultation and military cooperation. The sum of all weaknesses in the real world never creates any strength. Still, the strength comes from overcoming weaknesses through smart cooperation, solidarity, pooling of military capabilities, forging political consensus and bold action, where necessary and when there is political will. In the case of NATO, by bringing the potential of Europe and America together this strength has neither a precedent in history nor a good alternative for the future. We want it to be credible but no matter how it is perceived, the very existence of NATO is a strategic asset for the Member States. It forces possible adversaries, who would contemplate a "provocation", to reconsider their options. 6 WHAS IS THE FUTURE OF NATO? They must take into account in their plans the fact that any possible conflict with a NATO country is not worthwhile, its price will be high and its scale cannot be maintained in the low-intensity rigors. Even if one asks whether the mechanism of mutual guarantees will actually work, we know that a prudent planner and a strategist must assume that this will happen and consequently abandon evil intensions. This mechanism has been working effectively for 63 years and therefore it is worth to work persistently to ensure that its credibility is preserved in the future. One researcher, immediately after the Cold War compared NATO to a prestigious theatre which had never given a performance. However, with the quality of art acquired through many rehearsals and mastering skills, nobody wanted to challenge its reputation. Using this “theatre” parallel, today we are enriched with the experience of a few allied "shows”. They have solved the Post-Cold War dilemmas included in the following questions: – will the Atlantic Alliance have a raison d'être without a clearly defined enemy? – will the Atlantic Alliance be able to adapt to an uncertain world of multidimensional threats emerging outside the North Atlantic area? – finally, will the ambitiously integrating Europe need guarantees and the military presence of the United States? In Bosnia-Herzegovina, in Kosovo and in Macedonia, in the airspace of Serbia, in Iraq, Afghanistan, Libya, in the Gulf of Aden and on the Mediterranean Sea NATO has proven not only its usefulness but also indispensability. NATO was the only international actor able to support its value – based declarations on the credible factor of military power. It has also opened new areas of cooperation, ranging out from combating terrorism, alleviating the effects of natural disasters to energy security. It has also started broad partnership cooperation with many countries in the world. NATO is not looking for the enemy and is not hostile to anyone. This also applies to Russia, with whom the Atlantic Alliance has been trying to develop strategic cooperation framework for almost two decades. So far, these efforts have been without a major breakthrough or understanding from the other side, but also not without a slow progress. If all this were to prove the weakness of NATO, one may wonder how else to define NATO’s power? Part of the problem of perception comes from the fact that in today's world of quick tabloid and television analysis, every argument and example can well support the reasoning of either disputing party. Let’s consider one of numerous examples – NATO operation in Libya. The operation has achieved its goals. It has actually shown the allied interdependence, the importance of US military potential and the directions in which the European 7 ROBERT KUPIECKI allies should develop their military capabilities. NATO operation in Libya has also accelerated decisions and demonstrated the need for a rational approach to the build – up of defense capabilities. The Alliance refers to this as "smart defense" and the European Union calls it "pooling and sharing". In every case it means "more cooperation" and "more solidarity". For the critics of NATO, the operation in Libya has become an ultimate proof of the fall of the Atlantic Alliance, the military collapse of its European part and the prominence of the US military role. One publicist has compared this situation to Snow White, whose skirt 27 dwarfs were tightly holding on to. We have heard such ominous visions before, for example, when some analysts put the NATO mission in Afghanistan in Hamletian categories of ‘to be or not to be’. To those who are unfamiliar with the subject I will highlight the role of the Polish member of the Madeline Albright Group in the course of work on the report preceding the Lisbon strategic concept. He restored the right proportions for this matter and adequate provisions on Afghanistan as a task and mission of the Atlantic Alliance, rather than its raison d'être. Many extreme voices are heard on the future of NATO. However, it is worth finding in them premises for constructive action as a collective effort and on the national level. If anyone should have doubts why in Poland we are carrying out our own ambitious plans of military modernization, supported both by the President and Prime Minister, he or she should remember that the essence of the alliance contained in article 5 of the Washington Treaty takes its roots in national actions as described in article 3 of this document. In short, these provisions mean that while expecting assistance from others, first you have to do everything you can to provide for your own defense. Therefore, in doing our job it is worth analyzing what our allies are doing in this matter. While thinking of the future of NATO, however, one should get rid of the demobilizing perspective of NATO decline and collapse, not for the sake of “official optimism” but the well perceived national and allied interest. Before this year's NATO summit in Chicago in May, the Foreign Policy magazine asked 57 prominent politicians from Atlantic Alliance countries, how they predicted its future. Their responses are very interesting. All respondents answered positively the questions whether NATO should continue to exist and whether the U.S. engagement in Europe should be maintained. But the question of what its main objectives should be, divided those politicians: 14 of them pointed at the collective defense, 2 at out-of-area missions, no one pointed at global military missions and guarding against Russia, 31 named the combination of many functions whereas the remaining pointed at other issues. On a lighter note, Sweden was recognized as the most desired new NATO member; greatest preference for the removal was expressed with regard of a 8 WHAS IS THE FUTURE OF NATO? southern country. There were also 9 other candidates for the expulsion from NATO - nobody indicated Poland which I perceive as a sign of our reliability. The results of this poll (and I only quote its small portion), in comparison with the results of the NATO Summit in Chicago strengthen the optimistic approach towards the future of NATO. In my opinion the challenges facing NATO point at two types of issues which the allies will have to deal with: – first, what type and scale of tasks will NATO be used for in the future? After all it isn't a universal remedy for all the problems of world; – second, what type of military capabilities should the Alliance have to remain credible in the anticipated missions and how to develop such desired capabilities? Ladies and Gentlemen, The Atlantic Alliance was created in order to defend its members. Its other functions, set by NATO Strategic Concept of 2010, such as crisis management and cooperation with partner states, are supposed to serve the implementation of NATO key mission. Allies vary in terms of the importance they attach to these functions. Some NATO countries situated far from the areas where traditional threats may originate from are mainly interested in stabilization operations, often far from their own borders. Others want to be reassured that NATO, while tackling the challenges within its borders, will be able to defend them. Therefore, the problem with finding the right balance for these tasks seems to be the most important today. It concerns not only the military efforts and political attention but also decisions on the use of limited resources. Even more, decisions regarding one type of mission sometimes affect the availability of resources for other types. Although this dilemma does not always appear in such a sharp contrast, it should not be neglected. The Allies have only one set of forces, one budget and different needs. Thus, they have to be addressed in such a way that the ensuing balance becomes a guarantee and a source of allied trust. This, in turn, should create political will to support current NATO missions. Poland effectively works to ensure that the Alliance has updated its operational plans which would enable it to strengthen our defense in case of a threat. NATO also needs capabilities enabling the conduct of high intensity and large scale operations. One should remember that this potential can also be used in stabilization missions well outside its area. We are also seeking funds for co-financing NATO’s military infrastructure essential for collective defense. The idea is that the states have the ability to receive assistance from other NATO members on their own territory. It can also be used to support expeditionary missions. 9 ROBERT KUPIECKI Finally, we want the requirements for collective defense to be included in allied training and the exercises policy. From this perspective the Summit in Chicago has met our expectations. It has confirmed collective defense as the main function of NATO. While making recommendations for further development of the defense capabilities the Summit also highlighted the initiatives and tasks which are most important for us, for example, the development of interoperability between the allied forces or regular exercises which also allow testing collective defense scenarios. As I have already pointed out, Poland makes every effort to develop its own capabilities in synergy with NATO solutions. Good examples here are our plans to strengthen air and missile defense as the Polish contribution to the NATO BMD program. It does not mean, of course, that we are reluctant to crisis management or the cooperation with partner countries. We have been actively involved in those activities since 1994 and we view them as related with the security of our country. Another issue is NATO military effectiveness. The economic crisis in Europe has caused reductions in defense budgets and a subsequent decrease in the allied military capabilities. It concerns the tasks related to both collective defense and expeditionary missions. Poland with its growing defense spending, including the modernization of the armed forces, is a positive exception in Europe. The key issue in preventing the effects of the reduction in defense spending will be multinational cooperation initiatives like Smart Defense. However, they cannot serve as a pretext for further cuts nor dilute commitments through complicated procedures which prevent or slow down the action. They will also have to facilitate the use of jointly acquired capabilities or lending them to other allies. The rational approach to multinational defense building is an art not a science. Solutions in this regard must meet the priority needs of Member States; whereas NATO and the EU should cooperate closely. Preservation of the transatlantic ties is no less important both politically and militarily. The increasing involvement of the United States outside Europe creates the temptation to weaken these ties. Therefore fewer U.S. troops in Europe must mean more effective efforts to achieve the interoperability of forces, including exercises and training as well as greater regional impact stemming from their presence. The development of the military capabilities of the European states is the other side of this process. Although it is difficult in current budgetary realities it is necessary for raising the profile of the European Union on the international arena and maintaining the political and military ties with the US. The outgoing US Secretary of Defense, Robert Gates made reference to this in his farewell address. The truth of his words has been confirmed by NATO operational activities. 10 WHAS IS THE FUTURE OF NATO? In the world of contemporary challenges I am confident about the future of NATO. And it depends on the Member States, their ability to combine and wisely manage their resources, to find partners supporting the Allied missions, prudence in strategy making and perhaps also a reduction of global ambitions. In 2014, NATO will change its tasks in Afghanistan and significantly reduce the number of its troops in this country. So perhaps it is unrealistic to expect that we will be able to do more with less, not only in Afghanistan. To be realistic is an important call for allied strategy. However, reduced global ambitions do not necessarily mean less global importance for NATO, especially in its usefulness for the Member States. Today's NATO is not "an alliance from the days of our fathers" as the Americans like to say meaning that it used to be better. However, it is able to make its members safe, protect their development, save the lives of innocent people threatened by the bloody tyrants, and encourage more partners. There is no alternative to NATO now or in the foreseeable future; an alternative which will be able to provide military capabilities for difficult operations. Let us not forget that it is still attractive for countries striving to join the Atlantic Alliance. The enlargement process has not been completed yet. When thinking about the future of NATO one should keep all these issues in mind. Thank you for your attention. 11 BOGUSŁAW PACEK NDU Scientific Quarterly no 4(89) 2012 NATIONAL SECURITY NEW MISSIONS OF THE EUROPEAN UNION Maj. Gen. Assoc. Prof. Bogusław PACEK, Ph.D. Rector-Commandant, NDU Warsaw Abstract The article deals with the new military missions under the European Union flag, as part of the Common Security and Defence Policy. This paper covers three missions. The first one being in South Sudan which aims to strengthen the security of the Juba International Airport. The second one is in the Horn of Africa, focusing on the regional maritime capabilities building. The third one is in the geographic region of Sahel, focusing on the training of the security forces of the Republic of Niger. The planning and financial aspects of these missions are described and the mission is stated as having strategic goals in line with the assumptions of the European Security Strategy, namely – the protection of the European continent against destabilising factors. Key words – European Union, security, civilian missions, crisis management Introduction Between the years 2009 and 2011 the Common Security and Defence Policy (CSDP) was passing through a difficult period. There were no new missions deployed, defence budget was reduced, there were advanced considerations to terminate some of the functioning missions and operations. There was a lack of concrete visions for further CSDP development. Reasons for this impasse were undoubtedly enhanced by the budget crisis of the Euro zone, which brought about a bigger interest of the European Union (EU) member states’ politicians in financial issues rather than defence. On the 1 January 2012, the first anniversary of the EU diplomatic service, formally known as the European External Action Service (EEAS), was celebrated. It assembles all planning and executive tools of the Union’s civilian missions and 12 NEW MISSIONS OF THE EUROPEAN UNION military operations1. However, the Secretary General of the EEAS stated that the creation of a fully operational diplomatic body is an effort involving a minimum of 10 years intensive work for all departments and their personnel. Despite the presented difficulties, the EU managed to commence three new missions in the framework of the CSDP. All three were deployed to the African continent, in the areas of the Horn of Africa, Sahel and South Sudan. All of them are still in their initial phases, nevertheless apart from constraints stemming from politico-strategic conditions, their planning was considerably influenced by budgetary aspects. These three new engagements were purposely considered as civilian missions and not military operations even though after some modifications the encountered conditions would enable them the use of military tools. The reason for this is that civilian missions are normally financed from the Union’s budget, while military operations are financed through the Athena2 mechanism, a common pot into which member states are obliged to make financial contributions proportionate to their Gross National Product. During a period of financial crisis this proposal is seen as unpopular and cannot be accepted by some of the member states. During extensive consultations conducted while preparing the missions, EU member states' ambassadors and other representatives clearly pointed out that the austerity measures are to be respected. Negative comments for the above indicated that this type of planning does not have a lot in common with crisis management, which should be first of all characterised by a fast decision-making process and not the arranging of challenges in a way that would bring the biggest possible financial savings. The afore mentioned aspects, dealing with the creation of the optimised diplomatic tool, are the reasons to present in this article the key findings related to the main factors as far as the new missions of the European Union are concerned. The assumption has been to find the answer to the general problem of how and why the European Union should develop its capabilities to execute civilian missions. The problem formulated in this way could be solved by defining the demanded planning and executive tools, which are at at the disposal of the European Union. The research activities have been undertaken, describing the following working hypothesis: the development of the totally functioning diplomatic tool, mainly through the integration of the various expert capabilities (diplomatic, political, military, technological and others) permits the setting up of effective 1 EEAS Implementation Report. European External Action Service. Brussels 2012. p. 3. Athena – European Union mechanism of administering finances which are used for covering common costs of EU military crisis management operations. Costs covered through the Athena can be in the areas of transportation, infrastructure, medical support and the so-called national expenses (NBC – National Borne Costs) for accommodation, fuel, etc. (European Union Military Staff Glossary of Acronyms and Definitions. Council of the European Union. Brussels 2007. p. 36) 2 13 BOGUSŁAW PACEK coordination mechanisms and rules for the decision making process among the EU member states. In the described crisis realities of the EU, civilian missions are the most desired solutions in the area of crisis management. The EU conducts civilian missions in the scope of policing, border policing, customs, rule of law, administration, civil protection, monitoring missions, security sector reform (SSR) and the supporting of disarmament, demobilisation and reintegration (DDR)3. A comprehensive approach to any crisis situation is another requirement sought in the EU. In this aspect it is less important to plan jointly the civilian and military dimensions of a given engagement in one theatre of operations. The most essential problem appears in the field of integrating other EU instruments into a crisis response. These instruments belong mainly to the European Commission (EC), namely the Directorate-General for Development and Cooperation (DEVCO), whose representatives participate in the planning of each crisis management mission and operation. The Treaty of Lisbon4 in Article 28 A extorts that all available tools are to be used for dealing with crises. In the case of the CSDP these tools are mainly used for (i) complementing missions’ efforts during their duration and (ii) as part of their exit strategies aiming at ensuring the continuation of a missions’ achievements once they are terminated. However, because of lengthy EC financial planning process, benefiting from these tools is often heavily constrained. Mission No 1. South Sudan – strengthening security of the Juba International Airport (JIA) – mission EUAVSEC South Sudan (EU Aviation Security South Sudan) On the 1 January 1956 Sudan announced independence from the United Kingdom and Egypt. The Sudanese territory consisted of the islamic North, of Arabic origin, and the catholic South, inhabited by black African people who immediately started their effort to gain independence through the creation of a separate state. Without the Southern Sudanese having possibilities to gain independence by peaceful means, a war broke out in 1983 along a temporarily agreed borderline of both regions, which was regarded as one of the bloodiest conflicts in the world. As a result approximately 2 million people were killed and another 4 million were declared refugees. Fighting ended in 2005 with the signature of a Comprehensive Peace Agreement between the North and the South. This agreement granted autonomy to the southern provinces of Sudan. In January 2011 a referendum in the 3 Ibidem p. 46. Treaty of Lisbon amending the Treaty on European Union and the Treaty establishing the European Community. European Union. Brussels 2007. p. 45. 4 14 NEW MISSIONS OF THE EUROPEAN UNION South took place. Almost 99 percent of the voters voted for separation from the North, with the aim of creating a separate country. On the 9 July 2011 the South claimed independence. A new state was created: South Sudan. Its independence was recognised by the main international organisations and the majority of the world's countries. Unfortunately, in spite of having vast oilfields and other minerals, the country of South Sudan is one of the poorest and least developed states in the world. The EU is deeply engaged in delivering support to South Sudan. Together with EU member states active individually in South Sudan, in particular Germany, the United Kingdom and Norway, the EU is the biggest financial aid donor. In May 2011 the European Development Fund (EDF) released an additional 200 million Euros allocated proportionally to the needs to different areas. In accordance with the EU Comprehensive Approach to Sudan and South Sudan,5 EU efforts are focusing on 1) Health, 2) Education, 3) Food security and Rural development, 4) Rule of Law; this is in line with the Government of South Sudan (GOSS) priorities for assistance. In addition, the EU and its Member States are providing technical and financial support for peaceful co-existence through the Early Warning System of the African Peace Facility and the Instrument for Stability, which funds conflict prevention and peace-building efforts with a focus on the border areas and basic social services. In the frame of point 4), the Council of the European Union invited the European Union External Action Service to develop CSDP options for potential support to the state of South Sudan which would be complementary to other efforts. An inter-institutional European Union specialist team, during its visit to South Sudan at the beginning of 2011, identified the following areas6, in which the Union could be involved in the frame of Common Security and Defence Policy: (i) capacity building of the South Sudanese Police Service SSPS in the field of investigations, (ii) creation and training of South Sudanese border police and (iii) enhancing the security of the Juba International Airport (Juba – the capital of the Republic of South Sudan). After long and extensive discussions among the European Union member states which were held in working groups and Committee, it was decided that the option (iii) with regard to the security at the Juba airport will be further developed. As a newly independent country, the GOSS was facing a series of significant challenges to the establishment of a fully functional and compliant transport hub for commercial and passenger purposes. The Juba airport was not designed to be a major departure and arrival point, rather it was set up as a regional, small-scale airport capable of dealing with domestic air traffic. The terminal was very small and struggled to cope with an ever-increasing passenger load. 5 EU Comprehensive Approach to Sudan and South Sudan. Council of the European Union. Brussels 2011. p. 4. 6 CSDP options paper for South Sudan. Council of the European Union. Brussels 2011. p. 2. 15 BOGUSŁAW PACEK Nearly all international air traffic is received at this airport. The poor condition of the infrastructure, limited existing security arrangements and a lack of basic equipment drastically impaired the flow of passengers and goods. Moreover the airport stood as an open door to terrorism that could target the South Sudanese and the numerous internationals present in country, while on the other hand connecting with airports in major international African traffic hubs. The security arrangements in place fell short of international standards. The work of security and police services showed not only a lack of coordination but also an obvious lack of individual skills. Taking the above into consideration the airport is likely to act as a magnet to unscrupulous persons seeking easy access to international flights, including criminals and terrorists trying to identify the weakest link in any regional airport network. The European Union engagement in enhancing the security of the Juba International Airport is taking place upon the request and agreement of the government of South Sudan. The Union’s commitment is to train and raise the quality of security service activities to a level fulfilling requirements of the International Civi Aviation Organization (ICAO)7. The civilian mission, EUAVSEC South Sudan, is a good example of an integrated approach to a crisis. Except for the CSDP mission’s effort, the financial instruments of the European Commission are used for budgeting of the airport's equipment. Moreover, cooperation with other partners during the planning phase of the mission brought about complementarities with the United Nations International Organization for Migration (IOM) which is training the airport personnel in immigration procedures and with the Japanese International Cooperation Agency (JICA), which is conducting training of customs procedures. In the mission there are approximately 50 personnel with a mixture of expertise including police, border police and installations security. Personnel are unarmed, do not have executive powers and cannot substitute the autonomous airport security. They are performing tasks of training, monitoring, mentoring, advising as well as the coordination of security services and activities of the airport. The mission’s initial mandate has been set up for 12 months since the date of the achievement of the Initial Operational Capability (IOC). In the future it is possible that the European Union’s Common Security and Defence Policy engagement in South Sudan will be farther enhanced. The Political and Security Committee obliged the European External Action Service to consider other strategic options within the framework of a strategic review for the EUAVSEC South Sudan. 7 Crisis Management Concept – CSDP mission in South Sudan). European External Action Service. Brussels 2011. p. 5. 16 NEW MISSIONS OF THE EUROPEAN UNION Mission No 2. Horn of Africa – Regional Maritime Capabilities Building (RMCB) – mission EUCAP Nestor The sea route through the Suez Canal, the Red Sea and the Gulf of Aden possesses the biggest strategic importance of all sea routes in the world. Within the space of a year thousands of transport vessels go through it. Costs of cargo transported through it each year surpass billions of dollars. This route is also used for the transportation of various types of dangerous cargo such as military equipment, weapons and ammunition, which in the case of them falling into the wrong hands could be threatening to the whole region. Starting from 2005, piracy began to flourish on these waters. As a result of huge ransoms paid by sea companies for the release of the hijacked vessels and their crews, the assets of pirates got considerably higher with some part of the funds being devoted to buying better ships and weapons, something that made the efficiency of piracy grow even further. The piracy was practiced by, among others, local fishermen who developed a standard action plan, starting from the observation of a potential victim vessel, for which usually a slowly moving target was chosen, without security ships or helicopters. The attacks used to take place in the narrow Gulf of Aden, where transport vessels had to slow down and pirates could potentially attack from all directions. Victims of Somalian pirates were often vessels of the World Food Programme (WFP), which paradoxically transported food for Somalia. The piracy itself was caused by crisis and extreme poverty in this country. International organisations clearly indicated that without proper actions in-land, inside the country, prevention against piracy on the sea would not bring the required effects. In the efforts of fighting piracy are engaged, among others, the Combined Maritime Forces (CMF) and the European Union’s EUNAVFOR Atalanta operation. With the aim of protecting their own vessels, many states possess in the Horn of Africa war ships, including global leaders such as China, India, Japan and Russia. The „maritime capabilities” should be understood as capabilities for an effective management of the overall marine domain. They are an indispensable condition for performing basic state functions in the area of marine planning and conduct, search and rescue operations and customs duties. Critical aspects of maritime capabilities are the law enforcement and the rule of law. Structurally, the maritime capabilities consist of four pillars: law, training, equipment and information. Their effective co-functioning will ensure that the states of the Horn of Africa will be in possession of an efficient tool for fighting piracy. 17 BOGUSŁAW PACEK Law: – Suitable national laws of respective states, – Agreements for detainees’ hand-over, – Criminal intelligence and investigation capacities, – Courts, – Prisons. – Navy, – Police, – Border guard, (RMCB) Regional Maritime Capacity Building Training: – Support personnel. Equipment: – Patrol boats, – Communication, – Maintenance, – Supply system. Information: – Gathering of information, – Transformation of information, – Exchange of information, – Creation of a common operational picture. Source: drawn by the author. Picture 1. Pillars of the maritime capabilities) The naval operation of the European Union: EUNAVFOR Atalanta started in 2008. In accordance with the United Nations Security Council Resolution No. 1846, Atalanta performs tasks of, among others, ensuring security to WFP vessels, merchant vessels, and fishing companies; it fulfils tasks of deterrence, prevention and intervention, aiming at ending piracy acts in the operation’s area of responsibility and also detaining and transferring to other respective services and authorities individuals suspected of participation in piracy activities. 18 NEW MISSIONS OF THE EUROPEAN UNION The strategic End State of this operation is a continued reduction, and potentially a thorough elimination, of piracy on the waters of the Horn of Africa. It is obvious that this objective will not be received only as a result of activities on sea. This is why the European Union, being one of the leading international organisations in the region, deployed a new mission of maritime capabilities building EUCAP Nestor, whose main objective would be to contribute to the continued reduction of piracy, something that creates conditions for the achieving of EUNAVFOR Atalanta’s End State. EUCAP Nestor is a European Union civilian mission conducted in the frame of the Common Security and Defence Policy, with the participation of military experts, including naval ones. It creates synergy effects not only with Atalanta, but also with the EU Training Mission Somalia (EUTM), whose main objective is to contribute to the development of the Somalian security sector through broadened officer and soldier training and formation. EU NAVFOR Atalanta EUTM Somalia EU Strategic Framework for the Horn of Africa EU NAVFOR Atalanta EUTM Somalia EUCAP Nestor Source: drawn by the author. Picture 2. Integrated EU Approach against piracy in the Horn of Africa Planning for the EUCAP Nestor mission started in 2010, however discrepancies among the European Union’s Member States regarding its possible character, blocked the decision-making processes. Initially it was considered as another military operation, nevertheless because of the previously presented financial aspects, the EU decided to deploy a civilian mission. The EUCAP Nestor is a part of a broader EU Strategic Framework for the Horn of Africa (Picture 2). An initial mandate for this mission was predicted to last 24 months. During the mid-mandate a strategic review was foreseen. Basing on this review, decisions will be made for the termination or an extension of the mission. It is predicted that the piracy in the Horn of Africa will be eliminated when three factors will be coexisting8: • Stabilization of the situation in Somalia. • Acts of piracy will be properly punished. • Regional maritime capabilities will be enhanced. The European Union is making efforts to implement all these factors. The EUCAP Nestor mission is complex and ambitious. To approach the problem of building the regional maritime capabilities in an integrated manner, it 8 Crisis Management Concept for Regional Maritime Capabilities Building in the Horn of Africa. European External Action Service. Brussels 2011. p. 8. 19 BOGUSŁAW PACEK was planned that the mission will be operational in eight states of the region: Djibouti, Kenya, Yemen, Mauritius, Mozambique, Seychelles, Somalia and Tanzania. To properly coordinate actions with other organisations, the European Union signed strategic partnerships with, among others, the African Union (AU), the International Maritime Organisation (IMO), the United Nations Office on Drugs and Crime (UNODC) and with the United Nations Development Programme (UNDP). The European Union’s political objective is to considerably contribute to international efforts aiming at the elimination of piracy in the Horn of Africa and such reinforcement of the maritime capabilities of the region’s states which would allow them to control their own territorial waters and economic areas and in a farther perspective to take over full responsibility for security issues. Political efforts of the European Union will not only be limited to the organisation of Common Security and Defence Policy missions but will be more complex. The Union’s financial instruments also participate in this project; among others the European Development Fund (EDF) and the Instrument for Stability (IfS). All proposed actions are carefully coordinated to prevent a duplication of efforts. It was decided that the EUCAP Nestor would have the following tasks9: 1. Training of functionaries of border guard, police, and support services and selected navy officers in suitable expertise areas; indispensable for an efficient fight against piracy. 2. Expert mentoring in the fields of law, criminal intelligence, investigations, court and prison functions and maritime operational issues. 3. Coordination of the delivery and distribution of specialist equipment. There are two ways of providing training: − Using the Regional Training Centre in Djibouti (DRTC), established basing on the Djibouti Code of Conduct, promoting the fight against piracy in the Horn of Africa. The DRTC is financed by the European Union and Japan. − Using the Maritime Training and Support Teams (MTSTs), possessing mobility capabilities to redeploy and conduct trainings in all states of the region. Each of the states of the Horn of Africa in which the EUCAP Nestor is operational, is in a different strategic situation. Therefore to each of them a different individual approach has been used. These states differ as to law systems in force, security forces’ structures or the level of training and equipping of respective formations. 9 Crisis Management Concept for Regional Maritime Capabilities Building in the Horn of Africa. European External Action Service. Brussels 2011. p. 11. 20 NEW MISSIONS OF THE EUROPEAN UNION Mission No 3. Sahel – training of security forces of the Republic of Niger – mission EUCAP Sahel Niger The Sahel is a geographical region in Africa, bordering with the Sahara southern regions, extending from Senegal, Mauritania, Mali, Niger, Chad, Sudan and Eritrea to Ethiopia. Its western part, except for the Niger Delta, and some mountainous areas, are a sterile desert. On these fields there are several ethnically diversified desert tribes with the most numerous being Tuaregs, aiming at establishing their own independent country – Azawad. The Sahel is one of the poorest regions of the world. It faces simultaneously the challenges of extreme poverty, the effects of climate change, frequent food crises, rapid population growth, fragile governance, unresolved internal tensions, the risk of Islamist radicalisation, illicit trafficking and terrorist-linked security threats. The situation has also deteriorated due to the outcomes of the Libyan crisis. As a result, numerous groups of fighters and bandits, but also considerable amounts of military equipment, weapons and ammunition have migrated from Libya to the Sahelian states10. The states of the region have to face these challenges directly. The three core Sahelian states are Mauritania, Mali and Niger. Some of the challenges posed impact on neighbouring countries, including Algeria, Morocco and Nigeria. Their engagement is necessary to help resolve them; and the problems facing the Sahel not only affect the local populations but increasingly impact directly on the interests of European citizens. Northern regions of the Republic of Mali, in which lawlessness reigns without the presence of any governmental security forces, became a safe haven to the Al-Qaida Maghreb Islamique (AQMI) (Picture 3). Current AQMI’s activities are not only common criminal activities but also murders of white European and American citizens, something that is efficiently blocking all Western investment in the region. Forces, resources and operational capabilities of the Al-Qaida in the Republic of Mali are growing much faster than those of governmental security services. Additionally, deteriorating security conditions make it difficult for humanitarian aid to be delivered. The situation has also been worsened by the coup d’état on 21 March 2012 in Mali’s capital city – Bamako. It was conducted by representatives of the Malian army as a protest against the government which used to send soldiers to fight the better trained and equipped Tuaregs in the north of Mali. As s result, plenty of Malian soldiers were killed during these fights. 10 Crisis Management Concept for a CSDP mission in the Sahel. European External Action Service. Brussels 2011. p. 3. 21 BOGUSŁAW PACEK Zone under control Zone of direct activities Region of Sahel Source: European Union Strategy for Security and Development in the Sahel. European External Action Service. Brussels 2011. Picture 3. Activities of Al-Qaida in the states of Sahel In the presented situation, the Republic of Niger is one of the last strongholds of stability in the region. Niger’s politicians show clear willingness to resolve existing problems, in particular to prevent their spilling over into other states of the region. The government of the Republic of Niger, as the only one of the three mentioned Sahelian states (Mali, Mauritania, Niger) into which the European Union Common Security and Defence Policy mission could be deployed, expressed a strong will to welcome this mission on their territory. The European Union (EU) has a longstanding interest in reducing insecurity and improving development in the Sahel region. The EU’s political objective is to enhance stability, security, good governance and social cohesion in the Sahel, and especially Niger, and help establish the conditions for local and national sustainable development. 22 NEW MISSIONS OF THE EUROPEAN UNION The EU strategic objective has been defined so as to contribute to improving the capacity of Nigerien Security Forces to fight terrorism and organised crime in an effective, coherent and coordinated manner and to support and advise on the implementation of their own strategies for security and development. To achieve these objectives, the EU has deployed a civilian CSDP Advisory, Assistance and Training mission to Niger – EUCAP Sahel Niger – to contribute to strengthening the capacities of Niger to fight terrorism and respond to urgent needs in organised crime, in order to improve the control of their territory, allowing for the execution of development-related projects and facilitating development. In the Republic of Niger there are three types of security forces: Gendarmerie, National Police and National Guard. Their operational skills are not satisfactory. It is on these three service that the EUCAP is focusing. The mission consists of approximately 40 personnel with a mixture of expertise, with the majority of police officers specialising in law enforcement, public order, criminal intelligence, investigations, forensic techniques, combating terrorism and organised crime. The personnel are unarmed, do not have executive powers and cannot substitute the autonomous security forces. The EU force is performing tasks of training, monitoring, mentoring, advising and coordination of the three Nigerien security forces. The mission’s initial mandate has been set up for 24 months. During the mid-mandate a strategic review will be conducted basing on which recommendations will be made to the Political and Security Committee regarding the future of the mission. It is probable that the mission will be extended territorially to Mali and Mauritania, to make combating of organised crime and terrorism more effective. Similarly to EUCAP Nestor and the EUAVSEC South Sudan, EUCAP Sahel Niger is an integrated part of a complex international effort, to aid the states of the Sahel to regain stability and security. Among the international organisations present in Niger, the United Nations, the African Union and the ECOWAS11 should be listed, while among states – Canada, France and the USA are actively supporting the training and equipping of military and civilian forces of the Sahelian countries. Conclusion The presented progress in deploying new crisis management Common Security and Defence Policy missions eludes to an optimistic trait regarding CSDP’s future, which was until recently unclear. The political and strategic objectives of the three 11 ECOWAS – Economic Community of West African States. Regional group of 15 Western Africa states; established in 1975. Its goal is to promote economic integration in the fields of industry, transport, telecommunication, natural resources, finance and socio-cultural issues. (Source: www.ecowas.int) 23 BOGUSŁAW PACEK new missions remain in line with the European Security Strategy, whose main goal is to define activities helping to defend Europe from destabilising factors, but first of all from acts of terrorism, organised crime and regional conflicts. It is possible to assess, as a result of the research efforts, that the goal has been achieved, and the working hypothesis has been verified positively. The building of security in the closest vicinity of Europe is of special importance for Europe, that is why the European Union has a longstanding interest in political stability in Africa. Apart from the three described missions, there is also the issue of Libya remaining unresolved as to the scope of potential EU engagement, with the works currently ongoing. Bibliography Crisis Management Concept for Regional Maritime Capabilities Building in the Horn of Africa. European External Action Service. Brussels 2011. Crisis Management Concept for a CSDP mission in the Sahel. European External Action Service. Brussels 2011. Crisis Management Concept – CSDP mission in South Sudan. European External Action Service. Brussels 2011. European Union Comprehensive Approach to Sudan and South Sudan. Council of the European Union. Brussels 2011. European Union Military Staff Glossary of Acronyms and Definitions. Council of the European Union. Brussels 2007. Rapport de démarrage de l’Instrument de stabilité pour contre-terrorisme Sahel. CIVIPOL. Brussels 2012. EEAS Implementation Report. European External Action Service. Brussels 2012. European Union Strategy for Security and Development in the Sahel. European External Action Service. Brussels 2011. Treaty of Lisbon amending the Treaty on European Union and the Treaty establishing the European Community. European Union. Brussels 2007. CSDP options paper for South Sudan. European External Action Service. Brussels 2011. 24 THE COGNITIVE BASIS O FAIR DEFENCE NDU Scientific Quarterly no 4(89) 2012 THE COGNITIVE BASIS OF AIR DEFENCE Assoc. Prof. Andrzej GLEN, Ph.D. National Defence University Abstract The article includes a description of the axiological, ontological and epistemological basis of the phenomena of air defence (AD). It characterises the value system of AD, and explains how AD exists in the physical and conceptual reality. AD is defined in a broad sense as part of the air security of the state and in a narrow sense as part of the armed struggle. It specifies the mode of understanding of the whole complex system of AD, as well as the mission, domain and goal of AD. The essence of AD is explained with regard to its subject, object, the type of actions and the nature of an air attack. Key words – air defence, value, existence, mission, domain Introduction In the last century, airspace became one of the spheres of the Earth's environment most intensively used by humans. Thanks to the scientific and technological revolution of the twentieth century possibilities became a reality. The product of this revolution was the airplane at the beginning of that century. The dynamics of aviation development resulted in the fact that after over one hundred years from the flight in 1903 of the first Flyer 1 airplane of the Wright brothers, aircraft driven by piston and jet engines are omnipresent in human life. The aforementioned omnipresence includes unfortunately also creating numerous threats both of a nonmilitary and military nature. It is hard nowadays to imagine any armed conflict in the world without the involvement of aircrafts, helicopters, and unmanned aerial vehicles. However, it is easy to notice the significant dynamics of the growth and robotization of airspace exploitation for the purposes of battle. Also, the peaceful exploitation of airspace is characterised by the high dynamics of growth combined with a tendency to extend the scope of use to aerospace. While exploiting the airspace so intensely, mankind wants to do it both in the military and non-military sphere, with the assurance of one of his existential needs, 25 ANDRZEJ GLEN i.e. security needs. Currently, security is being understood in a narrow scope, in the sense of an absence of threats, and in the broad sense as a certainty of existence, survival, maintenance of identity and development in terms of threats. However, the state’s existence, survival, maintenance of identity and development in terms of air threats is regarded as its security. In a systemic presentation, the air security of the state can be considered as being isolated from the state’s security system in terms of a collective accumulation of airspace purposely in terms of the secure and effective, as well as economical and ecological, use of airspace, prepared staff, constructed devices and developed principles, methods, modes, and procedures along with relations of matter, energy and information exchanges that connect those resources, arranged to ensure the existence, survival, identity and development of the country in an air threat environment1. Within the concepts of a state’s air security it is easy to notice a set of values, such as: efficacy, sense of threat absence, ecology, economy, and the direct operation of state security systems in the military and non-military aspects. Air defence (AD), both in time of war and peace, as well as crisis, is today an inherent part of the security system of each country. Currently, the perception of the function of air defence in the world is changing. More and more often it is treated not as a part of the battle, but much more broadly as part of the security system of the state, region, or alliance. The system of integrated and extended AD NATINEADS (NATO Integrated Extended Air Defence System) already functions during peacetime, protecting the integrity of the alliance’s airspace. At present, AD is rather oriented to perform new tasks, which to this point have been unusual for it. Nowadays, already during peacetime, fighters are in full readiness to combat threats of a RENEGADE type. Whereas, the ground-based systems of AD are used to combat missiles and mortar bombs attacking NATO military contingent bases, which perform their tasks far beyond the borders of the alliance, and also to combat various types of manned and unmanned aircraft used for terrorist and criminal purposes. Meanwhile, the theory of air defence remained in the phase of interpreting of this phenomenon, especially as part of the battle. In the research literature on the subject (both domestic and foreign) one comes across only a few, contributive entries indicating the need for an extension and redefinition of AD. Therefore, the classic situation (as regards the formulation of scientific problems) of ignorance arose from a discrepancy between the state of theory and practice. AD theory was delineated probably during the development period of AD, where the existing principles and methods of AD can be further used to solve problems of fighting with traditional, classic air threats, and at the same time it is necessary to take an attempt to develop AD theory in order to make it more adequate to the new, asymmetrical, military and non-military air challenges and threats. 1 26 A. Glen, System bezpieczeństwa powietrznego państwa, NDU Scientific Quarterly, AON, 4/2008. THE COGNITIVE BASIS O FAIR DEFENCE The specified prerequisites of AD theory extension resulted in that the following article includes the most important content of the research description on the cognitive basis of AD, in which it was assumed to obtain an answer to the general problem question: What cognitive basis should direct the development of AD theory(and how it is to be formulated)? The problem formulated this way can be solved by specifying the ontological, axiological and epistemological basis of AD theory, which was taken as the purpose of the research. The accomplishment of the purpose of research and solving a general problem, in turn, required their structuralisation. It was recognised that such structuring is possible by dividing the problem into the following three detailed problems: how does AD exist in the real and conceptual spheres?, what system of values underlies the organisation of AD?, how to understand both AD alone and its basic categories? The study was operationalised by formulating the following working hypothesis: most probably AD exists both in the real and conceptual sphere, as the collective ontic object consisting of items and interactions which join them together. The value system is likely to be arranged in AD for the balanced accomplishment of two autotelic values – efficacy and security. Finally, with a high probability, contemporary AD ought to be understood in a broader sense than has been done so far, and its extension should result from changes in the environment that currently surround AD . Such structured research methodology required axiological, ontological and epistemological settlement of AD theory. The axiology relations with ontology and the epistemology underlining it have been explained by L.J. Krzyżanowski2. The author reminds us that conducting analysis, and drawing conclusions in the fields of ontology and epistemology would not be possible without continuing valuation; that is accepting and rejecting hypotheses, classification, hierarchy of concepts and categories. Following the advice of L.J. Krzyżanowski, the extension and arrangement of AD theory was preceded by the identification of the value system3. The arrangement and selection of cognitive actions during the implementation of the aforementioned research activities, was based on specific methodological guidelines, which include the following definition: The values, to the materialisation of which an entity aspires, influence the behaviour, including human actions, directly and through the attitudes and motives, and constitute criteria for the selection of both individual goals and internalized collective common goals4. 2 See L.J. Krzyżanowski, Podstawy nauki zarządzania, PWN, Warszawa 1985; tenże O podstawach kierowania organizacjami inaczej, PWN, Warszawa 1999. 3 According to L. Krzyżanowski, a value is accepted as [...] the product of feelings, convictions or beliefs of some entity: individual, social group, local community, national and other cultural community or global society of what, in the natural and psycho-social and cultural reality is positively evaluated and deemed to be worthy of craving and aspirations. L. Krzyżanowski O podstawach kierowania....wyd. cyt., p. 205. 4 Ibidem, p. 206. 27 ANDRZEJ GLEN Axiological basis Identifying the values of AD, giving them a significance hierarchy and specifying interrelations between different types of values5, should allow for the consideration of the axiological impact on the developed system of AD knowledge. The first declared conceptualised measure in AD is the arrangement and extension of the value system acknowledged by the AD system staff. To the question of what is a positively assessed subject of ultimate goals in AD, we often intuitively answer, that it is effectiveness. Meanwhile, the analysis of AD history allows us to collect enough facts to be able to formulate on their basis the opinion that frequently in history efficacy and security played interchangeably the role of a final (autotelic) value in AD. Security as an AD value is understood as: a condition in which the individual, social group, organisation, or state, has no sense of threat to their existence or fundamental interests; a situation in which there are formal, institutional, or practical guarantees of protection6, while efficacy is perceived as one, next to cost-effectiveness, profitability, energy, precaution in the form of efficacy of action assessed in terms of approaching the goal that has been intentional and constitutes the basis of this assessment7. In the history of AD, the staff was usually guided in their activity by efficacy and security. While observing the actions within AD it is possible to notice a permanent relativisation of these values to the intensity level of the combat. The aforementioned relations allow one to notice the regularity, which consists in that in AD, in the actions of higher combat intensity, the efficacy is a significantly higher value, while in the actions conducted in conditions closer to peace (e.g. humanitarian operations) – this would be security. The aforementioned arguments allow one to make a conclusion that the autotelic values in AD are both the efficacy and security, and that the hierarchical position of the efficacy and security in AD is not constant in nature, and the significance hierarchy of the two values aforementioned changes within the combat intensity function (The regularity of the relativisation of efficacy and security values in AD to the intensity of combat is illustrated in Figures 1 and 2 in a simplified manner). 5 To the basic types of value in the axiological system being created, I include the objective (autotelic) and indirect (instrumental) values. 6 R. Smolski, M. Smolski, E.H. Stadtmüller, Słownik encyklopedyczny edukacja obywatelska, Wydawnictwa Europa, Warszawa 1999. 7 Encyklopedia organizacji i zarządzania, PWE, Warszawa 1981, p. 471, 485. 28 THE COGNITIVE BASIS O FAIR DEFENCE Security value 1 0,5 0 peace crisis 0,5 conflict war 1 Combat intensity Source: Own work. Figure 1. The value of the AD efficacy in the intensity of military operations function Efficacy value 1 0,5 0 peace crisis 0,5 conflict war 1 Combat intensity Source: Own work. Figure 2. The security value in AD in the intensity of military operations function In the research conducted, a number of historically shaped indirect (instrumental) values were revealed, which are sought in AD. These values include: efficiency, detection, simplicity, harmony, flexibility, and synergy. To flexibility, however, regulation and once more identification are relativized. The activity of AD affects directly the detection and efficiency (see Figure 3). 29 ANDRZEJ GLEN SECURITY EFFICACY SIMPLICITY EFFICIENCY HARMONY DETECTION COORDINATION ACTIVITY Identification FLEXIBILITY Regulation Identification SYNERGY Integration Source: Own work. Figure 3. The value system model of AD Efficiency and detection, in turn, remain in relation to autotelic efficacy. Yet, the systems’ flexibility8 has its limits and then the value, which is the simplicity of action, reveals its significance in achieving both final values - efficacy and security. Moreover, synergy largely contributes to the final effect of efficient action in AD. Achieving this value seems to be impossible without the integration of actions of various entities implementing the tasks of AD. EFFICACY The specifying of the value system of AD was considered as a research activity allowing, in an orderly manner, to logically move to determining the position of theory of being with reference to AD. 8 An engineer would call the democratic pluralism a flexibility built into the system that, however, must have limits. [...]However, where on the operational efficiency decide micro millimeters and nanoseconds, there appears fortune, as the new God of war, which decides on the success or destruction, a fortune in a pure state, somewhat exaggerated and taken out from the microscopic dimensions of atomic physics, since it is just that the fastest and most perfect systems finally reach the Heisenberg uncertainty relation, which nothing will defeat, since it constitutes a fundamental property of matter in the whole Universe. S. Lem, Biblioteka XXI wieku, Wydawnictwa Literackie, Kraków 1986, p. 51, 52. 30 THE COGNITIVE BASIS O FAIR DEFENCE Ontological basis The features discovered so far and the probable value system that characterises AD indicate the praxeology-organizational nature of this phenomenon. Therefore, as the most appropriate, the ontological regard for air defence was recognised, the one which is representative of the praxeological and organisational mainstreams. It was therefore accepted that it is convenient to explain the ontological nature of AD phenomenon for the sake of ontological realism. When searching for the essence of AD being, it should be emphasised that all that exists is a being and creates some universe of being, and whatever exists, is a partial being, a constituent material of this universe. If AD exists objectively, independently of the awareness of the knowing subject, it should be a partial being, a part of the objectively existing reality. Most of the doubts as to the existence of AD can be explained by answering the question - whether and how does AD exist? First of all, in the reality that surrounds us it is possible to notice, in nonmilitary crisis situations, armed conflict, or at war, the external in respect, to the knowing subject, existence of AD phenomena. The reality compels the subject to solve problems, overcome difficulties associated with AD. Therefore, AD opposes it regardless of its consciousness, thus it exists objectively. However, AD exists also inherently in respect to the knowing subject. The evidence for such AD existence, found in this place of article, is even the description of observations, impressions and ideas established by the author in the course of the ontological nature analysis of the research subject. Thus, AD remains in the awareness and consciousness of the researcher in the form of his own impressions, experiences, and ideas. This manner of existence does not fulfil the conditions of the objective existence, therefore, AD exists also subjectively. A researcher associating with AD phenomenon, finally meets with a number of established products of the intellect in the form of doctrines, manuals, and instructions, collected in compact studies, describing and explaining the procedures9 specific to AD. These products, as a result of their preservation by record, do not fulfil all the criteria of the subjective existence, also equally difficult is to recognise their existence as an objective one. They are in some sense placed transcendently in respect to the researcher, yet they are too dependent on his process of reasoning to be considered as part of the objective reality. It is therefore necessary to find indirect, between the objective and subjective, intersubjective means of AD existence. Summing up this part of the analysis of the ontological nature of AD phenomenon, it is possible to state the objective, subjective and intersubjective existence of the research subject. Going back to the question: whether and how AD exists?, the first part of it should be an affirmative answer. However, the answer to the second part of question requires reducing the possible means of AD existence. 9 Such is the nature of the present article. 31 ANDRZEJ GLEN The reduction was made with the use of Ingarden’s modes of existence (modus existentiae)10. Ingarden distinguishes two modes of existence – the real being and the intentionally conceptual, thus unreal, illusory. Comparing these modes of existence with the analysis conducted thus far, it can be concluded that if each component of being exists really or conceptually, then it is also these two modes of existence: the real and conceptual that AD adopts. Confirming the position of AD in the realistic part of the surrounding reality us, it is necessary to verify the concreteness and abstraction aspect of the living objects. The actions in AD are performed by people. These people, called in this work the AD staff, belong to a particular social group. They bring in the field of AD attitudes and behaviour typical for this environment, finally they hold the relevant knowledge and skills in the area of AD. In AD, the devices used are constructed purposely for it, moreover, the physical features which characterise AD differ from those describing other phenomena observed in a battle. Thus, AD is physically determined. AD can be observed only in a specifically defined sector of the environment – airspace, in a specifically set time – it is, therefore, defined by time and space. AD, therefore, can be considered as a specific object, existentially completed, thus, existing objectively. At this point of the ontological analysis it is possible to answer the question, how AD exists in the real sphere of the reality surrounding us. However, the question remains of the existence of AD in the other mode of existence proposed by Ingarden – conceptual. But, if to look at AD as a conceptual object, it is possible to notice its abstracting from reality. The conceptual objects – models of real objects, detach themselves from reality, are made schematic in their matter content and indeterminate. The conducted ontological analysis allowed to assign AD to the real and conceptual sphere of reality. The Ingarden modus existentiae proved to be helpful in this research activity. The same distinguished author of the realistic perception of the world (Ingarden) invented existential moments (moment existentiae),11 a tool allowing one to specify the examined part of reality as an existential object and to verify whether it has the features of a real being. The existential moments are the reliable criterion of the affiliation evaluation of the object examined with regards to the real or conceptual sphere of the existential universe. In assessing the AD phenomenon in terms of Ingarden’s existential moments and acting according to the indications of ontological realism12, the independence 10 See R. Ingarden, Spór o istnienie świata, PWN, Warszawa 1960, p. 93-102. Ibidem. 12 The real objects, always existentially derived of some other real objects, are self existential, because on their own, that is in their quality content, have the existential foundation; at the same time they are self-reliant, if they do not necessarily have to coexist within one and the same unity with some other object, but being existentially self-reliant they are always dependent on some other real objects, with which they enter into causal connection, otherwise they would not be components of the real being. L. J. Krzyżanowski, O podstawach kierowania…,op.cit. p. 161. 11 32 THE COGNITIVE BASIS O FAIR DEFENCE and existential primordiality of AD should be rejected. AD, as the real object functioning in the armed forces, in the crisis and conflict reality, (Figure 4.), is a derivative of the people – military commanders – who are its creators. primordiality self existence derivation AD nonexistance of self self-reliance not self-reliance independence dependence Source: Own work. Figure. 4. The evaluation model of air defence as the real object, according to the Ingarden’s moment existentiae criterion Moreover, AD is in causal connection with many other real objects on which it is dependent. Above all, these are the connections with coverable objects. AD enters in casual connection with them by exchanging energy (for example, in the course of the use of electronic identification systems to distinguish their own from the foreign aircrafts) and information (for example, on mutual movements of AD forces and objects of cover). The lack of objects of cover obviously causes the AD's existence only as a conceptual object (Figure 5.). primordiality self existence derivation AD nonexistence of self self-reliance not self-reliance independence dependency Source: Own work. Figure 5. The evaluation model of air defence as the conceptual object, according to the Ingarden’s moment existentiae criterion However, it can be observed in situations of crisis and conflict that AD has in its quality content the existential foundation. The qualitative content consists of other real objects of AD, which include the specialised staff and devices deliberately created for AD. From the point of view of the pair of existential moments i.e. self existence – nonexistence of self, AD is a self existent object, thus real. 33 ANDRZEJ GLEN The analysis of the next pair of existential moments: the existential selfreliance – non self-reliance, shows, however, that AD is not existentially selfreliant and must co-exist within the same unity with the state’s air security system, alliance, or, at least, with the armed forces’ battle system. The existence of AD outside these systems does not make much sense, because AD alone cannot solve all the problems facing the country and its armed forces in non-military or military crisis situations. Generalising the completed phase of ontological analysis, it can be stated that AD as a real object is existentially derivative of other real objects – the state security system, or its armed forces, it is self existent, but not self-reliant, as it must coexist within one and the same unity with these systems, finally, it is existentially dependent on other real objects with which it enters into causal connections i.e. the objects of cover, the absence of which prevents the existence of AD as a real object. However, AD being perceived as a conceptual object, can be described as an existentially derivative of socio-psycho-bio-physical real objects – people, nonexistent of self since its existential foundation derives not from its qualitative content, but from the quasi-objective creations of the human intellect, preserved by their release. AD must coexist with them as their carriers, so it is not existentially self-reliant and dependent on them, and consequently in this case it is not a component of the existential real universe sphere. It can be stated, that AD, in both the examined approaches to ontology, is part of both the real and conceptual sphere of the existential universe. Furthermore, it is also possible to note that causal connections take place only in the real layer of the existential universe between the real objects. Connections of this type in the conceptual sphere, must, however, be intentionally determined, they cannot take place without the participation of the human intellect. Summarising the outcomes of the conducted ontological analysis of AD as a part of the real and conceptual sphere of existential universe, it can be concluded that: 1) AD, as a part of the real sphere, exists self existentially, but not selfreliantly, co-existing, at least, with the system of the armed forces, and mostly also with the security system of state; moreover, it is existentially derivative of the armed forces and dependent on the objects of cover by entering with them in causal connections and is fully completed existentially and concretised. 2) AD as a component of the conceptual sphere, that is as a product of real entities (systems of the armed forces) is nonexistent of self, not self-reliant, and its content is characterised by indefinability. In addition, when proceeding with the study of AD, we must remember that as part of the real reality also the part of conceptual sphere built on it should be taken into account, because reality – in the broad sense – make up both of these layers, as shown in Figure 6. 34 THE COGNITIVE BASIS O FAIR DEFENCE Intergrated AD AD of AF, LF, N Theory, doctrines, methods, forms, modes, procedures conceptual sphere people, devices, airspace real sphere Source: Own work. Figure 6. Air Defence as a part of existential universe, according to Ingarden’s modus existentiae The established ontological regularities of AD existence constituted only the specific phase in explaining the ontological nature of the research subject. However, already at this stage the complexity of the AD phenomenon could be noticed, while so far only the ontological nature of AD as a real object – a thing – has been determined. Meanwhile, the needs to determine the appropriate epistemological approach to new challenges facing AD, require the conclusions resulting from the ontic complexity of the studied phenomenon to be taken into account. If we assume that AD is characterised by complexity and inconstancy, and that the only philosophical category complying with Ingarden's conditions of moment existentiae and modus existentiae is a thing, then the ontological description of AD needs the use of an additional philosophical category. Such a category is a relation, which includes the features of an ontic being. Relations are divided into ratios and actions. The ratio of one object to another is a stated category, but not a real one, because as a result of it the features of the real object do not change, but what changes are only the relative qualities. Thus, this change is unstable in nature, because nothing changes in the real object after the cessation of the ratio relation. The actions, however […] are real, based on specific, it is a physically, temporally and spatially determined transferring of matter, energy and information. […] the changes in the interaction of objects-things are their result13. The impacts in AD as a real object, may for example change the quality level of staff training, cause the undertaking of or resigning from any action, direct (control) the aircrafts’ flight. It is therefore reasonable to use actions as an 13 Ibidem, p. 166. 35 ANDRZEJ GLEN additional category when describing the ontological nature of the phenomenon. Demonstrating the ontological complexity and inconstancy of AD requires, however, adding also the collective set category to reflect the co-occurences and interaction of things and actions. The explanation of AD as an ontic collective object, which is a fragment of the real being of a unique structure, should explain the existential nature of the research sufficiently to draw conclusions for its proper and full understanding. A structure should be understood here as the totality of relations of comprising and acting; as specified as the set of parts that make up the whole collective set of AD. The complexity of the description required to increase the readability is presented in Figure 7. showing the AD model as an ontic collective object. In the conducted analysis of AD structure there has also been used the already specified ontological regularities of the studied phenomenon. Intergrated AD The reference level – zero AD of the Air Force AD of AF unit AD of AF unit Elements of command Elements of reconnaissance Elements of destruction AD of other components Immanent structure of KPP Deep structure of AD the relation of comprising the relation of interaction Source: Own work. Figure 7. The model of air defence as an ontic collective object It was established that AD exists independently in each type of the armed forces (TAF). In that case, the reference level (zero) in the construction of the ontological structure will be the very AD of air force as well as navy and ground forces. The derivation of the studied phenomenon was also established. Thus, AD 36 THE COGNITIVE BASIS O FAIR DEFENCE through the comprising relations will be included in the object of a higher order, and that will be an integrated air defence. At the same time, AD will connect with the interaction relations with similar ontic objects of other types of armed forces (TAF) in the objective unity, that is, unity within the AD object. In turn, AD of other TAF consist of objects of a directly lower rank – AD of other TAF units, and the interaction that connects them determines the immanent structure of the object of study, i.e. AD. The elements of command, reconnaissance and destruction, constituting AD, create on the other hand a deep structure, and the interaction that connects them determines the deep structure within the AD object. Epistemological basis From a cognitive point of view, AD is the area of knowledge and skills, in which the unity of understanding which characterise the phenomenon of states, events, and processes, is one of the conditions for the success of most of the hostilities conducted today, non-war operations, as well as peaceful non-military actions in emergency situations. The internalisation of the basic terms used in the process of AD cognition should, as a result, lead to the full dissemination of their uniform understanding. It is therefore necessary to take a theory cognitive position in respect to the epistemological categories as "totality", "complex", "system". It is necessary to uniform the understanding of the aforementioned concepts, without which it would be impossible to use the term: the epistemological position of AD. The totality of AD is a set of AD elements of Air Force, Ground Forces, Navy, combined with AD by the comprising relation. OF GROUND FORCES AD OF NAVY OF AIR FORCE Source: Own work. Figure 8. The model of the air defence whole The AD complex is a collection of its elements of command, destruction, informing, assistance, and supply, among which there are complementary relations (Fig. 9.). 37 ANDRZEJ GLEN AD DISTRUCTION INFORMING COMMAND SUPPORT SUPPLY Source: Own work. Figure 9. The model of air defence complex Finally, the AD system should be understood as being separate from the state’s air security system and the armed forces system; the collective14 and ordered collection of human resources (the staff), specialised technical equipment, airspace, methods, modes and procedures of action and interactions of matter, energy and information that connect and order them for the efficient and secure combat by means of air attack (MoAA) in the air. The AD system is expressed in Figure 10. by a dark oval, within which the key system resources have been included in the form of three slightly brighter ovals. These resources are: creative – the staff, natural – the airspace, and artificial – the technical equipment along with the principles, methods, procedures for their use. All the three types of aforementioned resources overlap, thereby expressing the ties that connect them, and constitute the structure of AD. The dashed lines in the figure indicate the relations of the system with the surroundings. Inside the model, the structure of the system was illustrated with two darker ovals. The top oval illustrates the authority performing in the system the role of executive member establishing the domain, mission and objectives of AD. The lower, on the other hand, expresses a basic, executive level of AD together with the subsystems of: destruction, information, support and supply. These subsystems transform the resources that flow into the system in the services (products) provided for the state’s air security systems of the state and the armed forces as well as the coverable objects placed in the first of the lighter ovals surrounding AD system – in its immediate surroundings. The second and the brightest oval represents the 14 The collection in the collective sense […] called the mereological collection, by which a complex totality (set, pack, aggregate) is meant, (juxtaposed) from the objects that are its parts (components). See ibidem, p. 124. 38 THE COGNITIVE BASIS O FAIR DEFENCE resources from which the AD system must derive the supply. The small white ovals illustrate other systems with which the AD system enters into an interaction relation. Source: Own work. Figure 10. The model of air defence system As it was found earlier, all relations (ratios and interactions) that connect the elements of the system are oriented as AD’s objectives. Before explaining the concept of AD’s “objective” category, it is necessary to refer, in the course of explaining the structure of AD system, to the two newly introduced concepts related to the activities of the governing bodies of the system – the "mission" and "domain". The mission will be regarded as the object of aspirations, i.e. the permanent aspirations of AD as regards the security of the state and the armed forces whereas the domain of AD will represent the area and type of the undertaken within operations. After expressing my attitude to the category of "mission" and "domain", let us now turn to a full explanation of the concept of "object" that directs the AD system. 39 ANDRZEJ GLEN From the point of view of the research process requirements and taking into account the availability of the desired results of an AD operation as well as the time factor, the studies used in the initial phase the four categories of objective: ideal, intention, purpose and task. The first of these – the ideal – was based on the established value system15 in AD. The ideal determines a perfect state in the AD object, which is unattainable, but also one for which it should be aimed for. The intention determines the category of objective defined objectively, describing the state of AD, which can be achieved in an unspecified perspective. The categories, which are most often used in a later phase of determining the AD state – is a purpose and task. They objectively and subjectively define the future and desired result of AD’s actions, those possible and predicted to be achieved within a specified lapse of time and time limit, were assumed as a purpose in the aforementioned presentation. The task was termed as being separate objectively and subjectively, in time and space; and in general procedurally, a part of the purpose provided for the implementation in the agreed period or time limit, set in a lapse of time predicted to achieve the purpose16. In the description of AD, there were also used two epistemological categories, the explanation of which was considered as necessary to obtain an internalized perception of this phenomenon. These categories are "procedure" and "function". Procedure, from French procédure as proceder 'proceed', from Latin procedere, is that which is established by normative rules and procedure17 in AD matters. Function is the same as the set of potential, usually repetitive, conventional and procedurally formal actions, separated due to their content and relativisation to the objective of AD. Before attempting to define and partly redefine the objective of AD, it was considered necessary to specify the two concepts not applied yet in the theory of AD: missions and domain. An ability in times of peace, crisis and war on the territory of country, of armies and other objects to prevent the incurring of losses of military and non-military means of air attack was regarded as the mission of AD. As for AD domain, we can regard the actions undertaken in AD as part of the two basic functions of AD: the destruction caused by MoAA and informing about them. The AD objective has been defined so far18 in the broad sense from the point of view of the national defence system, as the state's achievement of a condition of 15 Commencing the arrangement of instruments from the category of objectives, I am formulating a draft thesis that the objectives of the "organization", as any other objectives, derive from the values, in this case, from the valuesdeclared by the participants of 'organization', and by its social and institutional surrounding, with which it conduct, as an open system, an exchange of material, nominal and immaterial goods. See L. Krzyżanowski, O podstawach kierowania... wyd. cyt., p. 250. 16 Ibidem., p. 252–253. 17 W praktyce tryb ten będą określały stałe procedury operacyjne OP, wytworzone przez określone organy dowodzenia (najczęściej dowódcę operacyjnego). 18 See B. Zdrodowski, Teoria OP, AON, Warszawa 2002. 40 THE COGNITIVE BASIS O FAIR DEFENCE national security in its air area, while in terms of air defence – a part of an armed struggle, as the prevention of an opponent’s MoAA to attain their objectives, thereby creating favourable conditions to conduct an armed struggle in the broader sense in the air threat conditions. A careful axiological and theoretical analysis of a state’s air security category reveals that among the values directing the objective of the state’s security system19, at present, next to efficacy and security, also ecology and economy are included. While the first two listed values are common to the state’s air security and AD, the other two: the economy and ecology of using airspace with AD domain, have little in common. Thus, it is suggested, that the AD objective, in its broad sense, and from the point of view of the state’s air security, is to consider to be preventing military and non-military means of air attack from causing losses to the covered objects and army in times of peace, crisis and war both within the country and outside it, not allowing these objects to function normally. In such an adopted definition of the objective of AD, for the "normal" functioning it is considered that such a state of the covered system exists in which its structure and functions performed were not affected to such an extent as to not allow for the implementation of the mission, domain, purpose and tasks of the system. In case of a narrow understanding of AD objective, in terms of an armed struggle, it was recognised that it requires only a small adjustment related to the current scheme of air threats20, in which on the first division level the military and non-military air threats were distinguished. The military threats include those in which the source of danger are the armed forces of the state, alliance, and or coalition of states, while the non-military ones include those threats the source of which should be traced in the terrorist and criminal activity, which does not involve the armed forces of any country. After the aforementioned adjustment was made, it is suggested that as a pat of the objective of AD, treated as part of the armed struggle in its narrow sense, should be the prevention of the military MoAA of the enemy to cause losses to the covered objects, compromising the operational power of these covered objects, that is, losses that do not allow the covered objects to accomplish their tasks21. The essence of such a defined AD objective explains the interpretation of AD objectives introduced to the theory of AD by B. Zdrodowski which is included in Figure 14. In accordance with that interpretation, the covered troops (objects) can perform combat tasks if they have at their disposal the size of the battle potential (PBpotrz) at least sufficient for it. The opponent having at his disposal a means, including 19 See A. Glen, Bezpieczeństwo powietrzne elementem systemu bezpieczeństwa państwa, w Zarządzanie kryzysowe w Polsce, WSH, Pułtusk, 2007. 20 See A, Glen, J. Nowak, Sytuacje kryzysowe w polskiej przestrzeni powietrznej ich źródła, AON, Warszawa 2008. 21 Lt. B. Zdrodowski, Teoria …, wyd. cyt. 41 ANDRZEJ GLEN MoAA (PBŚNP), aims to reduce the battle potential (PBdysp) of the covered troops (objects), to a level that prevents the execution of their tasks, they have specific capabilities at their disposal (MŚNP) Source :B. Zdrodowski, Teoria…, wyd. cyt. Figure 11. A graphic interpretation of air defence objective Each of the symbols in Figure 11. stand for: – PBdysp – a baseline battle potential of the covered objects; – PBpotrz- a battle potential of the covered objects necessary to accomplish the task; – PBkryt- a critical battle potential, determining the threshold of maximum losses which the covered objects may suffer as a result of MoAA impact; – MŚNP – the capabilities of MoAA; – PBŚNP – a battle potential of MoAA; – MBOP – the battle capabilities of AD; – PBOP – a battle potential of AD. The difference between the baseline battle potential (PBdysp), and the battle potential necessary of the covered troops (objects) (Pbpotrz) is termed as a critical battle potential (PBKryt), that is, such loss which we accept without the threat of not being able to accomplish a task. PBdysp - PBpotrz = PBKryt where: – PBdysp - the baseline battle potential of the covered troops (objects); – PBpotrz - the battle potential necessary for the covered troops (objects) to accomplish the tasks; – PBKryt – the critical battle potential, acceptable for loss, without the threat of not being able to accomplish the task. 42 THE COGNITIVE BASIS O FAIR DEFENCE If the capabilities of MoAA (MŚNP) are greater than the critical battle potential (PB-Crit), then it should be considered that the MoAA will accomplish their tasks: – when MŚNP > PBKryt then MoAA are able to accomplish the task. – when MŚNP < PBKryt then AD is able to accomplish the task. From the interpretation of AD objective results it can be seen that to achieve this objective it is necessary to affect MoAA in such a way which enables the reduction of their battle potential (PBŚNP) to a level where the battle capabilities of MoAA (MŚNP) will be smaller than the critical potential of the covered troops (objects) (PBKryt), thus ensuring the accomplishment of the mission by the troops (objects). Another important category of AD are the functions. The objective of AD, understood both in a broad and a narrow sense, is achieved by implementing two key functions22: – of the destruction of MoAA in the air; – of informing on air threat. AD FUNCTIONS COMMAND EXECUTING BASIC: - destruction - information about MoAA ASSISTING SUPPORTING: - increase basic functions capability - decrease MoAA capability SUPPLYING: - logistically - staff - information Source:B. Zdrodowski, Teoria …, wyd. cyt. Figure 12. The air defence functions In addition to the basic functions in AD – as a complex category – there should be a managerial (command) function exercised. Moreover, for the efficient performance of the destruction and informing functions it is also necessary to fulfil security functions, i.e. of support and supply. (see Fig. 12.). The informing on MoAA, from a formal point of view, should be placed within the security functions, supplying informationally the basic AD processes. However, for the sake of the crucial, for the Ad system, importance of informing, this function was raised in AD to the basic level. 22 Ibidem. 43 ANDRZEJ GLEN AIR DEFENCE THE OBJECT OF AD THE TERRITORY OF THE COUNTRY AIR FORCE OBJECTS AIR DEFENCE A TYPE OF ŚNP AIR DEFENCE SPACE DEFENCE MISSILE DEFENCE AIR DEFENCE A TYPE OF AD SUBJECT NON-SPECIALIST SPECIALIST AIR DEFENCE TYPES OF AD ACTIONS PASSIVE ACTIVE Source :Own work on the basis of B. Zdrodowski, Teoria OP, AON, Warszawa 1996. Figure 13. The division of air force The final specification of the contemporary concept of AD requires the classification of the objective phenomenon using clear criteria of division. These criteria include: the subject and object of AD and the type of actions of the AD and the opponent with which the battle is to be undertaken (see Fig. 13). As a result, there were determined the air defence of: the territory of the country, the armed forces, other objects; along with: space defence, air defence, missile defence, specialist and non-specialist defence, active and passive defence. The scope of AD depends on the same criteria by which the classification was made. Thus, AD may include combating the opponent’s aviation in the air by the use of ground forces or to undertake the battle with all MoAA (aircrafts, missiles and battlespace powers) on land and in aerospace, by all specialist and nonspecialist forces, engaging in both active as well as passive actions. Conclusions Summarising the results of the research obtained in the course of the cognitive identification of the theoretical basis of OP (AD), the broad and narrow sense of AD may be regarded as justified. 44 THE COGNITIVE BASIS O FAIR DEFENCE In the broad sense, AD should be comprehended as part of a state’s air security aimed at preventing military and non-military means of air attack from causing losses in times of peace, crisis and war, to the covered objects and troops both on the territory of country and outside, not allowing these covered objects to function normally. However, in the narrow sense, AD should be interpreted as part of the armed struggle aimed at preventing the military MoAA of the opponent from causing losses to the covered objects, excessing the critical battle potential of those covered objects, that is, the losses that do not allow the covered objects accomplish their tasks. Moreover, when describing and explaining the phenomenon of AD, especially determining its referent, there should be considered the AD divisions according to the criteria of: object, type of entity, type of MoAA, type of AD actions, and the divisions denotations and connotations of AD resulting from these. Bibliography Encyklopedia organizacji i zarządzania, PWE, Warszawa 1981. Glen A., Bezpieczeństwo powietrzne elementem systemu bezpieczeństwa państwa, w: Zarządzanie kryzysowe w Polsce, WSH, Pułtusk, 2007. Glen A., Nowak J., Sytuacje kryzysowe w polskiej przestrzeni powietrznej ich źródła, AON, Warszawa 2008. Glen A., System bezpieczeństwa powietrznego państwa, NDU Scientific Quarterly, AON, 4/2008. Ingarden R., Spór o istnienie świata, PWN, Warszawa 1960. Krzyżanowski L.J., O podstawach kierowania organizacjami inaczej, PWN, Warszawa 1999. Krzyżanowski L.J., Podstawy nauki zarządzania, PWN, Warszawa 1985. Lem S., Biblioteka XXI wieku, Wydawnictwa Literackie, Kraków 1986. Smolski R., Smolski M., Stadtmüller E.H., Słownik encyklopedyczny edukacja obywatelska, Wydawnictwa Europa, Warszawa 1999. Zdrodowski B., Teoria OP, AON, Warszawa 2002. 45 LESZEK ELAK NDU Scientific Quarterly no 4(89) 2012 REASONS FOR CONTEMPORARY CONFLICTS – AN OUTLINE OF THE PROBLEM Col. Leszek ELAK, Ph.D. National Defence University Abstract The article presents the modern approach to the problem of armed conflicts in the world. Armed conflicts lead societies to demoralization and weaken growth opportunities of states. Furthermore, they often destroy all social structures and serve as a backing of numerous social pathologies. The number of parties involved in the conflict, and the aspirations of the leaders, and external interventions (intrusions) often prolong the conflict, even making impossible finding any peaceful solutions. The author, in this article characterized reasons of nowadays military conflicts and presented the consequences resulting therefrom. Key words – conflict, state, war Currently, there is a general feeling that the outbreak of a global war is unlikely. However, attention is drawn increasingly to the probability of an increased number of local crises, consisting of country-to-country or regional conflicts which, in the case of their escalation may lead to war on a wider scale. Nevertheless, according to C. Clausewitz – each era has its war. The turn of 21st century coincided with a transition to a new era – a so-called information era, in turn coinciding with a general civilisation change. So the current era will probably also have their war1. Recently, in national security and defence strategies, the main focus is taken by defensive strategy (war strategy). Currently at the forefront, can be seen the crisis strategies or the strategies of crisis response. Conflicts or wars break out in different situations - both against relations between individuals, as well as between individual social groups or between countries. The essence of conflicts and wars constitute defined contradictions, occurring between two or more parties, which usually result from a difference of interests2. A conflict of interest is to be found both within individual countries, and between them. In other words, in the first case we are dealing with an intra-state or 1 See Balcerowicz, B. 2002. Peace and un-peace. Bellona, Warsaw 2002, pp. 167. See Cziomer, E. 2000. Outline of contemporary international relations. PWN, Cracow 2000, pp. 203. 2 46 REASONS FOR CONTEMPORARY CONFLICTS – AN OUTLINE OF THE PROBLEM local conflict, and in the second case with international conflict. This conflict of interest refers to relations between the state regarding national and political values as: sovereignty, independence, self-determination and territorial integrity. Therefore we can speak about an international conflict only when the participating warring parties, not only have contradictory interests, but realise it; which is in turn reflected in their behaviour, proceedings and action. It is also important to distinguish such conflict from normal relations occurring as part of inter-state rivalry3. Both international and local conflicts affect indirectly the security of its neighbouring countries and their citizens. Until recently, the defence systems of states were adjusted to the implementation of the tasks in the framework of peace and war. As a result of many changes at the end of the 20th century, and in the beginning of the 21st century the likelihood of armed conflicts on a large scale has decreased significantly, but new categories of security risks have appeared. This situation has meant that attention began to be attached to the issues relating to crisis situations caused by the various threats, both military and non-military. A common system of state defence (the alliance) should be able to resist any risks causing crisis situations in the area of the country and beyond its borders4. A serious threat is the escalation of local conflicts in to international conflicts. This may occur in cases where: there are uncontrolled supplies of weapons, diplomatic pressures are being exerted by external members, common actions are agreed in issues like combating international terrorism outside the state as well as the armed intervention of neighbouring countries or external powers. Often two interchangeable concepts are being used – war and armed conflict. Therefore, both these concepts require clarification. The concept of war is to be distinguished from other forms of combat such as gang actions, political and armed revolutions. War is a social, historical and class phenomenon, consisting of the regulating of disputes or execution of political objectives by the application of violence through the use of the armed forces5. War is also a continuation of politics conducted by the means of violence, in order to compel the opponent to meet our will. It [the war] bears also the nature of the bloody armed struggle, conducted by the organised armed forces6. The war is not just a political deed, but the real tool of politics, a furthering series of political relations, carrying them out with other means7. And the armed conflict should be considered to be the actions of the armed forces of the opposing parties (states, nations, classes, and social groups) carried out on a limited (in relation to the used measures, area, duration) scale8. The armed 3 Ibidem. Sobolewski, G. 2009. Emergency response in an urban environment. National Defense Academy, Warsaw 2009, pp. 78. 5 Universal Encyklopedia, PWN, Warsaw 1976, vol. IV, pp. 697. 6 Skibiński, F. 1978. Reflections on the art of war. Warsaw 1978, pp. 29. 7 von Clausewitz, C. 1958. About war. Warsaw 1958, pp. 15. 8 Mucha, L. 1991. Armed violence. Warsaw 1991, pp. 33. 4 47 LESZEK ELAK conflict can be treated as a kind of armed violence consisted of striving to achieve the purposes of the state (the coalition, social group) by reciprocal action using the armed forces or organised and armed groups. The application of this criteria regarding ways to use armed conflicts allows one to distinguish between war and border armed conflicts9. According to another source10 the armed conflict is an ambiguous term, as to which there is no compatible acceptance in science. Among the various types of war, there is listed a conflict of reduced intensity, which is being described as: armed action in the field between peace and an open war using strictly limited forces and methods. Traditionally war is characterised by the following characteristics11: – two or more organised armed forces, of which, at least on one side, are involved are regular troops, paramilitary troops take part in the fight; – both fighting parties must be organised according to a certain pattern, and in addition to that, there is a planned and organised structure of armed actions, even if it only confines to defence; – there is a chronological – fixed continuation of an armed conflict or correlation of strategic and tactical purpose of command level. And the features distinguishing the armed conflict shall be primarily taken as: – existence of at least two entities fighting on a limited scale; – use of organised armed forces by the fighting parties against the armed forces of an adversary; – usage of methods and measures of armed struggle. In the 1990s a qualitative change occurred in conflicts and wars. The most important elements are12: – a clear dominance of conflicts and wars of an internal nature, which gradually become international and constitute a serious threat to neighbouring countries: the conflict in the former Zaire (Democratic Republic of Congo) and numerous conflicts in the former Yugoslavia; – a serious increase of conflicts in connection with the disintegration of multinational states (USSR, Yugoslavia, Sudan); – an exacerbation of conflicts over tensions of an ethnic-national-religious character; – an increase of war damage and losses among the civilian population, which in many cases are greater than among the parties directly involved; – difficulties in the peaceful resolution of international disputes; – international terrorism and organised crime; – participation of international organisations in resolving conflicts and local crises. 9 Glossary of basic terms of safety. Warsaw 1994, pp. 12. Dupuy, T. N. 1993. International Military and Defense Encyclopedia. Vol. 6, Washington 1993, pp. 2886. 11 Cziomer, E. 2000. Outline..., pp. 204. 12 Ibidem, pp. 217. 10 48 REASONS FOR CONTEMPORARY CONFLICTS – AN OUTLINE OF THE PROBLEM At this point it would be worth narrowing down and analysing the theories of wars and causes of conflicts and also responding to the question of why war happens in these and not other times, between only those countries and not others and what are the necessary and sufficient conditions for the outbreak of war or conflict. The theories of the causes of wars can be divided, according to the level of analysis13: 1. the system – the main reasons for the wars derive from the structure of the international system; 2. the state – its nature and character of the society are crucial; 3. the decision-making process, organisational and bureaucratic mechanisms, particularly in crisis situations There are many theories of the reasons for wars. The first noteworthy is the realist theory of the balance of forces, which relies on the fact that the members shall endeavour to avoid hegemonies and maintain their independence. The balance of powers is such a system of international relations, in which any one power may not influence on the other or impose on them their rights14. In accordance with this theory, one should create alliances, in order to protect against the undue advantage of others – external balancing, unlike internal balancing, which follows through armaments. Military potential should be stable and possible to measure, so that member states could properly define it: what is necessary for a proper balancing. Technological changes in the sphere of military may influence disturbing because: – they create uncertainty about the actual strength of individual states; – they create an opportunity to use technology to the advantage of one state, before the technology spreads; – they stimulate arms races15. Another theory is the theory of overwhelming force, which says that equal distribution of forces creates the danger of believing in victory by one of the parties. The advantage of one state is the guarantor of greater stability; the war is unnecessary for the stronger one and too risky for the weaker one. The next theory – the theory of force transition proclaims that the main sources of war are changes of the forces relationship arising as a result of the different pace of economic growth. The dominant state shall bear the costs associated with maintenance of the system, while its rivals benefit from this without incurring costs16. Another theory proclaims that the country whose strength is growing, may initiate the war in order to obtain impact and political importance in accordance with its economic and military status. The likelihood of war breaking out is the greatest when the development of the rising country is quick, and its strength close to the strength of the dominant country, especially in the absence of a tradition of cooperation 13 Czaputowicz, J. 1998. System or chaos. PWN, Warsaw 1998, pp. 18. Stefanowicz, J. 1996. International Order : Experience and Future. Warsaw 1996, pp. 140. 15 Czaputowicz, J. 1 System or chaos. Op.cit, pp. 19. 16 Houweling, H. 1998. Power transition as a cause of war. Journal of Conflict Resolution 1998, vol. 32, no 1. 14 49 LESZEK ELAK between them and when the revisionist state is attempting to alter and replace the existing international order with its own order17. Some theories show that the reasons for the wars lie rather in the nature of the state and its society. They override the statement that the international system affects the outbreak of wars and conflicts. According to them, relative prosperity and social consensus minimise the likelihood of a war. On the other hand the religious differences and nationalism disturbs and heighten the aggression which as a consequence, can lead to war. The uncontrolled internal situation in the country leads the authorities to initiate a war, in order to increase the national unity and to strengthen its[the country’s] position. Often the authorities and politicians behave irrationally and their heads-up lead to a disregard of the future wars costs. They often derive personal benefits from the war without incurring the direct costs18. In the mainstream of those theories there is also the democratic theory, in the light of which the democratic states do not start wars. Other theories of wars causes concern wars at the level of the decision-making process – military doctrine (the offensive -increases the likelihood, the defensive – reduces it), as well as investigating the causes of wars in conflicts between the parties involved in the dispute, the lack of information, underestimating or overestimating the forces or the intentions of the opponent. In the subject of literature we can find the long cycle theory. According to it, the international system returns after a period of time to the point of take-off. An excessive extension of the dominant state leads to its collapse. The change of leadership in the world follows in cycles more or less every 100 years: the world superpower in the 16th century was Portugal, in the 17th - the Netherlands, in the 18th and 19th - England19. Currently from the 20th century the United States has served this role. Academics examining the causes of the wars came to interesting conclusions20 in the sixties. The results obtained were valid for the times and have proven that: – conflicts and internal disorders are frequent cause of wars; – the equability of forces degradation between the main countries reduces the risk of war; – the rapid development of one state increases the risk of war; – a very small or very large degree of force polarisation increases the risk of war; – arms races leads to the escalations ending in war. Other studies of the wars 21 in the years 1816-1980 have led to the conclusion that a weaker state cannot reasonably attack a stronger one – unless, in an alliance; 17 Organski, A. F. K. 1968. World politics. New York 1968, pp. 376. Czaputowicz, J. 1998. System or chaos. Op.cit, pp. 20. 19 Modelski, G. 1998. The long cycle of global politics and the nation-state. Comparative Studies in Society and History, 1998, no 20, pp. 214-235; Czaputowicz, J. 1998. System or chaos. Op.cit, pp. 20. 20 See Desler, D. 1991. Beyoned correlates. Toward a casual theory of war. International Studies Quartely 1991, pp. 339-341; Singer, J. D. 1978 -1980. The correlates of war, New York 1979-1980. 21 Comp. Czaputowicz, J. 1998. System or chaos. Op.cit, pp. 21. 18 50 REASONS FOR CONTEMPORARY CONFLICTS – AN OUTLINE OF THE PROBLEM the powers more often participate in wars of lesser importance than other states and expectations as to preserving the third countries may be crucial for the start of the war. Moreover in a situation where the expected losses of one state exceed the potential gains of another state, there is a strong likelihood of negotiations, the allied state may affect the stronger state only in certain situations and the wars between allies are more frequent than between enemies. By analysing the theories of the causes of wars and conflicts one cannot overlook assumptions of the peace and conflicts studies, which detect causes in three categories: 1. structural – dependent on their intellectual, economical, technical, infrastructural, industrial, agricultural development, the geopolitical situation and historical circumstances; 2. cyclical – alliances, coalitions, social behaviour under the influence of propaganda, indoctrination and ideology; 3. other – unforeseen incidents, provocations, etc. Summarising the above considerations, it is clear that there is a belief that the heterogeneity of the modern world, the diversity, intensity and multidimensional nature of international relations generate in a natural way disputes and contradictions. Therefore, the most important causes of wars are the following factors22: – economical: • poverty; • access to natural resources; • tensions of an internal nature; • external dependence; • place in the international division of labor; – political: • internal, social tensions; • ethnic classifications; • territorial claims; • refugees and displaced people; • a sense of external threat; • activities of the opposition; – ideological: • the political system; • past history; • racial prejudice; – religious; – ecological: • natural and environmental disasters; 22 Borkowski, R. 2001. The conflicts of the modern world. Scientific – Didactic Academic Publisher, Cracow 2001, pp. 42. 51 LESZEK ELAK • environmental degradation; • water shortages; • globalization; • instability of energy markets; • migration of the population; • diseases of civilization; • shrinking of natural resources; • ecological terrorism; – organized crime; – international terrorism. Given the previously presented theories of the causes of wars and conflicts, it should be noted that it happens rarely, that at the root of the conflict lays only one reason. There are a whole combination of reasons leading to conflicts. The country leaders controlled by their own political ambitions, internal agreements and emotions, trying to strengthen or maintain their position as a state in the international arena, referring to the reasons of state, have made their own interpretation of the conflict situation. Disregarding the interests of their partner or the international law, they have made decisions about the use of force. These factors determine the nature of the conflict, which is seldom clear. A conflict is often accompanied by ethnic and religious tensions, often by the interference of third countries. It creates a conglomerate of the causative mechanisms that are difficult to explain. Sometimes, the given region of the world is dominated by a specific cause of conflict which reveals itself in other areas, for example, territorial disputes sometimes have a very long pedigree. Particularly disturbing are those whose origin is closely connected with the collapse of colonialism. Boundaries erected individually by European countries remained unchanged. Not following the natural ethnic or cultural distribution, they enclosed in the structure of the state lots of conflicting interests and attitudes. In another case, the dominant causes are raw materials, where it is not only about access to resources, but also differences of opinions concerning their distribution23. The most important consequence of the majority of contemporary armed conflicts is a kind of de-institutionalisation, which means there is no central control and rules of action for the parties to the conflict. De-institutionalisation, compared to traditionally comprehended wars, manifests itself primarily in two interrelated elements24: – diversity of warring parties; – brutalisation of the conflict. Contemporary armed conflicts are characterised by a diversity of warring parties and thus subject to some kind of privatisation. The participants of the conflict in addition to the regular army (and sometimes instead of them) are various 23 24 52 Ibidem, pp. 42-23. Ibidem, pp. 118. REASONS FOR CONTEMPORARY CONFLICTS – AN OUTLINE OF THE PROBLEM non-state subjects, ranging from a loosely organised band of armed and paramilitary groups, ethnic groups, tribes, clans, drug cartels, companies engaged in supplying mercenaries, as well as further warlords or partisans similar to the state army25. It encourages the incorporation of external state, and especially nonstate, actors in the conflict. The vast majority of participants of this kind of wars confined its activity to the territory (countries) covered by the fights. However, some of them, at the same time, engage in activities in the form of asymmetric threats to other countries. An example of this might be terrorist activities of some Islamist terrorist organisations, and especially such as Al Qaeda26. The second aspect of the de-institutionalisation of modern armed conflict is the widely understood brutalisation of conflicts. It is characterised primarily by the use of combat methods different from typical interstate wars, often treated as inhumane and unacceptable under international law. Its expression is also a frequent focus of activities connected with, and including attacks on, civilians belonging to different ethnic or religious community. Outlined above, two characteristics of contemporary conflicts affect very significantly the developmental abilities of the asymmetric threats constituting subjects. Some Islamic terrorist groups have been formed during or as a result of armed conflict. Moreover, most of the course of armed conflict enables the operation of organisations and criminal groups asymmetrically – it enables the recruiting of new members, as well as opens a very broad perspective for their existing participants to gain relevant militant experience. Possibilities of recruitment of new members are being increased by the fact that the asymmetric threat is constituted by both cultural or religious factors. Another convenience for organisations and groups is the increased availability of certain types of weapons (small arms)27. The important consequence of modern warfare, and above all their costs and negative consequences for the international system, is also a substantial modification of roles and responsibilities of regular armed forces and especially the troops in countries belonging to NATO or the EU. Currently their traditional function, defence against external aggression from other states, has lost its importance; so the main task and actions actually performed by modern armed forces are several missions related to the need to intervene in internal conflicts (including peacekeeping or humanitarian operations) as well as the need for post-conflict stabilisation and reconstruction. This raises important implications for NATO and EU countries: in addition to the reorganisation of their respective armed forces, there is the issue of intervening in conflicts where they themselves are not directly concerned (for among other reasons due to geographical distance). This leads to 25 Cienciara, A. 2010. International conflict - a theoretical approach. International Relations, University of Warsaw, Warsaw 2010, p. 106. 26 Borkowski, R. 2001. The conflicts…. pp. 118. 27 Ibidem, pp. 119. 53 LESZEK ELAK a significant asymmetry in the determination or the will to participate in the conflict between the forces of intervention (stabilisation) and the local combatants. The consequence of this is the susceptibility of intervention (stabilising) forces due to the asymmetrical nature of the methodology employed and consequently the negative effects of entities, which in turn constitute asymmetric threats. The fact that the state of the transatlantic area engage militarily in conflicts in remote and culturally different regions of the world, can be interpreted by some of the local community as objectionable unauthorised interference in their internal affairs and a manifestation of imperialism28. Armed conflicts lead to a demoralisation of societies and weaken the development prospects of countries. They often destroy all social structures and are the underlying causes of numerous social pathologies. Often the number of participating parties to the conflict, the aspirations of leaders and interference from the outside prolong conflicts preventing the establishment of peace. Then the fights lasts until all the forces and motivations of the combatants become exhausted. Therefore, the reduction of armed conflicts and settlement of disputes, ie. opposing views of interested parties, using peaceful means for the international community is one of the most important problems to be solved at the present time. 28 54 Ibidem, pp. 120. SECURITY IN SOCIAL CONTRACT THEORIES NDU Scientific Quarterly no 4(89) 2012 SECURITY IN SOCIAL CONTRACT THEORIES Lt. Col. Krzysztof DRABIK, Ph.D. National Defence University Abstract Security is a basic need and practical aim of safe existence, survival and development. This fundamental attribute is important for every rational being and it is anchored in the social contract theory. An agreement between individuals at the ethical and social level reveals a method to achieve security. Here, ethical principles and the political system of the state are the basis for safe human existence. Key words – security, contract theories, politics The dichotomy of the natural state and political state The elementary components of the discourse on human security are the functional principles of the social structure built upon social contract. They are key determinants when analysing the creation of security, and even indispensable when thinking of it. The social contract theory indicates a possible origin of the initial rules that form the basis to discuss the prospects of the shaping of security. The hypothetical character of this theory does not disqualify its practical effects in a social reality. Just as the a priori assumption of the need for an axiom in logic allows for the adoption of a particular method of defining concepts and proving judgements. The social contract theory allows for the formulation of convincing assumptions describing a model of the social structure in a country. Thus, it is used for diagnosing and formulating conclusions about methods of shaping security. An important indicator of the role played by the contract between individuals is the difference between the natural state and the political state, or the application of the principles of justice. Thomas Hobbes highlighted the significant dichotomy between these states. And so, in the state of nature there is no law that would allow for meeting the needs of an individual, which would not interfere with the same rights of another individual. Everyone has the right to freedom (or rather liberty) without any restrictions. In this case there is a conflict of individual interests that are derived 55 KRZYSZTOF DRABIK from the right of everyone to everything. On the other hand, having no restrictions to the natural law would initiate a war of all against all. Hobbes' dichotomy between the natural state and political state emphasises the importance of a legally authorised agreement between individuals. The agreement is primarily intended to eliminate the imperfections of the natural state, i.e. to restrict the rights of everybody to everything1. The category of freedom is defined in another, let's call it a social (community), dimension. The point of freedom lies in its limitations, which are the areas of freedom of other individuals. The social contract organises the structure of a community of individuals. They formulate a set of rules for interconnected functioning on individual and institutional levels. The scope of the contract includes the process of creating security for individuals and the entire political community. Only in a legal system that is based on the initial contract, does the principle of justice comes into force, and it covers the whole of social functioning. The theory of justice as the basis for the creation of a well-organised social system The American philosopher John Rawls used the social contract theory to construct a theory of justice. It seems that social contract theories are adequate for the construction of social, ethical, political and other theories that consider a social community to be the basis for scientific reflection. The social contract allows us to determine the so-called primary principles that become points of reference for further regulations of functioning social communities. Rawls used the social contract theory on purpose. For him it represented a good starting point for the formulation of the primary principles of justice in the so-called initial situation. The contract allows one to develop a consensus whether it concerns the principles of justice, or the functioning of the legislative, executive, judicial branches of the state or the functioning of other state institutions. And so, legal principles in the social contract theory are devoid of an origin a priori. In his attempt to design a theory of justice, Rawls chose the social contract path, which has become the primary method of determining the principles of justice. In this approach, the importance of justice has a significant impact on the direction of the shaping of security, which lasts as long as the individuals follow the rules adopted in the initial situation. Thus, security is closely related to the structure of the primary rules set by the social contract. Failure to comply with these principles shall initiate risks and have a negative impact on the continuity of the existence, survival and development prospects of security subjects. 1 Locke's dichotomy has a less expressive form. The rule bellum omnium contra omnes is not in force, but the imperfections of natural state result from the need to overcome the principle nemo iudex in causa sua. 56 SECURITY IN SOCIAL CONTRACT THEORIES One should take into account the fundamental reservation about the substance of the principles established in the social contract. These rules are the result of a collective consensus, i.e. of such an agreement that may be accepted to an optimal degree by all individuals. It is not an easy task because of the differences that identify the specific and individual personality, life experiences, and existential circumstances of each person. Rawls shows the importance of such diversity and proposes, adequately to the strictly philosophical nature of the social contract theory, a solution that seems to be far from a practical implementation. It involves the application of the so-called veil of ignorance when determining the primary principles of justice. The veil of ignorance allows individuals to take a break from the sociological situation in which they are at the moment. It means a primary nullification of their social and professional status, their positions and roles they play in the social structure. This creates the initial situation, where people are a relatively isolated set of elements, independent of circumstances and relationships of a sociological origin. Such "sociological insulation" allows us to create an initial situation where the possibilities of using private class interests, professional interests etc. in determining the primary principles of justice are limited. No one is guided by the so-called class interests when formulating a principle of justice that is characterised by impartiality. Thus, the concept of justice as impartiality is a public concept: covering society as a whole, regardless of the natural differences between individuals. As emphasised by Rawls, "a society is well-ordered when it is not only designed to advance the good of its members but when it is also effectively regulated by a public conception of justice"2. The consequence of the author's philosophical reflection is to derive practical principles of justice from the abstract idea of human intuition, as the power to express judgements that are arbitrary but significant in its effects. Here, the abstraction realm expressed in judgements a priori pervades the practice of social life in the form of general principles of justice. It is the transition from theory to practice. The initial situation and the veil of ignorance are the theoretical foundation of the theory of justice as impartiality. Thus, Rawls's theory, as well as the long tradition of social contract theory, reflects the power required for the formation of social practice. The need to move from theory to practice, especially in concepts of social structures was expressively articulated by Jürgen Habermas: "No theory and no enlightenment can take off our shoulders the burden of the risk of involvement in one of the sides and the unintended consequences of this involvement. Attempts at emancipation, which are also attempts to implement the utopian content of cultural traditions, can be interpreted as a practical necessity, pointing to the conflicts generated by the system (which must be explained by theory) and the avoidable suffering and repressions"3. Habermas's observation sits 2 J. Rawls, A theory of Justice, translated by M. Panufnik, PWN, Warszawa 2009, p. 31. J. Habermas, Theory and Practice, translated by M. Łukasiewicz, Z. Krasnodębski, Państwowy Instytut Wydawniczy, Warszawa 1983, p. 62. 3 57 KRZYSZTOF DRABIK well with Rawls's writings on social theory. In an initial situation, it is better to adopt the principles of justice by an agreement and to implement them in practice, than to suffer because of the undetermined fundamental principles that should be the basis for a well-organised society. It is not enough to adopt by agreement a certain state model (social and political institutions). First, basic principles for their operation must be formulated. Then the social and institutional structure of the state will be well organised. The social contract theory provides a description of the origins of the state. It is a legitimate institution as long as it is based on an organized social structure; the state is the people who constitute it. The situation is no different from the socialtheory-based theory of justice as impartiality by Rawls. Principles of justice are not the product of an external entity, they are the result of an agreement between people in the initial situation. The social contract theory is thoroughly imbued with humanism and it is far from non-human justifications. Therefore, it is people who constitute the state and the rules for its functioning, they also are responsible for the continuity of the state and its development. This significant attribute of the social contract theory was highlighted by Thomas Hobbes in the following words: "Though nothing can be immortal which mortals make; yet, if men had the use of reason they pretend to, their Commonwealths might be secured, at least, from perishing by internal diseases. For by the nature of their institution, they are designed to live as long as mankind, or as the laws of nature, or as justice itself, which gives them life. Therefore when they come to be dissolved, not by external violence, but intestine disorder, the fault is not in men as they are the matter, but as they are the makers and orderers of them"4. The security principle in the tradition of the social contract The initial situation derived by Rawls from the tradition of the social contract in order to formulate a theory of justice as impartiality is an important interpretation of the reflection on the security problem. The deductive method and the high level of abstraction of the social contract discussion provides a basis for the formulation of assumptions and theses that will also determine human existence, survival and development. It should be emphasised that the adoption of the primary rules in the hypothetical initial situation can adequately reflect the method of reasoning in search of safe forms of existence. This is about transferring the social contract method onto the broader platform of security considerations. In the social contract tradition, state-building concepts prevail, in which the hypothetical state of nature gives way to a rational agreement that includes basic functioning principles of a social (political) community. Legal norms, institutions, 4 58 T. Hobbes, Leviathan, translated by Cz. Znamierowski, PWN, Warszawa 1954, p. 285. SECURITY IN SOCIAL CONTRACT THEORIES power - all these are the product of an agreement between individuals who are aware of the fact that greater benefits can be achieved in a political society than in the atomised state of nature. In the history of the social contract concept there are two mainstreams, which, on the one hand, present a strict state-building character (the theory of Hobbes, Rousseau, Locke), while on the other hand, illustrate the ethical dimension, which appears in Rawls's theory of justice. I call the first one - the social-contract-trend, and the other one - the pre-social-contract trend. From the philosophical point of view, we can see here a hierarchy, a process of deductive analysis, of transiting from the ethical matter (general) to the political matter (specific). Formulation of the theory of justice in the initial situation is the first step to create other agreements of political provenance. And so, the method of creating a socio-institutional state depends on the adopted initial criterion, which is the theory of justice as impartiality. This ethical initial basis introduces the parties to the next stage of social contract tools. As previously mentioned, the primary theory of justice and the secondary theory of the social contract are differentiated by the degree of abstraction. While traditional political agreements could be considered to be abstract, the theory of justice presents a higher level of abstraction. Importantly, the criterion of abstraction concerns the method of reaching a consensus, which results in a certain social contract. The content of this agreement is by all means of a practical nature. This distinction highlights the common ground for theory and practice. It's about finding a theoretical method to determine the initial principles that should be in force in a well-organised society. Morality as a regulator of the functioning of social groups is the foundation for other regulations – legal, economic, political, cultural etc. So the ethical pre-socialcontract trend lays down rules for the classical social-contract-trend. This observation is important when defining security based on the theory of the social contract. So how do we combine the reflection on the ethical and political mainstream with the general theory of human security? Security in philosophical terms is a dignified form of existence, which allows survival and the continuation of this existence. It is necessary to specify the elements contributing to the creation of a dignified existence form. With regard to the social contract theory, a dignified existence form is shaped by the implementation of ethical principles of justice and social contract related sociopolitical agreements. The desired level of security is achieved by a man on the ethical and socio-political basis. Security is genetically related to ethical and social principles. Development of security is not possible without the adoption of an ethical and socio-political context. In this perspective it seems reasonable to distinguish a third trend in the tradition of the social contract - the post-socialcontract trend where security is a general result of the consensus reached by parties. 59 KRZYSZTOF DRABIK Development of human security is a rational act of changing the environment and one's dispositions in such a way that it covers the needs for existence, survival and development to the utmost. So, it is not a process independent from individual intentions5. In reflecting on security, the subject, his choices and rational volitional acts are the important factors. Rawls brings the realm of morality, as an evolving social and natural phenomena, to a rational ethical contract, which is a specified and primary point of reference for secondary social and political contracts. The primary and undefinable morality in view of the theory of justice is gaining a particular ethical dimension. From multi-faceted moral judgements, the parties negotiate precise primary rules for further, more detailed, contracts. Thus, ethics is the foundation for regulations of the social structure, for both righteous institutions and righteous human deeds. The pre-social-contract ethical principle shapes the social-contract political principle, which in turn creates an area of human security within a post-social-contract principle of security. A secure (dignified) existence form and development of an individual is possible on an ethical and political foundation. The abstract hierarchy of these principles is presented below: The pre-social-contract principle (the theory of justice as impartiality) the need for security morality The social-contract principle (the theory of the social contract) The post-social-contract principle (the principle of security) In this approach, security as a rational and practical act of creating safe existence, survival and development is a secondary element to the ethical and political contract. There can be no security without ethical, social and legal foundation. Similarly, you can not refer to principles of justice, if no laws are in force (natural and positive). This ontological hierarchy is presented in social contract theories, among which the most expressive one is the theory of Hobbes. The natural state is a war of all against all, no one can feel safe. Only the 5 I leave out here the factors of randomness and random natural forces, which are the determinants of security beyond the control of human activity. 60 SECURITY IN SOCIAL CONTRACT THEORIES establishment of legal norms on the basis of a contract between an individual and his sovereign and other individuals creates a safe form of existence. Hobbes confirms the thesis that the social-contract principle is primary to the security principle. Security in a psychological and praxeological sense The concept of security as a human need should be distinguished from the concept of security as a practical effect of human activities. The natural need for existence and development is primary to other higher-order needs. The need for security is an integral part of existence and regardless of external circumstances, it directs the way an individual acts. Also in the state of nature, individuals seek to maximize security, but due to the lack of a normative system, or the non-genuine implementation thereof, the need for security is not satisfied adequately to the actual expectations. Security perceived as a need defines the motivational realm and provides the basis to take adequate steps to satisfy this need. From the point of view of our discussion, the practical dimension of security is important in the form of actual regulations regulating the dignified form of existence and the development of an individual. The practical trend in defining the concept of security leads to the satisfying of the security needs by the pre-social-contract ethical principle (the principle of justice) and the social-contract socio-political principle. The need for survival and development would be possible to implement in a hypothetical world of atomised individuals, whose areas of freedom have no points of contact. In this case, ethical, social, and political principles, and finally principles of security in the described sense would not play any role in the life of autonomous individuals. However, the aim is to establish such a normative system (security system), which takes into account the natural social dispositions of individuals and the interpenetration of areas of individual freedom. Locke interestingly presented the issue of autonomy and the inevitability of the conclusion of the social contract. When individuals can make use of free natural resources for example by adopting new areas of land for cultivation, it is not necessary to comply with contractual standards. However, when natural resources run out, then it is necessary to establish rules for the distribution of these resources. The core of social contract theories is the assumption a priori about the need to create organised social structures which, by their nature, but also because of the objective situation, strive to create a safe system of interdependence. These interdependencies are typical for every social community. The aim is for the social system to be safe, and it can be achieved by consensual agreement on ethical and socio-political grounds. 61 KRZYSZTOF DRABIK Conclusion An important ascertainment in the reflection on security, in view of social contract theories, is the thesis that the primary need for human existence, survival and development is determined by the post-social-contract security principle. And so, the need for safe existence and growth takes an actual real form in arrangements of the ethical and socio-political dimension. The will to survive reaches its apogee in the social contract that creates an area of collective security. The signatories of the ethical and socio-political contract satisfy their primary need for security in real conditions of collective existence. Here, the primary need is satisfied in the practice of the social creation of security. The desire to exist, survive and develop finds its form in security contracts. The ascertainment that defines security as a post-social-contract element makes the concept of security more psychological and sociological in nature. Security in the perspective of social contract theory has two meanings: personal and structural. This includes both an individual and institutional dimension of safe existence and development. In a social structure, personal individual rights to be safe are important, as well as a system of just institutions, creating structural environment of security. The post-social-contract principle indicates the unidirectional nature of the shape of security. It concerns the initial conditions in the process of creating security. As already pointed out by Aristotle, a person can become fully operational only in a self-sufficient institution such as state. A state satisfies all human needs and to go beyond the jurisdiction of the state means to fall beyond the security area, not only the structural, but also the personal security area. An individual outside the social structure is not safe, not only because of the lack of self-sufficient and protective institutions, but primarily because of shortage of psychological stimuli. The phenomenon of social isolation is not just about a hypothetical situation of existence outside a state, but it concerns the actual situation of many people, living in a society, but suffering from their inability to satisfy their need for affiliation. Thus, being a member of a social group has a strict psychological grounding and it creates a naturalistic justification for the legitimacy of social contract concepts. Primary social dispositions, even in the form of affiliation needs, create the initial dispositions of individuals to be a party to the social contract. These dispositions are conducive for the formation of security that reaches its optimum in the social structure created on the basis of an ethical and socio-political contract. 62 THE BUILDING OF KNOWLEDGE CAPACITY IN THE NATIONAL SECURITY SYSTEM NDU Scientific Quarterly no 4(89) 2012 Lt. Col. Jarosław JABŁOŃSKI THE BUILDING OF KNOWLEDGE CAPACITY IN THE NATIONAL SECURITY SYSTEM Abstract Despite indications in the National Security Strategy of the inter-exchange of experiences as part of the integration of security systems, the Lessons Learned System has only the Ministry of Home Affairs (The Bank of Best Practices in the Police) and the Ministry of Defence (The Polish Armed Forces Lessons Learned System). However, there is not a national system (structure, process, tools) that could integrate all national security entities through a process of knowledge sharing. Structure dedicated professionals in the structures of national security entities using a unified knowledge management process and modern communication technology can play an integration role of national security entities by building capacity in the area of national security. Key words – national security, knowledge management systems, lessons learned system Introduction The ability to process large amounts of information (knowledge), obtained as a result of activities in the field of national security has increased significantly since it was decided to start using in the process of information systems. Recently, it has been more evident that the belief that in addition to an exclusive collection of dry data and information, and the subsequent analysis of the entities responsible for maintaining security, it becomes necessary to achieve progressively higher and higher levels in this area, by the merger and subsequent use in practice of two key factors. Theoretical knowledge and experience nurtured by the work (service) in units of national security. Both of these ingredients, when they are integrally linked in an inseparable whole and continuously updated will have an increasing impact on the security of each state. Unfortunately, experience shows that very often a large part of the theoretical knowledge and previous experience is irretrievably lost because of the routine treatment with standard methods and tools for knowledge management. Practically since the mid-1990s, the degree of participation of military structures responsible for the security of the Polish crisis, conflict and military operations has been increasing. One of the desirable effects of this is the generation 63 JAROSŁAW JABŁOŃSKI of an unprecedented amount of observation and experience acquired by the staff of these structures. At the same time it becomes a major challenge due to the fact that knowledge and experience acquired as a result of daily practice are located almost exclusively in the minds of the staff of the national security structures. Hence, it becomes very difficult or even impossible to collect, manage, and transfer the need for security policies and provide for the next generation. The vast majority of information collected is too often irretrievably lost, causing the frequent repetition of the same mistakes in the practical realisation of the next national security policy objectives. The large fluctuations of personnel in the security structures are a natural process. For instance, one of the most common reasons for the resignation of the most experienced security staff is significant physical exhaustion, as a result of the service (work) in very serious and complex conditions. When we add, the general reluctance of young people to the wider bureaucracy (and as such they consider including the creation of procedures, training programs, reports, proposals, studies, etc.), resulting in activation of the mentioned factors, we will receive a significant cause of the loss of the wider potential in national security structures. In addition to the material potential (in military terms it is called a combat potential), a significant component of the value of each structure responsible for national security and one of the major elements of its characteristics is the intellectual potential. Hence, the members of structures implementing national security policy objectives at the tactical level, very often acting in a hostile and isolated environment in terms of safety and time constraints, must temporarily and independently make decisions of varying difficulty and complexity, based only on their own knowledge and their intellectual potential. This process can take place through appropriate techniques and methods of knowledge management and can be distinguished by the Lessons Learned System (LLS). The LLS has a relatively short history, dating back to the early 1990s. The need for the development of knowledge management was first seen by consulting firms, treating knowledge as a product. They quickly began to create a repository containing the experience and expertise of their consultants, in such companies as: Knowledge Curve (Pricewaterhouse Coopers) Kworld (KPMG), Knowledge Xchange (Andersen). Over the next few years, the knowledge management process found a permanent place in the structure of the U.S. military and NATO. In the meantime, because of the enormous development of information technology, the creation of knowledge management systems was a natural result. National security elements, using knowledge management systems supported by new technology, helped to avoid some mistakes. This type of problem while taking care of knowledge from national security activities was also faced in the Polish defence system by Armed Forces. The Polish Armed Forces must be able to manage large volumes of knowledge and information inside their structure and outside to the NATO LLS. There was the 64 THE BUILDING OF KNOWLEDGE CAPACITY IN THE NATIONAL SECURITY SYSTEM urgent need for the development of a process of using experience, to be able to enhance the efficiency of national security. This meant forcing the Polish political and military decision-makers to focus on the creation mechanism of drawing conclusions from the experience gained so far, mainly in order to achieve a higher level of management reporting to national security structures. Development of appropriate processes and creating effective mechanisms for implementing lessons requires a comprehensive engagement in the entire country with all national security actors. Interdepartmental cooperation, based on the relevant exchange system will allow the increase of the level of their performance in the framework of the Polish security system. One of the significant positive effects of this system is the building of the LLS, which should support the saving of time and money for all those involved in the future of the national security system. None of the national security entities (Police, the Polish Armed Forces) has LLS with leading characteristics and cannot be considered as a standard tool. However, the process of LLS creation has started. Although it still requires the development of many more organisational projects, in order to obtain the required quality. So, there is a kind of indisputable need for the experience of countries that already have such systems, in the final phase of construction of the Polish National LLS (POL N LLS) to use the experience to achieve the expected results. One of characteristic feature of the present time is the rapid development of the IT sector, with particular emphasis on the use of networked interactive cooperation. It provides some kind of universal access to the means and methods of data collection, processing, and exchange of experience. It means that they are distributed with rapid access to the information. A properly designed and build LLS may allow wide access by the security structures and security Subject Matter Experts, in order to achieve some level of synergy in improving national security policy. On the other hand, digitisation does not solve the problem. However, it can allow the efficiently and timely exchange of experience between national security organisations. This kind of approach will be legitimate to draw attention to the use of LLS as a knowledge management tool, in order to obtain the improved efficiency of security policy. During the world economic crisis, when many countries started to look for an increase in the efficiency of their own security systems, knowledge management tools and the integration of security structures were common practices. An appropriately added LLS could help to achieve the next level of integration of distributed safety systems, which is required both by politicians and security agents, realising their specific goals. The modern LLS relies on electronic systems, allowing a quick exchange of knowledge between policy makers establishing the scope of security policy goals and the providers of these goals. It is essential to obtain information superiority and to create the right conditions for conducting high-quality, network-centric national security policy. It is therefore important that 65 JAROSŁAW JABŁOŃSKI the actions of each player in the national security system, characterised by farreaching synergies arising from the cooperation, are based on the joint use of the knowledge acquired within the National LLS. Current status The current "National Polish Security Strategy" from 2007 (SBN 2007) draws attention to the state decision-making bodies and the use by them of all available opportunities aimed at improving the safety and integrated approach to the national security system. Hence, the integration of national security has to be based on: competencies, skills and expertise of people working in the various sub-systems, interdepartmental cooperation in scale, tightening the bonds of alliance and implementation of solutions for workforce management and the use of interinstitutional exchange. Although SBN 2007 has a very high level of generality, the creation of the Integrated National Security System (INSS) indicates some factors determining the efficiency of an integrated security system. The exchange of knowledge between security organisations efficiently is one of the five determinants of an efficient integrated national security system. Additionally, the sharing of knowledge in the field of security allows the harmonisation of military cooperation and civil entities of an integrated national security system. What is more important, we have three areas of national security, nine sectors and more than 30 entities dedicated to work in an integrated national security system. It is advisable at this point to draw attention to SBN 2007: “(...) a fully integrated national security system requires (… the state to ...) continue to improve communication between all elements of the system, and thus the existence of the requirement to integrate all those national security by means of modern communication.” Returning to the efficiency factors of an integrated national security system, the process of exchange of expertise and experience between the elements of the national security system must be made not only in one particular area but also between the same parties of the security sector, as well as the end of the entire security system. It is vital for the security management subsystem, which should be based on mutual trust between the people working (serving) in its structure, who have to have both access to the knowledge databases and rights to share their knowledge. Stanislaw Koziej pinpointed what “(...) should be especially strongly emphasised is the need for an integrated civil-military approach to the construction of national security management system (...) the era of an exclusively specialised departmental approach has long since ended. Thinking in terms of government departments is perhaps appropriate in other spheres of activity of the state, but not in regard to security. (…).” 66 THE BUILDING OF KNOWLEDGE CAPACITY IN THE NATIONAL SECURITY SYSTEM For such purposes at the national level it is time to build an inter-agency structure working closely to the state’ decision-maker and holding together the whole strategic effort of national security instruments. When considering only one of the factors in the smooth functioning of an integrated national security system (inter-institutional exchange of experience), it turns out that there is a requirement of the exercise of administrative, organisational and proper approach in the field of interpersonal relationships (i.e., willingness to share such negative experiences). The proper functioning of an integrated national security system is first necessary for harmonious co-operation based on knowledge management within a single subsystem (i.e the utilisation of the Armed Forces experiences) and after that to achieve the same quality level in interagency cooperation and finally at the strategic and political level. As was mentioned above, the feature belongs to the multi-stakeholder approach to national security, the process of building and integrating security subsystems, including the system to use the experiences. Integration of national security entails a need for a broader type of action to transform existing structures, policies and rules that should be focused primarily on improving its efficiency. At the end of SBN 2007 the authors point to the need for the transformation of the security system and subsystem targeting both national security and the military executive subsystems to the level of multi-department. This process required the development of the Polish security system and entailed the introduction of various integration activities involving all safety system entities. As a minimum is should include: integration management system (at all levels), professionalization of specialised subsystems and widespread regulations for the safety of the preparation (activation of the local authorities). Particularly, the integration of management systems in the national security system in accordance with the views of Stanislaw Koziej should be accelerated and include: (...) a higher level of consolidation, namely integration in the sphere of national security – a unified opposition to any threat (military and non-military, internal and external – and capture opportunities, take on challenges and reduce risks in all of these dimensions), with the system using all (military and civilian) resources of the state. Integration of multi-stakeholder security system becomes one of the new challenges of the security system. However, maintaining a uniform direction in ensuring the safety of the security held by a multi-stakeholder system requires the organiser to carry out periodic reviews. Therefore, many countries have decided to organise a strategic review of national security, as a tool for verifying the security of its policies and to identify future directions of its development. Another common point with the Polish National Security Planning (according to SBN 2007) is the requirement of transformation processes in all national security instruments. In accordance with “The Polish National Strategic Review” (2011) the transformation process is indicated as a strategic objective of the authorities and public administration. The main determinant of the transformation is the permanent 67 JAROSŁAW JABŁOŃSKI changing of the security environment. The transformation required the activity of all national security subsystems with the main focus on the transformation of the military subsystem. Just as was the case in SBN 2007 in the exchange of experience, the SOP 2011 emphasises the importance of Transformation is a longterm process, using advances in technology and modern methods of management and control of the armed forces. The following tools are used in transformation: the development of new concepts and their verification through experimentation, defence planning based on the development of skills and experience to use the system. Both, SBN 2007 and “The Polish Defence Strategy of 2009” (SO 2009) pointed out on the exchange of experiences as a significant part of the national security transformation process which have to take place in military instruments. There is an unquestionable need to carry out the future development of the armed forces (transformation) and it has to support knowledge- based activities. Such an approach requires military and civilian decisions taken by the government, which will include searching appropriate mechanisms and procedures for harmonising the activities of all entities involved in security operation on strategic, operational and tactical levels. The Polish Armed Forces LLS The Polish Armed Forces Lessons Learned System (AF LLS) has been initiated with the development of “The First Strategic Defence Review” in 2007. Despite the existence for many years in the AF LLS of reporting mechanisms using After Action Procedures it was found that there was not proper promotion of, and sometimes even negligible, experience sharing and observation from the participation of Polish Armed Forces in military operations. The process of collecting applications and the experience of the work carried out, both analytical and planning, working on the introduction of the Armed Forces resulted in some residual system solutions. The lack of a systematic approach caused in certain Ministry of Defence structures a decrease of efficiency of functioning. The major reason for such a situation was a lack of dedicated structure for knowledge management in the Ministry of Defence and what is more important the limited use of modern knowledge management tools. The Armed Forces LLS construction started in parallel, leading the legislative, regulatory documents, including creating and conducting an analysis of already existing systems in the world. Legislative work was based on the Organisational Regulations and Defence Development Programme of the Polish Armed Forces in 2007-2012. The basis of the system construction was issued by the Chief of the General Staff, Polish Army, in an order dated February 2007, which was the first formal 68 THE BUILDING OF KNOWLEDGE CAPACITY IN THE NATIONAL SECURITY SYSTEM step in the construction of the so-called The System of Collection and Dissemination of Experience (SCDE). The order stated the Deputy Chief of the General Staff of the Polish Army was the primary supervisor of the implementation and operation of the SCDE, with particular emphasis on the participation of the Armed Forces in military operations outside the country. It is assumed that there is a need for an annual assessment of the effects of the system, with the main emphasis on the identification of military operational areas requiring further improvement. An important part of that order was to include into the SCDE process several departments of Defence: Transition, Budget, Foreign Affairs and Military Armament Policy. Hence, for the construction of the theoretical assumptions of the system the National Defence Academy was actively enrolled. The first phase covered 2007 and consisted of the collection and dissemination of conclusions and experiences of the Polish Military Contingents (PMC) abroad. At the tactical level abroad, military units identified problems and experience and deployed applications in three areas of interest: operations outside the country, training and exercises. From 2007 the SCDE system did not have a dedicated organisational structure to perform the tasks, the participants in the system were all organisational units of the Armed Forces, supervised by the Training Branch (P-7) of the General Staff. In the second phase, implemented in 2008, there was an expansion in the number of system’s areas of interest and the range of data collection from national and international training and ongoing military operations. The next step was to establish, by order of the Chief of General Staff (August 2008), a Working Group with the main responsibility to prepare, organise and implement the modern AF LLS. The Working Group developed the "Concept of AF LLS," which contained a main development direction of the system based on both a full-time and training structure and unified LL process. The Concept was released on 17 June 2009 by the Chief of General Staff, with the previous changes in the SCDE to the LLS, and what is more important additions in order to determine the national usability. Hence, the Concept made a strong impetus in the AF LLS for the interdepartmental cooperation in the national security system and the NATO LLS. In order to maintain interoperability with NATO LLS, the development of the AF LLS was based on the guidelines contained in the policy documents of the Alliance (Bi-SC Directive Lessons Learned (LL) Directive 80-6 and NATO Lessons Learned Policy). Furthermore, in accordance with the recommendations contained in the "Vision of the Polish Armed Forces - 2030", for responding to urgent requirements for improving the operational capacity of the AF and how to carry out the process of the unification of analytical research in the Armed Forces, the AF LLS is a system corresponding to the above recommendations. According to the normative documents, improving the functioning of the AF in times of peace, crisis and war in the light of experience is the main goal of AF 69 JAROSŁAW JABŁOŃSKI LLS. The result of the application of LLS in the Armed Forces should be a formal change in the areas of operational capabilities. The utilisation of the result of the LL Process (LLP) is implementing changes in the following functional components: D – doctrine, O – organisation (structure), T – training, M – armament and military equipment, L – Leadership, P – staff, F-infrastructure, I – interoperability. The national structure for AF LLS was supervised by the Deputy Chief of the General Staff, and since 1 January 2012, when it reached full operational capability, the Doctrine and Training Centre of The Armed Forces (DTC AF) in Bydgoszcz. Additionally, the Centre performs the function of the organiser and coordinator of the system and is responsible for conducting the Armed Forces LL Central Database (CBD). According to the doctrinal documents the process of building on experience was based on the assumptions used in the NATO LLP. Identification of the observation begins the process of building on the experience. The LL cells report observations of a need to make changes in the areas of interest. The observations are consolidated and approved in the form of research problems and are included in the Priority Requirements Analytical List; classified with a fixed priority (called the Prioritised List of Analysis Requirements). Observations of changes needed to be made in areas of the strategic-level military structures are reported to Chief of General Staff by the DTC AF by organisational units of the Ministry of Defence cells inside the General Staff, Armed Forces Operational Command, Command of the Armed Forces, the Armed Forces Support Inspectorate, Inspectorate of Military Health Service and the Military Police Headquarters. The analysis process consists of five phases designed to translate an observation into lessons learned. On the national level each phase is implemented by the Department of Dissemination Applications and Lessons the DTC AF. After the initial phase, the Chief of General Staff (or the Operational Command Commander or respectively by the Commander of the Armed Forces Service Branch, the Support Inspectorate of AF, the Commander of the Military Police, the Inspectorate of Military Health Service, the Inspectorate of Military Health Service) accepts a final report submitted by the Chief Executive Board of the DTC AF. Additionally, this phase determines, or makes it, the responsibility of the parent institution of the Contractor to assign appropriate corrective actions. The second phase is carried out to determine the effectiveness of corrective actions and determine whether the observation need of the LLP has been eliminated in accordance with the successive stages of the process, including corrective actions. The Verification may require additional examination in order to correct and achieve the effectiveness of planned corrective actions. Implementation of the second phase of the cell also indicates the use of experience. The process also participates in another part of the structure of the DTC AF: the Experiment and Implementation Branch, or in appropriate cases at the request of the head of the cell. It uses the experiences of different organisational unit (internal) of the AF. 70 THE BUILDING OF KNOWLEDGE CAPACITY IN THE NATIONAL SECURITY SYSTEM The completion process is to implement changes, which improve operational capabilities (solving the problem). The LLS is supported by computer software at all phases of process management, database management and dissemination of experiences. The LLS personnel acuities and the DTC AF cell perform their tasks based on the work plan for the year, which is draw from the Priority Research Letters (created once a year and verified every six months). The Priority List is approved by the Head of Research of the DTC AF. The General Staff is reported to the DTC AF about proposals of research problems and informed about all national and operational levels of MoD institutions. At the operational level the Priority Analysis List is approved by the appropriate operational level commander. The list is drawn up on the basis of observations and proposals for research problems raised by internal units Command (Inspectorate Headquarters) organisational units subordinate to the tactical level (including sections' and specialists' experience) and senior managers. The way to implement the identification of problems and experiences, and the implementation of remedial programs specifies all structural elements, such as functional Operational Commander of the AF and is supervised by the DTC AF. The cooperation at the MoD level consists of four areas: a transformation cooperation with the department for a proposals preparation in order to reach the requirements of the Priority Analysis List (developed by the DTC AF); the DTC AF cooperation with the stockholder of the project; as requested, a share of information contained in the CBD AF LL Armed Forces; and as required, and use of expert knowledge and the exchange of information on ongoing projects. The Polish AF dedicated structure consists of three levels. At the strategic level is the Dissemination Division of Applications and Experiences in the DTC AF. At the operational level (Land Forces Command, Headquarters Air Force, Naval Command, Special Forces Command, Operations Command, Inspectorate Support of AF, Military Health Service Inspectorate, Military Police Headquarters) there has been organised since 2008, a Branches and Departments Use of Experience. At the tactical level in the initial period (2008-2010), is an almost not existent dedicated structure of the AF LLS. Tasks resulting from the implementation of the tasks in the AF LLS at the tactical level are carried out in departments responsible for training. 71 JAROSŁAW JABŁOŃSKI Conclusion At present The Polish Armed Forces are a leading player in the security system for the construction site and the development of their intellectual potential. Becomes justify continuation of this process to the next phase to create such a platform for mutual cooperation of security entities, which will enable the fast exchange of experiences and the implementation of all stakeholders, including the military and non-military. With respect to our country it is very important, that despite the many projects involving the Polish system, still the use of experience differs from the standards experienced by more experienced countries, although the analysis shows that the use of the implemented Polish system already shows dividends. Also, the economic crisis that gripped our country, means that the resources devoted to security are unfortunately limited. Hence, building the National LLS, which in itself does not require large amounts of money, and, under the requirements of today's global political realities must find support among the decision-makers in whose favour it will operate. It is also necessary to further modernise, and as the present needs of the development of new procedures, mechanisms and tools that will enable a more efficient use of knowledge in strengthening the security of Poland and its citizens. Each system, including even the best acting in the national security community has a certain amount of chaos. Hence, the need for an overarching structure for the coordination of interaction processes, which therefore can be more effectively used by the leading security policy. And the meaning of Experience Exploitation System (SWD) is best illustrated by comparing it to one of the many links in the chain called "the Polish security" while observing the rule paraphrased William James, "a chain is only as strong as its weakest link ...". Therefore, in the interest of every citizen of our country it should be that SWD, as one of the many links of the national security system, gets stronger. However, even the greatest knowledge management systems, which have the largest current information processing capabilities and the best performance indicators are virtually useless if they are not sufficiently reliable. Even the best system, if it has cyclical failures, is worse than the one that works reliably, although it is inferior in terms of performance. Specific requirements for a system involving the use of experience, working for national security, should be based primarily on well-designed knowledge management processes. Bibliography Atakujcie wroga wiedzą, „Gazeta Pomorska”, from 10.12.2011. Błaszczyk J., Cenne Doświadczenia, „Polska Zbrojna”, Warszawa 2011, issue 17. 72 THE BUILDING OF KNOWLEDGE CAPACITY IN THE NATIONAL SECURITY SYSTEM Czajkowska M., Jak ulepszać armię? Zdecydują w Bydgoszczy, „Gazeta Wyborcza”, 10.12. 2011, Warszawa 2011, issue 11. Fiderek W., System Wykorzystywania Doświadczeń w Wląd, “Przegląd Wojsk Lądowych”, issue 2, Warszawa 2012. Huzarski M., Zmienne podstawy bezpieczeństwa i obronności państwa, AON, Warszawa 2009. Koziej S., Obronność Rzeczypospolitej Polskiej w latach 1989 – 2009. Koncepcja Systemu Wykorzystywania Doświadczeń Sił Zbrojnych RP, Warszawa 2008. Koncepcja Rozwoju Systemu Wykorzystywania Doświadczeń Sił Zbrojnych RP, CDiS, Bydgoszcz 2009. Liedl K., Transektorowe obszary bezpieczeństwa narodowego, Warszawa 2010. Misiuk A., Z Problemów Bezpieczeństwa. Policja z zagrożenia globalne, Chojnice 2010. Malec M., Strategiczny Przegląd Bezpieczeństwa Narodowego, Strategia Bezpieczeństwa Narodowego, Strategiczny Przegląd Obronny – ich zakres i cele. „Bezpieczeństwo Narodowe”, issue 1, Warszawa 2011. Strategia Bezpieczeństwa Narodowego Rzeczypospolitej Polskiej, Warszawa 2003. Strategia Bezpieczeństwa Narodowego Rzeczypospolitej Polskiej, Warszawa 2007. Strategia Obronności Rzeczypospolitej Polskiej, Warszawa 2009. Strategiczny Przegląd Obronny 2010/2011 – 2011. Wizja Sił Zbrojnych RP 2030, Warszawa 2008. Zięba R., Zając J., Budowa zintegrowanego systemu bezpieczeństwa narodowego Polski ekspertyza, BBN, Warszawa 2010. http://www.bbn.gov.pl http://www.cdis.wp.mil.pl http://www.e-wspol.edu.pl 73 NDU Scientific Quarterly no 4(89) 2012 ANDRZEJ ZAPAŁOWSKI CHALLENGES TO THE SECURITY OF POLAND RELATED WITH THE REGIONALIZATION OF UKRAINE Andrzej ZAPAŁOWSKI, Ph.D. Uniwersytet Rzeszowski Abstract The article discusses the relevant safety of the Polish political and social conditions in Ukraine, which may significantly increase the instability in Central Europe in the near future. At the moment, Poland, as in the past, being kind of the geopolitical lock limiting Russia’s influence to Central and Eastern Europe, is particularly vulnerable to various measures. Russia, in deliberately and consciously way, is rebuilding its empire to establish the privileged position in Eastern Europe. The current Kremlin’s actions are slightly alarming, since they are taking place in the time when the NATO and the European Union, on which the Polish fundamentally security is based, are becoming weaker. Taking into consideration the rapidly changing situation by the Eastern Polish Border, there are necessary actions to take, which will redefine the policy of the Polish National Security as well as by influencing the European Union and the NATO, will allow us to maintain our position in Central Europe In the face of varying international situation, it is required to change the essential establishment of the National Security Strategy in favor to Poland. Key words – security, Poland, Ukraine One of the paradigms of security is predictability and surprise, as well as the constant variability of the geopolitical conditions, especially in the regions with highly variable borders. There are no stable states, no stable alliances, no durable strategies, especially in terms of the geopolitical conditions of Poland. In this case, the issue of adapting the Polish security strategy to those changing conditions is of crucial importance. Apart from the Balkans, it is mainly Central-Eastern Europe that has been the area in Europe with many changes in borders over the last two hundred years. The purpose of this article is to present the main challenges related with the possible 74 CHALLENGES TO THE SECURITY OF POLAND RELATED WITH THE REGIONALIZATION OF UKRAINE changes of the internal situation in Ukraine, and their influence on the state of Polish security in terms of the strategic shield1. The text below constitutes a general analysis of the geopolitical situation in Ukraine, and indicates the possible scenarios for the development of the situation in that country. Naturally, the most favourable situation for Polish security would be the maintenance of the current state and territorial structure of Ukraine. However, Polish state interests require that the suitable steps related with state security are taken on the basis of the possible, and in some cases – probable, scenarios of events in Ukraine. A shift in the geopolitics of security in Eastern Europe After the collapse of the Warsaw Pact, and later – after Poland joined, in institutional terms, the North Atlantic Treaty Organization, the geography of international security in Eastern Europe changed. The decisive moment for the loss of the superpower position of Russia was when Belarus, and especially Ukraine, became liberated from under its direct supremacy. For Poland, the appearance of new states on one hand created an area in the east that would provide the longexpected strategic shield, and on the other – forced the responsible support of the new state on its way to independent existence. Thus, the geopolitical situation of Warsaw changed over a very short period of time. Poland was forced to actively participate in the construction of the new mass security system in Europe, especially through the process of reorienting the main political and military alliances, and on the other hand – to participate in strengthening the process of stabilization in independent Ukraine, which at that time was a nuclear power. For Poland, similarly to the majority of states in the world, the independence referendum of 1991 was a big surprise2. The fact that the majority of the society, consisting of many nations and largely using the Russian language, was in favour of independence for Ukraine, demonstrated the internal separatist tendencies of that region inhabited by about twelve million ethnic Russians, inside the Soviet Union. 1 The strategic shield refers to military and non-military undertakings and includes the operation performed constantly during both periods of peace and crisis as security against surprise attacks and other forms of violence [quoted from:] R. Jakubczak, J. Marczak, K. Gąsiorek, Założenia polityki i strategii bezpieczeństwa narodowego [Assumptions of the national security policy and strategy.] [in:] Podstawy bezpieczeństwa narodowego Polski w erze globalizacji [The fundaments of the Polish national security in the era of globalization] , Warsaw 2008, p. 130. 2 84.18% of the citizens of the Ukrainian Socialist Soviet Republic took part in the referendum of 1 December 1991. 90.32% of the votes were for independence. The Crimea was the only place where the percentage of the “for” votes was different from the Ukrainian average – it was 54.19%. 75 ANDRZEJ ZAPAŁOWSKI This also demonstrated the first tendencies of division inside the new state organism in the form of the independence of the Crimea3. The significant error, of the then world leaders, was the assumption that those tendencies constituted the intention of isolating a new social organism, a kind of society for which the Ukrainian identity was the chance to establish an independent state structure that would identify itself more through the Ukrainian state than through its Ukrainian ethnicity. The perspective of the Ukrainian state in the minds of its respective parts, was underestimated. What is more, for the Ukrainian politicians the state self-identification was confronted with the national selfidentification (with its main headquarters in western Ukraine). With the passing of time, that inconsistency came to fruition causing a situation when several million Ukrainians from the western regions took up an impossible task, i.e. on one hand, to nationalize the Ukrainians from central Ukraine by implementing the tradition of the Cossacks into its catalogue of Ukrainian identity, and on the other – “to convert” about twelve million Russians in the east and south to ethnic Ukrainian identity. The demographic, economic, and especially cultural potential of the Ukrainians from the west did not allow that concept to win, because it was not possible to implement it over several decades. Also the historical and identityrelated experiences, especially related with the legacy of the first half of 20th century, played a significant role. Another mistake that caused a situation of instability in Ukraine was when the United States and the Western European countries entered the struggle for political and economic influence which, especially after the expansion of NATO in 1999, was interpreted by Russia as the attempt to restore a military block in Ukraine which would downgrade the position of Moscow as a significant participant in global political relationships. We did not have to wait long until Russia undertook countermeasures. The use of the energy-political threat became an inherent part of the expectations of the Russian minority and of the Russian-speaking society which was downgraded to the level of a russified social group by the new personnel mainly from western Ukraine. Moreover, Russia gave the chance to cooperate in its new economy to the new group of oligarchs from the eastern regions of that country, giving them a certain guarantee of establishing their own capital groups through the privatized main sectors of Ukrainian economy. For Russia it was a guarantee of maintaining significant influences in most areas of Ukraine. What is more, Kiev’s policy to maintain proportional relationships with NATO and Russia, prolonged for two decades, resulted in larger divisions in the society of the former Ukrainian Soviet Republic. Instead of integrating the society on the basis of the historical and cultural values important for both groups, the state allowed, and often participated in, the designation of new areas of division. 3 The autonomy of that region was proclaimed in 1991. In view of the risk of secession, the Ukrainian authorities consented to the autonomy proclaimed on 5 May 1992 and granted the republic the status of an autonomous region. 76 CHALLENGES TO THE SECURITY OF POLAND RELATED WITH THE REGIONALIZATION OF UKRAINE Another factor that had a negative influence on the deregulation of the social situation in Ukraine, was the influence of the diaspora, usually Canadian Diaspora which tried to introduce in Ukraine, through various circles in that country, the various ideas which had lost currency while confronted with the reality of a few decades years earlier. That state and formative anachronism resulted in deepened divisions in reference to the World War II tradition which is crucial for Ukrainian society, which actually resulted in the establishment of a political and territorial organism that had not been known in the history of the Ukrainian statehood. It is mainly the attitude of the western regions of Ukraine to the tradition of the “Patriotic War” which was identified as the beginning of the occupation of Ukraine by the Soviet military. That state resulted in a situation when, in popular opinion, at least twelve million Ukrainian citizens actually became the society identified with the hated Soviet invader. This division gave birth to new divisions, especially political ones. For millions of Russian-speaking Ukrainians outside the cultural magnet, Russia became not only a natural ally, but mainly an important political centre in the world, which centre stood up for the cultural values of that community, while at the same time their own country became increasingly foreign. A change of the geostrategic order in Eastern Europe at the beginning of 21st century At present Poland, just like in the past, is especially exposed to various activities resulting from the fact that it constitutes a geopolitical threshold for Russia, which reduces the influences of that state in Central and Eastern Europe. At present Russia continues to dismiss the principles and values of Latin civilization, as the main quality of its international politics, especially in the situation when the fight for status and spheres of influence has become again the main issue of international politics. Russia reconstructs the Russian empire consciously and with premeditation, and wants to hold a privileged position in Eastern Europe. It continues to strive to recover the position that was once exceptional in that part of Europe over the last few centuries. Moscow’s main aim in Eastern Europe is at least to convert that area into a neutral strategic zone. The present activities of the Kremlin are very alarming, because they occur in a period when the NATO and the European Union, on which Polish security is based, are becoming weaker. The main EU states, among others Germany and Great Britain, cut expenditure on their military. Last year Germany changed its military strategy and the priorities of its armed forces4. What is more NATO, 4 J. Gotkowska, Bundeswehra 3.0 polityczny, wojskowy i społeczny wymiar reformy sił zbrojnych RFN [Bundeswehra 3.0, the political, military and social dimension of the reform of the military forces of the FRG], Centre for Eastern Studies, Punkt Widzenia No. 28, Warsaw, May 2012. 77 ANDRZEJ ZAPAŁOWSKI without the crucial logistics and military engagement of the United States, is not able to perform a large military operation. After 1990 the main expression of Polish efforts in the international arena was the issue of entering NATO and the European Union. That main basic direction of the Polish activities, related with security, has been visible until today in the State Security Strategy5, in which the guarantee of state security is mainly contingent upon the defence capabilities of the North Atlantic Treaty Organization, while the domestic defensive potential plays only a secondary role. That assumption is completely wrong from the point of view of Polish national interests and demonstrates that the potential threats to state security are not realistically addressed by the authors of that document. What follows from it has far-reaching consequences in the form of the operating plans of the Polish Armed Forces that are disproportionate (limited) in comparison with the threats6. Currently, the activities aimed at gaining certain influence over the specific areas or regions in the world are performed through various methods. They include, for example: a quasi-war (e.g. Afghanistan), economic activities (e.g. Greece), influencing and creating the attitudes of the border communities (e.g. eastern Ukraine), psychological activities (e.g. the repeated referendum on the Lisbon Treaty in Ireland), activities in cyberspace (e.g. an attack on the Estonian government servers in 20077). A very interesting tendency in that regard was noted by General Rupert Smith who stated that: “… at present we are living in a completely new era of conflicts – maybe even a new paradigm – which I describe as “the war among civilians”, that is a war which addresses both political and military issues”8. In the current geostrategic conditions of European security, Poland continues to play the role of an important threshold in Central and Eastern Europe. The threshold which, through its membership in NATO and the EU, successfully blocks the dissemination of Russian influences in Central Europe. The effectiveness of those activities in the future will condition the maintenance of the EU’s economic position at the current level and the cohesion of NATO in terms of its defensive 5 Domestic Defense Strategy of the Republic of Poland, Warsaw 2007. R. Jakubczak, K. Gąsiorek, H. M. Królikowski, J. Marczak, Działania nieregularne. Element strategii bezpieczeństwa narodowego Polski [Irregular activities. The element of the Polish national security strategy], Warsaw 2011, pp. 285-291; R. Jakubczak, J. Marczak, Obrona Terytorialna Polski na progu XXI w. [The Territorial Defense of Poland at the beginning of the 21st century], Warsaw 1998, pp. 221-224; J. Marczak, Strategiczna ocena działań zmierzających do zniesienia powszechnej obowiązkowej służby wojskowej w Polsce w 2008 r.[The strategic assessment of the activities aimed at abolishing the obligatory military service in Poland] [in:] Podstawy bezpieczeństwa narodowego… [The basics of national security…], appendix 13. 7 K. Popławski, Kiedy science fiction staje się życiem [When science fiction becomes real] [in:] Nowa Europa Wschodnia No. 3-4/2012, pp. 46-51. 8 R. Smith, Przydatność siły militarnej. Sztuka wojenna we współczesnym świecie [The usefullness of the military force. The art of war in the modern world.], Warsaw 2010, p.16. 6 78 CHALLENGES TO THE SECURITY OF POLAND RELATED WITH THE REGIONALIZATION OF UKRAINE potential, and through that – the maintenance of a high level of displacement of other parties in the region. The current situation of Poland and its function for European security seems to be more and more complicated. It is influenced on one hand by our engagement in the Eastern Partnership, and on the other – by the Russian efforts to recover its crucial position in Ukraine. Although Vladimir Putin devoted the first two terms of his presidency to recovering economic power, he is currently striving to recover political influences on the area of the former Soviet Union9. One of the aims of the reintegration of the mentioned area is the construction of a Eurasian Union, which is highly probable for Russia in political and economic terms. For Russia, the country that constituted a civilization on its own and which wanted to maintain an actual influence on its gigantic territory (the territory being a peculiar demographic desert), the acquisition of stable influences in the area of Belarus, Ukraine, Georgia, Azerbaijan and Armenia, has been a strategic purpose10. The problem of many politicians and people dealing with international security is that they perceive Russia and the Asian countries through the European system of values and culture, which used to be the dominant element of international relations over the previous centuries when the old continent was the centre of the world in terms of economy and culture. At present, with the declining position of Europe, the economic influences of the world have shifted towards Asia. However, from the previous century, when it used to be a power, Europe retained its rhetoric and a peculiar manner of “instructing” the world. What has been an increasingly visible aim of Moscow politics in Europe is, apart from the political reintegration of the former Soviet republics, the recovery of Russian influence in Central Europe, whether those countries are members of NATO or not. Naturally, the effectiveness of that policy requires a limited consent from the USA. Poland plays a special role in Russia’s plans by attempting to neutralize Russian influence in Eastern Europe. Moscow realizes what the position of Poland in Europe is, despite its small military potential. The main aim is to establish strong economic relations with European countries so as to not let Russia penetrate the Polish market in an extensive manner. The threat of a conflict inside Europe in the foreseeable future is slim, with the exception of the Balkan states. Russia may not count on such a scenario. Francis Fukujama11 is party correct by saying that there will be no wars between the states with stabilized, liberal political systems. He formulated an opinion that the democratic processes which take place in states with market economies, preclude 9 The leading representatives of that trend in the Russian geopolitics are professors Alexandr Dugin (originator of the concept of the current Eurasian movement) and Sergey Karaganov (originator of the Union of Europe and Russia). 10 L. Sawin, Renesans eurazjatyzmu [The renaissance of Eurasianism], Geopolityka No. 6 (9) 2011, pp. 2-8. 11 F. Fukujama, Koniec historii [End of History], Poznań 2000. 79 ANDRZEJ ZAPAŁOWSKI war. According to the author, that opinion is correct only in reference to the states of the so-called old Europe. It does not refer to the European countries with fresh democracy and changing borders, at least in terms of the last two hundred years. The fight for spheres of influence and for shifting them has reappeared precisely on the areas where the borders kept changing in the 19th and 20th century. Naturally, for now this conflict has demonstrated itself as slight economic and social changes. By restoring its position in the world, Moscow will aim to have its influences secured at its western borders. The scope of its policy of confrontation outside the area of former Soviet republics, will be limited. The whole picture is complicated by the changing American strategies and priorities of the North Atlantic Treaty Organization. During the meeting in Lisbon in November 2010, the NATO member states adopted a new strategy that stated that Russia’s position is significant in terms of consultations related with the construction of new weapon systems, especially the anti-missile defence system of the NATO12. As Bolesław Balcerowicz stated, that document is the result of from many compromises, and compromise is its trademark13. The significance of article 5 of the North Atlantic Treaty in the above strategy has a realistic meaning only if the societies of the NATO states are willing to implement it. As early as during the Russian-Georgian war, the then prime minister of the Netherlands stated publically that if Georgia belonged to NATO, that state would not have met the treaty obligations. A similar statement was made then by the leader of the liberal fraction in the European Parliament – Cohn-Bendit. Taking the above precedential statements into account, it must be emphasized that the best guarantee of security for Poland, the guarantee that article 5 of the Atlantic Treaty will be fulfilled, has been provided by the United States, if we assume that our country would be significant for the American interests in this part of the world at the precise moment. The current decrease of the security guarantees from the USA for the European members of NATO, including Poland, has been influenced by the American Domestic Defense Strategy14 amended in January 2012. A significant element of that strategy is the clear change of the priorities related with the USA’s security as regards the decrease of the military presence in Europe in favour of its increase in Asia. These activities are related with the significant increase in the military potential of China and India. That change has a very particular significance for Europe. About 10,000 American soldiers will leave Europe, and the units that will stay on the old continent will mainly perform logistic tasks for the American troops 12 Koncepcja strategiczna obrony i bezpieczeństwa członków organizacji Traktatu Północnoatlantyckiego, przyjęta przez szefów państw i rządów w Lizbonie [The Strategic Concept for the Defense and Security of the Members of the North Atlantic Treaty Organization adopted by Heads of State and Government In Lisbon] [in:] Rocznik Strategiczny 2010/2011, Warsaw 2011, pp. 23-33. 13 B. Balcerowicz, Koncepcja strategiczna NATO 2010. Wymiar wojskowy [The 2010 NATO Strategic Concept. The Military Dimension] [in:] Rocznik Strategiczny 2010/2011, Warsaw 2011, p. 46. 14 http://www.defense.gov/news/Defense_Strategic_Guidance.pdf 80 CHALLENGES TO THE SECURITY OF POLAND RELATED WITH THE REGIONALIZATION OF UKRAINE stationed in the Middle East, Iraq and Afghanistan. And so, Europe will be devoid of significant operational American troops, which confirms the argument that the continent has ceased to be a priority for the USA. The second guarantee of security for Poland, i.e. the European Union, has not been able, despite its efforts, to establish the announced 100 thousand-strong army. It is not even able to perform large operations outside Europe independently. And so, the military component of that organization does not play a crucial role in the military security of Poland. The only significant role is played by the political dimension of the participation in the EU, due to the fact that our country entered the area of influence of the old Europe. For France, Spain or Italy influence in the Mediterranean Sea is more important than in Eastern Europe. What is more, the majority of the countries of the old EU continue to decrease their spendings on defence, which makes them review the main areas of their previous national interests in favour of Africa, and the alliance solutions are becoming for them less and less important. Besides, for several years France and Germany have been communicating individually with Russia with regard to security issues15. At present, the EU countries, with their half a billion citizens, would not be able to achieve even 30% of what the American military could. That demonstrates the actual picture of the military position of the old continent in the world. Russia, an area four times smaller, with an economy which is backward in comparison with that of the EU, is more important in terms of security in the world, than the EU. An important premise that has changed the position of Warsaw on the map of the global security system, has been a shift in the American approach to partnership with Russia. Currently Moscow seems to be a significant and desirable partner for the USA in Asia (the issue of China or North Korea). It seems that the weakened activeness of the USA in Eastern Europe has resulted from the American political elites acknowledging the defeat of the Washington policy in that part of the world and allowing for Russia to have more influence in the post-Soviet area. In a way, this is the price that satisfies Moscow in exchange for cooperation between the USA and Russia in Asia. Challenges to the security of Poland in the east In the light of changes in the current system of European security, there arises a question of what is the most sensitive direction for Polish military security. The issue of Kaliningrad has had a crucial role. Although from the operational point of view the area of Kaliningrad is too small to pose a threat for the whole Polish state, together with Belarus it continues to remain a real, not to say deadly, threat for Poland. If we take into account the potential of the new initiative in the form of 15 Polityka zagraniczna Polski w trudnym roku 2010 [Poland's foreign policy in the difficult year 2010] [in:] Rocznik Strategiczny 2010/2011, p. 310. 81 ANDRZEJ ZAPAŁOWSKI a Eurasian Union, headed by Russia and Kazakhstan, and in the future – maybe also by Ukraine, the situation will occur to be of vital importance for Poland. Another element significant to the security of Poland has been the issue of Ukraine. In the short term, a significant threat to state security may appear from that direction, although not a threat to its existence. Why? Kaliningrad is a region of Russia, and so long as the current system of security in the world is not broken, there exists no direct military threat from it. Currently Belarus does not pose a military threat, not only due to the military potential of that state, but mainly due to the fact that the foreign policy and military forces of that country are controlled by Moscow. The question arises of what might happen in Ukraine in the foreseeable future that would influence the security of our country. While analyzing the situation in that region, we should pay attention to the processes which have been occurring in that state for several years. Firstly, there is a distinct outline of division lines and an emphasized lack of historical identity in the state as a whole within today’s borders. In the area of today’s Ukraine, there has never existed a political organism with a capital city in Kiev. Currently, that state is inhabited by a number of ethnic Russians, mainly living in eastern and southern Ukraine, comparable with the number of the Galician Ukrainians living in three or four regions in the west, with a distinct national identity. Therefore, there exists a clear influence from Russia in political, spiritual and social issues in eastern and southern Ukraine. It is an area of several hundred thousand square kilometres, and the number of citizens comparable to an average European state. A significant mistake from the European and American politicians and strategists, has been to treat the entire Ukrainian state as an area in which the mentality and civilization conditionings of the population may be changed. Currently Europe has problems with much bigger communities striving for the autonomy of their regions, and ignoring such processes in Ukraine constitutes a fundamental strategic mistake. At present, any talks about Ukraine without Russia and the authorities of the pro-Russian Party of Regions (whether it is in power or not) are doomed to fail, because it is an area which, according to most Russians, is a part of Russia located outside its administrative borderlines. For Russia, with its tragic demographic situation, the possibility to constantly use the dozen of millions of Russians in Ukraine, has been an issue of utmost importance for Russian security. In Poland, politicians continue to be unaware of the capacity for Poland to influence the situation in Ukraine. Warsaw undertook (with support from the USA and some European countries) to shape the political situation in an area comparable to that of Poland (meaning eastern and southern Ukraine), inhabited by over 20 million people, mainly Russians. These politicians, driven by the old geolitical 82 CHALLENGES TO THE SECURITY OF POLAND RELATED WITH THE REGIONALIZATION OF UKRAINE concepts of Intermarium16 or Giedroyc17 tried to use the Russian weakness and play for Ukraine, but in fact led to an influence of the Russians in that country. Another mistake made by the Polish and Western politicians has been to perceive the western and eastern areas of Ukraine as similar communities. Although many geopoliticians underlined the civilization differences between the regions of this country and the lack of their internal cohesion, it seems that their output was not analyzed frequently enough. One of the authors who explicitly addressed the issue of the civilizational division of Ukraine was Samuel Huntington18 who emphasized the possibility of secession of Western Ukraine. According to him, it would only happen upon a definite deterioration of the relations between Western Europe and Russia, and as a result of tensions provoked by rivalizing parties. However, Huntington did not take into account the social tension which might appear from inside Western Ukraine, caused by a far-reaching integration of Ukraine and Russia. Earlier it was Feliks Konieczny19 who paid attention to the inability of two civilizations to coexist permanently in the area of one state (due to the lack of synthesis between civilizations). According to him, such coexistence will shortly lead to one party displacing the other, or to a dynamic conflict between them. In the western provinces of Ukraine, such a process of “clash of civilizations” has been ongoing for some time now. What should be noted is that in that region, constituting about twelve percent of the area and inhabitants of Ukraine, the power is exercised by the politicians invoking a vision for Ukraine that’s completely different from the remaining areas of that country. That situation signifies only that the Western political centres play a game for Ukraine through the communities with distinct anti-Russian attitudes, while the ideology on which those operations are based, is irrelevant. The question remains how will those communities behave in the case of a shift in European policy, mainly as regards the policy of NATO with regard to Russia. Will they continue to support the national communities in Ukraine and indirectly lead to a division of that state, thus creating a political and economic problem for themselves (such 16 Intermarium – the political idea promoted by the circles associated with Józef Piłsudski prior to the I World War, which consisted in the establishment of a federation of the states of Central and Eastern Europe. Ultimately, Intermarium was to include the area between the Adriatic, Baltic and Black Seas, i.e.: Poland, Lithuania, Latvia, Estonia, Belarus, Ukraine, Czechslovakia, Hungary, Romania, Jugoslavia, and possibly Finland. The proposed federation was to refer to the Jagiellonioan traditions of the multicultural Polish-Lithuanian Commonwealth. Piłsudski believed that that federation would help the Central European states to avoid the domination of Germany or Russia. 17 The koncept of Jerzy Giedroyc formulated in 1974 in the Parisian “Kultura” monthly magazine, where he presented the contept that the independence of Ukraine, Lithuania and Belarus is a factor favourable to the independence of Poland, while the domination of those countries by Russia would pave the way to enslave also of Poland. After 1990 that concept became the guideline of the Polish policy towards Russia and the Eastern European states. 18 S.P. Huntington, Zderzenie cywilizacji [Clash of Civilizations], Warsaw 2006, p. 276. 19 F. Koneczny, Prawa dziejowe [Historical laws], Komorów 1997, pp. 237-260, 439. 83 ANDRZEJ ZAPAŁOWSKI a state would have to be supported financially, just like Kosovo right now), or will they attempt to calm down the social moods in that part of Europe? A problem appears in the form of the strong determination of the society of that region on its way towards secession. In western Ukraine it is not only some Galician Ukrainians that strive for a distinct character or autonomy for their region. There is also the issue of the Carpatho-Rusyns who have strived for autonomy for their region and who have considered themselves largely as a nation distinct from the Ukrainians20. There is a problem of the autonomy of Romanians and Hungarians. In the Chernivtsi Oblast, as many as 50 thousand citizens have Romanian citizenship, while in the Berehove region 76% of citizens are Hungarians, and the regional council adopted the national anthem of Hungary as the anthem of the self-government authority21. Another area of confrontation has been the issue of the Supreme Council of Ukraine outvoting the right to use a regional language in the areas inhabited by at least 10% of national minorities. Under the new statute, Russian language would become the regional language of 13 out of 27 regions of Ukraine, including in Kiev and Sevastopol. The Crimean Tatar (Crimean) language would become the regional language in the Crimea, the Hungarian language – in the Zakarpattia Oblast, and Romanian – in Chernivtsi Oblast. The current language confrontation is one of the main social catalysts in Ukraine. Professor Roman Szporluk from Harvard was correct to state that: “millions of people who consider Russian to be their language, voted for independence on 1 December 1991. Taking that into account, the citizens whose mother tongue is Ukrainian, have a special political and moral obligation towards them. If we take that into consideration, if we treat the population as two parts – the “leading” part and the “national minorities”, we will face quickly the perspective of the territorial and ethnic disintegration of Ukraine. (…) Thus, the fact that the Ukrainian nation is bilingual needs to be taken into account while establishing a state. (…) The easiest way to destroy Ukraine is to start the ukrainization of the non-Ukrainian citizens. The biggest threat to an independent Ukraine is posed by language fanatics”22. That voice of reason not only in reference to the language act, but also in reference to the attempt to ukrainize the national minorities, has been a fundamental problem on which the future of Ukraine will depend. Either the actual state in the form of various traditions and cultures of the respective regions will be sanctioned, or the process of disintegration of Ukraine will start. 20 Rusini nie chcą Ukrainy [The Rusyns do not want Ukraine], www.konserwatyzm.pl [21 December 2011] 21 Mały krok do Wielkich Węgier [A small step towards the Great Hungary], http://www.kresy.pl/publicystyka,wydarzenia-tygodnia?zobacz%2Fmaly-krok-do-wielkichwegier&fb_source=message [2012-04-13] 22 "Wojna słów" na Ukrainie [„A war of the words In Ukraine”], http://wiadomosci.onet.pl/swiat/wojna-slow-na-ukrainie,1,5182570,wiadomosc.html [7 VII 2012] 84 CHALLENGES TO THE SECURITY OF POLAND RELATED WITH THE REGIONALIZATION OF UKRAINE In the presented situation, that part of Ukraine has the potential for an ethnicbased conflict destabilizing the situation in that part of Europe, and the dynamic course of that process may result in a lack of stability in south-eastern Poland (refugees). Moreover, the mentioned area may be negatively affected by the Russian army stationed in Transnistria. Having analyzed the above situation, all the facts indicate that it is Russia, and not Europe, who has the key to the decisions concerning the future of Ukraine. For Moscow there exist two fundamental solutions. The first one is striving to take control over the whole of Ukraine and to pacify the western regions of Ukraine through economic and administrative methods. The second one – making the decision to regionalize them, on the basis of the Crimean casus, with a separate parliament, and transforming Ukraine into a federal state at first, and then, over the next few years, pushing that region out of the federation and towards its independence. Naturally, there exists a third scenario which is highly unlikely. The eastern and southern lands of the current Ukraine are annexed to Russia, while western and Central Ukraine form a joint state23. That scenario is highly unlikely for two reasons. First, such operations would provide a precedent in Europe in the form of annexation by a superpower of part of the territory of a weaker neighbour, which certainly would invoke resistance from the international community, and second – Russia would not allow the nationalist trends, with clear anti-Russian attitudes, to move east, as that might pose a threat of loss of influences in that area. The first two scenarios are very dangerous for Poland and its national security. In the case of the first scenario, practically the entire eastern border of Poland would constitute a border with the Russian area of influence (the Belarussian and Ukrainian states certainly would remain on the map of the world). Therefore, Poland would be susceptible to tensions stimulated by Moscow, and would lose its economic activity areas because of negative relationships with Russia. In the 23 Such a vision was presented by Volodymyr Horbulin and Alexander Lytwynenko (the former experts of the Ukrainian Council of National Security and Defense) who published their conjectures in an opinion-forming weekly magazine "Dzerkało Tyżnia". According to them, the vision of a protectorate, and then of division of the country into three, is realistic. They emphasize that the concept of Russia’s foreign policy and its National Security Strategy include clear expressions associated with Russian interests in Ukraine. They refer to prevention of Ukraine becoming a member of NATO and to “defending the interests of the Russian-speaking community”, i.e. making Ukraine stay in the Russian sphere of influences and privileged interests. According to those experts, the preservation of the territorial unity of Ukraine is dependent on whether it will adopt “special relations” with the Russian Federation, i.e. if it will assume Russian patronage. The analysts also stated that the establishment of a protectorate is not necessarily the ultimate aim for Moscow. Maybe it would only be a transition stage before the further division of Ukraine, probably into three parts, in accordance with the model published (probably by the Russian intelligence services) in the Italian geopolitical magazine “Limes”. That partitioning would look as follows: the southern and eastern regions of Ukraine would be annexed to Russia, central Ukraine would be governed by a puppet government, while the western part of the country, as the “main violator of the peace” would be completely isolated [quoted after:] http://www.tvn24.pl/wiadomosci-z-kraju,3/boja-sie-ze-rosja-podzieli-ukraine-na-trzy-czesci, 109489.html [2009-09-19] 85 ANDRZEJ ZAPAŁOWSKI second scenario, Poland would border the West-Ukrainian state with a pauperized society, with a claim-based and nationalist attitude to its surroundings and susceptible to provocations threatening the stability of the borderline areas. We should ask a question of whether in Ukraine, including the western regions, there is a sufficient potential and social determination to perform the aforementioned scenarios. Observing the publications of intellectuals from Lviv, it seems that yes (Jarosław Hrycak24, Mykoła Rabczuk25 Wasyl Rasewycz26, Wołodymir Pawliw27 or even Marian Mudryj28). These authors draw attention to the fact that the culture of Galician Ukraininans mixes with Cossack and Russian socities. The only possibility of maintaining the identity of western Ukraine is autonomy. The problem of reaching the “Galician autonomy” relies on the issue of how to achieve it - as in Czechoslovakia in 1993 or Yugoslavia. Parliamentary voting in autumn 2012 might be helpful to answer this question. It depends which way Ukraine will choose and which way Russia will lead it. The changes which were brought about on 08 June 2012 i.e. establishing the new Strategy of National Security of Ukraine entitled “Ukraine in the world which changes” and Military Doctrine, significantly influenced and defined Ukrainian policy as the policy of beyond blocking.29 The president of Ukraine, signing the aforementioned document fulfilled the expectations of Moscow in the form of Ukraine’s resignation from becoming a member of NATO. He has shown that national security policy is of secondary importance. This state is reflected in the current condition of the Ukrainian army which in size is comparable to the Polish army and has approximately 130 thousand soldiers. However, with reference to military equipment and its usefulness, the Ukrainian army is in deep crisis. Within the last three years, Ukraine spent more than two times less money on defence than Poland i.e. 0.8 % of GDP.30 In the current budgetary year, there is visible a slight increase of expenditures, mainly for repairs of military equipment. 24 ederation –chance for Ukraine, www.zaxid.net [22 I 2011] Ukraine as a second Ulster, http://www.easternpartnership.org/community/interview/ukrainesecond-ulster [20 IX 2011] 26 Federalisation: challanges and threats, http://zaxid.net/home/showSingleNews.do?federalizatsiya_vikliki_i_riziki&objectId=1256477 [1 VI 2012] 27 Ukraine -Galicia at the crossroads: between the impossible and undesired, http://zaxid.net/home/showSingleNews.do?galitske_perehrestya_mizh_nemozhlivim_i_nebazhanim& objectId=1256057 [27 V 2012] 28 Ukraininan Piedmont has always been Kiev, http://geopolityka.net/ukrainskim-piemontemzawsze-byl-kijow/, http://www.chasipodii.net/article/9937/ [3 V 2012] 29 President Janukovic defines the vision of the security of Ukraine, http://www.osw.waw.pl/pl/publikacje/tydzien-na-wschodzie/2012-06-13/prezydent-janukowyczokresla-wizje-bezpieczenstwa-ukrainy [22 VI 2012] 30 http://en.rian.ru/mlitary_news/20120125/170941238.html [2 VII 2012]; Anna Dudek states that expenditures on military purposes as the percentage of GDP for Ukraine in 2009 as 2.9% [in:] Strategic Annual 2011/2012, Warsaw 2012, p. 414. However, according to the Centre of Eastern Studies in the years 2005-2008, the real ratio of expenditures on defence in Ukrainian GDP decreased 26 86 CHALLENGES TO THE SECURITY OF POLAND RELATED WITH THE REGIONALIZATION OF UKRAINE For Janukovic, the guarantor of military security is Russia, he only cares for internal security. In February 2012, the opposition blamed the president for putting a son in law of a former vice prime-minister of Russia into the position of Minister of Defence; the person had gained citizenship in 2005, he was Russian formerly.31 With reference to the problems with security, Kiev underlines short-term real threats i.e. existence of quasi states on independent territories and precedences of acknowledging their sovereignty (in relation to separatist tendencies), an increase in rivalry for access to natural resources and control of the routes of their delivery. In a regional dimension, the main threats rely on activation of processes for creating so called impact zones, threats of the preventive use of military forces and an increase in the militarisation of the region. The factors that directly threaten the defence of Ukraine were an unregulated conflict in Transnistria, the issue of dividing the Black Sea and the Sea of Azov and the Kerch Strait, as well as the lack of the demarcation of the national border with Russia, Belarussia and Moldavia and unregulated issues connected with the stationing of the Black Sea Fleet.32 At present, the guarantors of the independence of Ukraine are mainly oligarchs, as they have a significant influence on the parliament and the government. These oligarchs care for not being in the common national body i.e. Russia as they would lose their position of influencing politics and would be subject to the Kremlin. Assessing the Polish politics in the East, the state of failure is noticeable. Poland was to be connected with Ukraine by strategic partnership. However, after two decades, we have slight economic influence and limited political cooperation. We are almost absent, both culturally and scientifically. This has been a failure of all subsequent governments. Conclusions for Polish policy and security strategy Keeping in mind the dynamically changing situation on the eastern borders of Poland, it is vital for Poland to redefine its national security policy as well as actively influence the EU and NATO in the scope of maintaining a presence in Central Europe. Russia in its relations with NATO still differentiates the rights to security of “old” and “new” members of the pact.33. Command of NATO belongs to “old” members of the Treaty. from 1.3% to 0.99% (in accordance with assumptions of the programme of reforming military forces in 2005, Ukraine was to spend 2% GDP) [in:] N. Orłowska-Chyż, PGradual degradation of Ukrainian army, Week in the East of 14.10.2009 31 S. Matuszak, Ukraine [in:] New Eastern Europe no. 3-4 /2012, p. 16. 32 President Janukovic defines the vision of the security of Ukraine, http://www.osw.waw.pl/pl/publikacje/tydzien-na-wschodzie/2012-06-13/prezydent-janukowyczokresla-wizje-bezpieczenstwa-ukrainy [22 VI 2012] 33 A.D. Rotfeld, NATO summit in Lizbon: what next? [in:] Strategic Annual 2010/2011, Warsaw 2011, p. 36. 87 ANDRZEJ ZAPAŁOWSKI For Poland, due to the changing situation, it is required to change significant assumptions of the National Security Strategy, connected with the long lasting process of the decomposition of the security institutions which are significant for collective security. It is mainly about the gradual withdrawal of the USA from Europe and the weakening, at the same time, of the structure of collective deterrence and the European Union suffering from a deep crisis. This situation requires cooperation with the USA beyond NATO in the field of security with the possibility of placing several US garrisons in Poland. Another indispensible step is the implementation of Poland’s own, national structure of deterrence by means of common Territorial Defence and maintaining operating troops at the same level. The common self-defence of citizens utilising both government and non-governmental forms of security organisations constitutes the essence of modern, common, national security of a democratic and independent Poland which would be an answer to the challenges from the East. It is indispensible to prepare structures of the state for the possible changes of the internal situation in Ukraine with reference to new scenarios in the development of the internal situation. Assuming the scenario of the decomposition of Ukraine in the form of its regionalisation or secession of some of the regions, much emigration or even “escapes” may by anticipated, which may undoubtedly influence the internal situation in Poland. It must be remembered that in western Ukraine, there are descendants of the people which were forced to emigrate after the Second World War. Mass emigration of these people into the territory of Podkarpacie or Lubelskie may have an unfavourable influence in the form of vulnerability to the national destabilisation of the border area. In case of the political and social conflict in Ukraine, Poland should be neutral and not support any party. For Warsaw, the partner shall be the centre of legal and real power in Kiev. Experiences of Poland’s engagement in the Orange Revolution are a significant experience of political and economic losses and profits where Poland suffered significant economic losses. An important action in the scope of regional security is to assume proper actions aimed at finding possibilities of creating local economic and political partnership in the form of the Kaliningrad Triangle i.e. the cooperation axis: Berlin-Warsaw-Moscow, which would stabilise the situation in Eastern Europe and constitute an element of a strategic shield for Poland. Tightening international cooperation in this capacity, especially in connection with a growing number of border threats (nuclear power stations, floods, illegal migration, organised crime), forces a necessity of broad cooperation, including aid, in the scope of security, creating durable institutions and procedures of neighbourhood cooperation. Poland should increase economic cooperation with Far Eastern and Central African countries as an element of the diversification of the economic security of Poland, as well as undertake further actions for the benefit of the diversification of directions and sources of gaining energetic resources. 88 CHALLENGES TO THE SECURITY OF POLAND RELATED WITH THE REGIONALIZATION OF UKRAINE In summary, we are dealing with a situation in which the United States is profoundly limiting its presence in Europe; the European Union, due to its deep economic crisis is not a significant guarantor in the field of security, Russia is reestablishing influences in the territory of post-soviet republics; and Poland, in its basic assumptions, is still attached to geopolitical concepts from over 20 years ago, not to say over 100 years ago. 89 NDU Scientific Quarterly no 4(89) 2012 TOMASZ RUBAJ ART OF WAR FIRE SUPPORT – AN INTEGRAL PART OF CONTEMPORARY OPERATIONS Col. Tomasz RUBAJ, D.Sc. National Defence University Abstract The paper presents the essence, the general conditions and components (subsystems) of the joint fire support. It was noted that the need of conducting of joint fire support, due to the complexity of the contemporary operating environment and decentralization of operations, are also more and more present at the tactical level, the lowest level of command. The general structure of joint fire support and within it a brief description of fire support participants was presented. The needs for coordination and synchronization, resulting in the integration of three main areas of the joint fire support: reconnaissance, command and control and effectors/delivering platforms from different components (operating in different operating environments) has been indicated. The importance and responsibility for planning and integration of joint fire support with warfighting and joint functions was also discussed. In this scope, article is limited only to illustrate the need of integration of fire and fire support with maneuver – as integration of two complementary functions. In conclusion author pointed out the expanding and evolving nature of the engagement and influence (encompassing fires and effects), which increasingly affects not only the physical plane, but also takes place in the sphere of nonphysical activities (cognitive plane/domain), and is caused by the needs of the present and expected in the nearest future operating environment. Key words – Fires, Support, Fire Support, Joint Fire Support “The beginning of wisdom is calling things by their right names”. Confucius As was stated in the ancient quotation above, the first basic problem to define and explain is terminology. Analyses of foreign sources leads to the a` priori con90 FIRE SUPPORT – AN INTEGRAL PART OF CONTEMPORARY OPERATIONS clusion that the starting point for consideration should be fire. Fire as one of the elements of combat power (warfighting functions at the tactical and the joint functions at the operational level) was and still remains an omnipresent factor in commanders' hands and allows them to have an influence on the outcome of battles, operations and campaigns. It ought to underlined, that there is an analogy with our national war art because in the theory of fire support, fire is the basic term and includes other classifications including direct fire, indirect fire, operational fire etc. Fire is defined as the use of weapon systems to create a specific lethal or nonlethal effect on a target. All fire is normally synchronised and integrated to achieve synergistic results. Fire can be delivered by air, land, maritime, or special operations forces (SOF)1. In the definition presented above the environmental criteria has been introduced and fire is produced by various assets operating in an air, land and maritime environment – as part of a Joint Operations Area (JOA). According to other sources fire is produced during the employment of forces from two or more components (component/service criteria) in a coordinated action to produce desired effects in support of a common objective – in this case fires is called Joint Fires (JF)2. When fires/joint fires assist air, land, maritime, and SOF to move, manoeuvre, and control territory, populations, airspace, and key waters are called Fire Support/Joint Fire Support (JFS). The most common definition presented in various sources treat Fire support/Joint Fire Support as the collective and coordinated use of the fire of land and sea based indirect fire systems, armed aircraft, aviation, electronic warfare and non-lethal munitions against ground targets to support combat operations at both the operational and tactical levels3. FS/JFS is the integration of fire and effects to delay, disrupt or destroy enemy forces, combat functions, and facilities in pursuit of operational or tactical objectives. It shatters the enemy’s cohesion and undermines his will to fight. The inherent flexibility of fire support allows it to bring fire to bear in deep, close and rear operations – in a geographical dimension or in shaping, decisive and sustaining operations – in order to provide and effect dimension, if necessary simultaneously. It is therefore essential that it is integrated fully into the operational plan. It must be synchronised with other battlespace activities in terms of time, space and purpose to achieve the optimum concentration of force. Target priorities and engagement criteria must be established and fire support used aggressively, in concert with ISTAR systems capable of acquiring targets and carrying out battle damage assessment. 1 Joint Fire Support, JP-3.09, Joint Chief of Staff, 2010. Fires applied during the employment of forces from two or more components, in coordinated action toward a common objective, AAP-6, NATO glossary of terms and definitions, NSA, Brussels 2011, p. 2-J-1. There is an analogy to the term of Joint Operations/ Allied Joint Operations. 3 eg. ATP-3.2, Land Operations, Brussels 2003, p. 2-5. 2 91 TOMASZ RUBAJ From a general perspective, FS/JFS encompasses three basic subsystems, also referred to as – three vital components: surveillance and target acquisition (STA); command and control information system (C2IS); weapon (delivering) systems (See Figure 1). Figure 1. Subsystems of a Fire Support System In the latest standardization agreements JFS is called Indirect Fire System (IFS) and has been divided into five crucial elements. JFS/IFS is a system of systems, the main characteristics of which are its 24/7 ability to function (24 hours a day and 7 days a week without interruption), all-weather capability to acquire ground targets and achieve effects over a wide area and in depth. It should be able to deliver guided or unguided munitions in order to strike point or area targets. The JFS/IFS is a system which includes the following elements4: • A family of Surveillance, Target Acquisition (STA) systems which are linked to the wider ISTAR (Intelligence, Surveillance, Target Acquisition and Reconnaissance) system; • A command, control and information system (C²IS) which provides a command and control network over the battlefield and enables artillery commanders to act as fire and effect integrators also responsible for operational environment management in all dimensions; • Delivery platforms like guns, rockets and missiles launchers, mortars, combat or weaponised/armed unmanned aerial vehicle (UAV); • A variety of precision-guided, conventional and non-lethal munitions; • An ammunition resupply system. 4 92 NATO Indirect Fire Systems Tactical Doctrine AArtyP-5(A), NSA, Brussels 2010, p. 2-1. FIRE SUPPORT – AN INTEGRAL PART OF CONTEMPORARY OPERATIONS IFS/JFS units are characterised by a very flexible organisation in order to be able to deploy and operate in a highly centralised or decentralised manner. Resulting from this flexible structure, IFS/JFS units are able to perform efficiently in a complex operational environment. The first subsystem – STA, closely connected with the ISTAR system, consists of assets organic to the JFS/IFS units STA (See Figure 2). STA sources provide the means to successfully detect, locate, identify, track and classify targets. These systems include many individuals, units, and resources on the battlefield that help with the effective employment of the weapon. They yield basic data and information for fire support as well as contribute to the development of situational awareness (SA). JFS/IFS STA assets can be used for non-JFS/IFS intelligence collection tasks, but such use must be weighed against the need to acquire JFS/IFS targets. Sensors not belonging to JFS/IFS systems (e.g. sensors of reccee unit5) could also contribute to the target acquisition process. Figure 2. Subsystems of an IFS/JFS system 5 eg. Air Reconnaissance and Surveillance, Aviation Reconnaissance, Electronic Warfare (EW) Sensors, Long Range Patrols (LPR). 93 TOMASZ RUBAJ Command Control and Information System (C²IS) provides a command and control network over the battlespace. There are many developed Fire Control Systems linked to the manoeuvre Command and Control Systems. In my opinion we should discus Joint Fires Command and Control Systems rather than about Fire Control Systems because modern systems play not only Fire Control/Direction roles, but also: Tactical Fire Control – planning and coordination, Technical Fire Control – during mission execution, Movement Control, Combat Service Support and fulfil Airspace Management functions. A few years ago a new NATO initiative concerning Fire Command and Control Systems was established. Their purpose still remains to achieve interoperability between different system from leading countries. Artillery Support Cooperation Activity - ASCA (the name of the initiative – focused on cooperation data and experience exchanging between: American AFATDS (Advanced Field Artillery Tactical Data System); German ADLER (germ. Artillerie Daten Lage Einsatz Rechnerverbund – System); British BATES (Battlefield Artillery Target Engagement System), French ATLAS System and Italian SIR System. For example AFATDS is a Joint Fire Support Battle Command system. It provides complete flexibility to manage attacks on preplanned and time-sensitive targets. AFATDS provides fully automated support for planning, coordinating, controlling, and executing fire and effects. It supports weapon systems such as mortars, field artillery cannons, rockets, close air support, attack helicopters, and Naval Surface Fire Support (NSFS) systems. AFATDS also acts as a fire support "server" to LAN-based and Tactical Internet-based clients, including the AFATDS Effects Management Tool (EMT), and the USMC Command and Control Personal Computer (C2PC) EMT. The system is used in all U.S. Army echelons from weapons platoon to corps and in the Marine Corps from a firing battery to Marine Expeditionary Forces. AFATDS is installed aboard the U.S. Navy LHA/LHD Class big deck amphibious ships to support Expeditionary Strike Groups (ESGs) during amphibious operations6. In Command and Control Information System (C2IS) there are also located JFS planning and coordination elements. It must be underlined that there are different solutions implemented in different countries. In most cases fire elements are represented at all levels (from Corps to Battalion) as Joint Fire and Effect Elements – Centres/Cells/Groups/Teams. Through their Joint Fire Support Centres/Cells//Teams, the TF staff (Brigade sized or higher) plan fire and effects, in that they match the manoeuvre commander’s intent and scheme of manoeuvre to those fire assets available. They book, arrange and liaise to ensure that the assets are available at the correct time and are able to operate in the specified area with all logistic, ROE and other requirements. Through their Brigade Joint Fire Support Cell, the Brigade staff further integrate the fire assets available by conducting Battlespace management (BM), timings, 6 94 Source: www.raytheon.com (Access October 2012). FIRE SUPPORT – AN INTEGRAL PART OF CONTEMPORARY OPERATIONS routes, weapon loads and communications infrastructures. The Fires Support Team (FST) make the most appropriate use of allocated fire assets in order to achieve the effect required by the Manoeuvre Commander. The chosen asset will minimise the risk of fratricide or further encroachment upon the operation of other assets7. Solutions discussed above, as an example JFS planning and coordination elements organisation, are presented in the Figure 3. Source: Fire Support Integration Paper, CDoD, 2008, page 8. Figure 3. JFS planning and coordination elements Attack resources encompasses land, air and sea based delivering platforms which are able to engage targets at the proper time, place and with the appropriate volume of fire. There are sources which divide attack resources in two categories lethal and non-lethal (eg. Electronic Attack, Computer Network Attack, PSYOPS, Information Warfare, Obscurant Fires & Illumination. In considerations provided below only lethal means will be discussed8. a. Land-based JFS/IFS uses a variety of weapon systems and ammunitions (guided and unguided) in order to cover the entire battlefield with indirect fire de7 Fire Support Integration Paper, Canadian DoD, 2008, p. 8. NATO Indirect Fire Systems Tactical Doctrine AArtyP-5(A), NSA, Brussels 2012, pages 3-1 and 3-2. 8 95 TOMASZ RUBAJ livering a variety of effects, as determined by the manoeuvre commander. There are three principal types of ground-based indirect fire weapon systems. These are: • Mortar uses self-propelled, towed and man-portable equipment. In general it is integrated in the JFS/IFS and uses precision as well as unguided ammunitions; • Tube artillery uses self-propelled and towed gun equipment and is characterised by a high responsiveness, accuracy, and the capability to deliver sustained fire. An extensive selection of ammunition, coupled with sophisticated target acquisition assets permit the engagement of both point and area targets and a target effect adjusted to the tactical requirements. • Rocket/Missile artillery uses guided or unguided ammunition and its long range enables it to strike high pay off targets throughout the depth of the battlefield. It has the capability to deliver a very heavy weight of fire for a short period. b. Air-based JFS/IFS – called also in many sources Anti Surface Force Air Operations (ASFAO) • Fixed Wing. ASFAO will be used in two aspects: Anti-surface warfare operations (maritime) and air-land operations. Air-land operations consist of Air Interdiction (AI) which is mainly used for operational level objectives and Close Air Support (CAS) which is mainly used for tactical level objectives. CAS is an air action against hostile targets which are in close proximity to friendly forces and which require detailed integration of each air mission with the fire and movement of those forces. The mission must always be supported by a qualified Tactical Air Control Parties Forward Air Controller or TACP (FAC) and is flown in direct support of ground forces, in offensive and defensive operations, to destroy, disrupt, suppress, fix or delay enemy forces where they are in close proximity to friendly forces. This team should be included in the Joint Fire Support Element (JFSE) in order to ease integration of all fire support assets. • Rotary Wing. The primary missions of rotary wing assets are divided in two basic types of attack: Interdiction Attack (IA) and Close Combat Attack (CCA). IA is a hasty or deliberate attack either to divert, disrupt, delay, degrade, or destroy the adversary before they can be used effectively against friendly forces. IA is conducted at such a distance from friendly forces that detailed integration with ground forces is not required. CCA is a hasty or deliberate attack providing air-to-ground fire for friendly units engaged in close combat. Due to the close proximity of friendly forces, detailed integration is desirable but not always possible. • Combat Unmanned Aerial Vehicle (C UAV) / Weaponised/Armed UAV. C UAV (or Weaponised/Armed UAV) is an armed UAV that can be used in a reconnaissance role and/or combat actions. c. Sea-based JFS/IFS called also Naval Surface Fire Support (NSFS). • Some land operations may be supported by sea based indirect fire systems such as amphibious operations and defence of coastal areas (contribution of the Maritime Component to Joint Operations). The coordination of naval fire happens at every level. Specialist naval fire support coordinators may be used for liaison 96 FIRE SUPPORT – AN INTEGRAL PART OF CONTEMPORARY OPERATIONS through the Supporting Arms Coordination Centre (SACC). If there is no allocated maritime fire support observer for ground troops, the JFSE has the additional responsibility of observing and controlling NSFS in support of the land component. A maritime fire support group consists of naval combatants assigned to support Land Forces operations ashore using naval gunfire support (NGS) and guided missile support. Due to the multi-role character of many naval combatants, units of an escort/screening group may conduct fire support missions without being formed into a separate fire support group and vice versa. NGS can provide large volumes of immediately available, responsive fire support to Land Combat Forces operating near coastal waters. • The general mission of NSFS ship units in an amphibious operation is to support the assault by destroying or neutralising (1) shore installations that oppose the approach of ships and aircraft, (2) defences that may oppose the landing force (LF), and (3) defences that may oppose the post-landing advance of the LF. When the number of ships permits, each assault battalion will be assigned a ship in direct support (DS). The DS mission establishes a one-to-one relationship between a NSFS ship and the supported unit. The ship delivers fire on planned targets and targets of opportunity in her zone of fire, which normally corresponds to the zone of action of the supported unit. When possible, ships capable of performing simultaneous missions will be given a DS mission to allow for maximum firepower to the forward units of the LF. The general support (GS) mission requires a NSFS ship to support the force as a whole or that portion of the force to which the ship is assigned. A ship in a GS role attacks targets in the zone of fire which corresponds to the zone of action of the supported unit. Prearranged fire is delivered in accordance with a schedule of fire published in the ATF OPORD and the NSFS plan in the LF OPORD. Fire may also be allocated to a subordinate unit for a specific mission(s). Upon completion of the mission(s), the ship reverts to the GS role. Ships in a GS role support regimental-sized units or larger. Conventional and precision-guided munitions. The JFS/IFS munitions are divided into two different categories9: 1. Unguided Munitions. It follows the ballistic trajectory. Their accuracy is directly related to the delivery platform (e.g. Topographical, Meteorological and ballistic data). The ability to guarantee first round effective fire is dependent on the accuracy. The accuracy of the system can be improved through registration fires, calibration or/and adjustment. 2. Precision Guided Munitions (PGM). PGM are munitions for which the effect and its point of delivery, in time and space, may be controlled, either internally or externally, after departure from the launch platform. PGM can be divided in the following types: – Laser-Guided Projectiles (LGP); – Terminally Homing Projectiles (THP); 9 Ibidem, p. 3-3 and 3-4. 97 TOMASZ RUBAJ – Trajectory Correctable Munitions as e.g. Course Correcting Fuzes (CCF) or GPS guided munitions, – Sensor Fuzed (Sub) Munitions, – Loitering munitions (LM)10, – Video link lock-on munitions. An ammunition resupply system. The overall capability of the JFS/IFS is to a great extent dependent on an effective logistic support system. The timely and guaranteed resupply of ammunition is a critical factor. Therefore, the logistic support system of the JFS/IFS has to be capable of resupplying the various components of the assets in all weather and terrain conditions. This is complicated by the dispersed deployment of the components. The system possess a significant transport capability. This has to include the capacity to carry a basic load of ammunition. Ammunition resupply system should be controlled by an effective logistic management system, capable of monitoring stock levels throughout the supply chain and facilitating the timely movement of stocks. The role of JFS/IFS is to support the ground manoeuvre forces with fire and effect. The artillery commander at all levels is the JFS/IFS adviser of the manoeuvre commander and an expert supporting manoeuvre forces with all types of fires. They are responsible for the integration, synchronisation and coordination of fire support delivered by air, maritime and land effectors, in time, space and purpose, in support of the common land operational objective. It only emphasises the fact that synchronisation of JFS with the supported forces is essential. JFS may thus provide lethal or non-lethal effects in such a way as to have synergistic effects on land operations. Nevertheless, IFS provides close and deep fire support, counter battery fire and contributes to the suppression of enemy air defences (SEAD). The tasks of JFS/IFS are based on the concept of operations and the intent of the manoeuvre commander. These are the basis for combat organisation. In detail: – Allocation of IFS assets (effectors and sensors). – Taking part in the intelligence cycle and STA. – Fire support and effects integration. – Command and Control (C²) of all IFS. – Coordinating the Joint Fire Support effects. – Liaison and cooperation with other services, branches and combined forces. – Execution of combat service support. – Force protection. 10 Loitering munitions: Munitions able to remain in position over a target area and to be reassigned a target in flight. During the attack phase target can be aborted with the munition returning to the loitering mode. These munitions are delivered by a wide range of platforms e.g. rocket launcher, plane or ship. Details concerning this specific topic are given in Artillery Procedures AArtyP-1(B), NSA, Brussels 2009. 98 FIRE SUPPORT – AN INTEGRAL PART OF CONTEMPORARY OPERATIONS Effectiveness of the JFS/IFS effort is measured by creating desired effects on the enemy, setting conditions for decisive operations, and supporting force/joint force operations. Effective JFS/IFS support depends on planning for the successful performance of the following four basic fire support tasks: (1) Support Forces in Contact. The commander must provide responsive JFS/IFS that protects and ensures freedom of manoeuvre to forces in contact with the enemy throughout the operational area. (2) Support the Concept of Operation. Commanders set the conditions for decisive operations by successfully attacking prioritised targets. (3) Synchronise JFS/IFS. JFS/IFS is synchronised through fire support coordination, beginning with the commander’s estimate and CONOPS. Joint fire support must be planned both continuously and concurrently with the development of the scheme of manoeuvre. Further, operations providing joint fire support must be synchronised with other joint force operations (e.g., air operations, intelligence functions, special operations, and IO) in order to optimise the application of limited resources, achieve synergy, and avoid fratricide. (4) Sustain JFS/IFS. Joint fire support planners must formulate joint fire support plans to reflect logistic limitations and to exploit logistic capabilities. Ammunition, fuel, food, water, maintenance, transportation, and medical support are all critical in sustaining joint fire support operations. As can be seen from the appraisal provided so far, Joint Fire Support doesn’t exist in a separate manner in the battlespace/Joint Operational Environment, however in specified periods of battle/operation, commanders can dominate the above areas covering them with reconnaissance and fire, without sending troops there. Moreover, fire has a unique ability to engage targets in depth (especially in shaping operations) in order to reduce enemy combat power before close combat (decisive operations) occurs. At the tactical level fire exists between elements of combat power. Combat power is the total means of destructive, constructive, and information capabilities that a military unit or formation can apply at a given time. As far as Army forces are concerned, their combat power is generated by converting potential into effective action. There are eight elements of combat power (See figure 4): the six warfighting functions (mission command, movement and manoeuvre, intelligence, fires, sustainment, and protection) which are multiplied by leadership and complemented by information. In other words, commanders apply combat power through the warfighting functions using leadership and information. 99 TOMASZ RUBAJ Source: Operations, Headquarters Department of the Army, Washington, February 2011, page 4-1. Figure 4. The elements of combat power A warfighting function is a group of tasks and systems (people, organisations, information, and processes) united by a common purpose that commanders use to accomplish missions and training objectives. Decisive, shaping, and sustaining operations combine all the warfighting functions to generate combat power. Additionally, all warfighting functions possess scalable capabilities to mass lethal and nonlethal effects. No warfighting function is exclusively decisive, shaping, or sustaining. The Army’s warfighting functions are fundamentally linked to the joint functions. At the operational level there are joint functions. Joint functions are related capabilities and activities grouped together to help JFCs integrate, synchronise, and direct joint operations. Functions that are common to joint operations at all levels of war fall into six basic groups — C2, intelligence, fire, movement and manoeuvre, protection, and sustainment. Fire is closely connected with all joint functions (elements of combat power), and especially with manoeuvre. The foundations of joint fire support are based on the elements of combat power, the principles of joint operations and joint functions. The elements of combat power are combined to provide the basis for the generation of overwhelming firepower. The fire support system has its roots in the firepower element of combat power. The fire function encompasses a number of tasks (or missions, actions, and processes). Targeting is the process of selecting and prioritising targets and matching the appropriate response to them, while considering operational requirements 100 FIRE SUPPORT – AN INTEGRAL PART OF CONTEMPORARY OPERATIONS and capabilities. Targeting supports the process of linking the desired effects of fire to actions and tasks at the component level. The art and science of Joint Fire Support is how to synchronise joint fire and manoeuvre in support of JFC objectives. Coordination between components in order to maximise the target detection, planning and execution of targets to create the effects desired with attack resources is the critical function of the Joint Fire Support System. As was mentioned, Joint Fire Support may include, but is not limited to, the lethal effects of air support by fixed- and rotary-wing aircraft, naval surface fire support, artillery, mortars, rockets, and missiles, as well as nonlethal effects of some EA actions and space control operations, as well as other nonlethal capabilities. Integration and synchronisation of joint fire and joint fire support with the fire and manoeuvre of the supported force is essential. The JFC helps to ensure this unity of effort by doing the following: – Coordinating Reconnaissance, Surveillance & Target Acquisition; – Developing plans & orders; – Running a Joint Targeting & Coordination Board; – Supporting a Joint Fires Element or augmenting the fires staff as required. To express the Joint Fire Integration idea I would like to quote the Fire Integration principle: “The integration of deconflicted fire with movement to achieve manoeuvre”. Synchronised Joint Fire Support requires the coordinated interaction of all of the elements of the fire support system, thorough and continuous planning, aggressive coordination, and vigorous execution. To synchronise joint fire support operations, “commanders and staffs must have a thorough knowledge of each Service’s doctrine, major systems, significant capabilities and limitations and often their Tactics, Techniques and Procedures”. Combining Joint Fire Support and manoeuvre relies on the fundamental and beneficial effects of teamwork, unity of effort, and synchronisation of capabilities in time, space, and purpose. Manoeuvre and Joint Fire Support are complementary functions that are essential to achieving the Joint Force Commander's (JFC) objectives. Joint Fire Support neutralises, destroys, or suppresses enemy forces and disrupts enemy manoeuvre, both on the surface and in the air, which assists the manoeuvre of friendly forces. The JFC is responsible for ensuring the synchronisation and integration of joint fire. The challenge for the JFC is to integrate and synchronise the wide range of capabilities at his disposal. The operations directorate of a joint staff (J-3) serves as the JFC’s principal staff advisor for the coordination, integration, and synchronisation of Joint Fire Support with other major elements of operations. The J-3 recommends, coordinates, reviews, designates, and disseminates fire support coordination measures, manoeuvre control measures, and airspace coordinating measures as part of the overall concept of the operations for joint fire and joint fire 101 TOMASZ RUBAJ support. The JFC may approve the formation of a Joint Fire Element (JFE) within J-3. The JFE advises the JFC and assists J-3 in joint fire planning, coordination, and execution. The JFE would be composed of a variety of experts from the joint force headquarters, the components, the combatant command, and other supporting organisations as required. Typically, JFCs organise joint targeting coordination boards (JTCBs). If the JFC so designates, a JTCB may be either an integrating centre for this effort or a JFC-level review mechanism. The joint targeting coordination board normally reviews target information, develops targeting guidance and priorities, and prepares and refines joint target lists. The JFE would also take the lead on providing the Joint Fire information for any Operations Plans, Orders or Fragos. JFE has numerous functions throughout the Joint meetings, working groups and boards in order to enable the targeting process. To summarise, I would like to underline, that the latest standardisation agreements have extended the range of capabilities from the influence on enemy forces to the sphere of influence in order to achieve desired effect, not only physical but also psychological. Therefore, Joint Fire Support (JFS) and Effects is the coordinated and integrated employment of all weapon platforms delivering fire (it includes land, air, naval delivered indirect fires) to achieve the required effects on ground targets to support land operations in the full spectrum of conflict. It encompasses the integration of indirect fire and effect in order to influence the adversary forces, installations or functions. Joint Fire Support Element (JFSE) could either encompass influencing elements such as PSYOPS, CIMIC, and EW or be incorporated in a wider cell dealing with the overall influence on activities. Lethal and non-lethal – these more and more common functions, seek not only physical effect, but more importantly, effects on the understanding, perception and will of the adversary. The necessity of conducting JFS more often occurs and reflects the tactical level as well, because of the complexity of the contemporary operational environment (non- linear and non-continuous battlespace, dispersion of forces, high operations tempo, and the short time of reaction required in most cases). For this reason JFS should be coordinated, synchronised and integrated in the frame of three vital components: surveillance and target acquisition (STA); command and control (C2); and weapon (delivering) systems. Among these assets Field Artillery Forces posses a relevant part of each mentioned subsystems and their capabilities have an influence on battle during shaping and decisive operations. The chosen solutions from different countries presented here have been experimented with and put into practice, and experiences from latest and current peace support and stability operations, indicate planes and directions of further researches and development of Joint Fire Support and Effect System, and have proved its` crucial role in contemporary operational environment. 102 FIRE SUPPORT – AN INTEGRAL PART OF CONTEMPORARY OPERATIONS Instead of a final conclusion I would like to quote General George S. Patton in what he said to his soldiers prior to US involvement in World War II - he reflected on combined arms/ joint warfare and comparing it to an orchestra: “There is still a tendency in each separate unit...to be a one-handed puncher. By that I mean that the rifleman wants to shoot, the tanker to charge, the artilleryman to fire...That is not the way to win battles. If the band played a piece first with the piccolo, then with the brass horn, then with the clarinet, and then with the trumpet, there would be a hell of a lot of noise but no music. To get the harmony in music each instrument must support the others. To get harmony in battle, each weapon must support the other. Team play wins. You musicians of Mars must not wait for the band leader to signal you...You must each of your own volition see to it that you come into this concert at the proper place and at the proper time...” General George S. Patton, Jr., 8 July 1941, address to the men of the 2nd Armored Division, The Patton Papers, Vol. II, 1974 Bibliography AAP-6, NATO glossary of terms and definitions, NSA, Brussels 2011. Artillery Procedures AArtyP-1(B), NSA, Brussels 2009., Bailey J. B. A. Maj. Gen., Field Artillery and Firepower, Naval Institute Press, Annapolis 2004. Fire Support Integration Paper, Canadian Department of Defense, 2008. Joint Fire Support, JP-3.09, Joint Chief of Staff, 2010. Joint fire support in 2020, Naval Postgraduate School, Monterey-California, 2006. NATO Field Artillery Tactical Doctrine AArtyP-5 , NSA, Brussels 2001. NATO Indirect Fire Systems Tactical Doctrine AArtyP-5(A), NSA, Brussels 2010. Operations, Headquarters Department of the Army, Washington, February 2011. Rubaj T., Połączone wsparcie ogniowe – zdolności i atrybuty operacyjne sił oraz wybrane aspekty organizowania, Zeszyty CSAiU, Toruń 2008. Rubaj T., Artyleria w połączonym wsparciu ogniowym, referat wygłoszony podczas Seminarium Naukowego w WSOWLąd. nt. Artyleria we współczesnych operacjach, ZN WSO WLąd. Nr 2/2012, Wrocław 2012. Połączone wsparcie ogniowe - integralna część współczesnych operacji, materiały z Seminarium Naukowego zorganizowanego przez Zakład Wsparcia Działań IWLąd. WZiD AON w dniu 03.04.2012 r. (w opracowaniu). 103 WALDEMAR SCHEFFS NDU Scientific Quarterly no 4(89) 2012 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE Col. Waldemar SCHEFFS, D.Sc. National Defence University Abstract Gaining the upper hand and, in the long run, achieving victory is an aim that each of the battling parties strives at. Supremacy can be achieved through a variety of measures ranging from political pressures to military action. The rapid technological advancement of IT engineering has given rise to clandestine and intense war in the electromagnetic and IT environment. A signal transmitted simultaneously to a large number of receivers has become a tool to wage this kind of war. The signal itself is devoid of power and mass. However, when combined with the signal that transmits it, it becomes a decisive factor and stage of military action. New technologies have given rise to new potential areas of warfare. Cyberspace is the most telling example of an artificially created environment in which bits transmitted through an appropriate signal play the dominant role. This new warfare environment has been claiming an ever larger proportion of the ways of sending and receiving information: command, reconnaissance and electronic war, among many others. An in-depth grasp of the functioning of electrical apparatuses in a new environment constitutes the gist of the paper at hand. The article mentions topics closely connected with the automation of electrical devices operating under two different conditions: cybernetic and electromagnetic. One dovetails with the other and both could use the same type of equipment, yet their functions differ. The common area of operation of equipment in both environments and the possibility of their undergoing the process of automation allow whole new reconnaissance systems to be developed. Furthermore, the paper attempts to define the foregoing environments through the prism of operating in network-centred environment. At the same time some effort will be made to point to a new meaning of the concept “work in an electronic environment” taking its source in information hostilities. Key words – electronic warfare, cyberspace 104 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE Introduction Since the middle of the 20th century we have been observing a revolution in science and a rapid development of the industrial world which is characterised by the vast production and consumption of a variety of goods manufactured by man along with those used as crude resources. Not only have electronic devices dominated the life of man, but also industry in general, the lion share of which has been taken up by the military. Currently many scientists are of the opinion that Electronics and Informatics have become part and parcel of everyone`s daily life. Military engineering in WW II was developing fast, as seen from that time. Electronic equipment was very modern (electron lamps, triodes, pentodes), yet not without limitations: mainly power consumption and size. The first major breakthrough came with the scientific design and development of the magatron lamp used in radio detectors. The revolution proper transpired with the close of WW II. The transistor and integrated circuits triggered a boom in electronic circuits of various use. The military sees in it a great potential and have put electronic devices to a wider use in such areas as communications, reconnaissance, air defence, and artillery. Electronic equipment is used in military vehicles on a more regular basis (tanks, armored vehicles, wheeled vehicles, and modern stealth aircraft steered by man). Perhaps in the not so distant future similar aircraft following on from UAVs (Unmanned Aerial Vehicle) will be carrying out military action. Airspace is not the only area where electrical devices reign supreme. The navy with its warships and submarines is yet another example of metal leviathans packed full with missile steering equipment, command, recon, communication, electronic battle, unit control etc. Any one vessel is a self-contained stronghold. Be it alone or in a group of vessels, it is capable of locating, recognising, and destroying a target at a large distance. Warships are equipped with stale-of-the-art technology, being a live example of how to forge cutting edge ideas into practicability. Without electronic equipment and computerisation space flight would remain unattainable. The recent mission of the last space shuttle, Atlantis, does not put pay to space exploration. It merely marks an end of a stage, in which Electronics and Informatics have dwarfed the obsolete technology. Needless to say, one must not disregard military engineering on land. Steel stallions are movable robots, in which electrical apparatus serves as a basis for a well-aimed fire. The crew operates a vehicle enabling the defeat of the opponent from a safe distance. Finally and most importantly, there is the human soldier. The soldier of today may not be a cybersoldier yet; however, taking into account the sheer amount of electrical military gadgets at his disposal, one can go as far as to talk about a revolution with respect to soldiers` add-ons. While personal firearms are still considered the basis of any soldier’s equipment, every so often one hears about PDA computer terminals enabling more efficient command, sending information concerning hostile 105 WALDEMAR SCHEFFS reconnaissance and enabling more efficient fire, at the same time staying clear, out of sight. All of the afore-mentioned electronic devices remain operative in electronic, electromagnetic or IT environments. Separately or together with others, the devices can all be identified and jammed with electromagnetic energy or with a signal carrying a program that infects an operative system. The problems seem to lie with the identification of devices working for electronic warfare systems on the one hand, and those that could be used in an information environment, on the other. As inanimate matter, electronic equipment in general, and its operativeness in particular, can undergo automation. Caution should be kept as to which devices and in which order, as well as to whose benefit can undergo this process. This paper is devoted to these particular issues. The first two chapters are concerned with the use of electronic equipment in an electromagnetic (environment) and cybernetic exploited in electronic warfare systems. The contents of those chapters exemplify the possibilities of identification of devices with a practical potential in both environments being the same apparatus but serving different functions. Hostilities in an Electronic Warfare Environment Electromagnetic Waves as a Combat Environment Until relatively recently the range of light visible to the naked eye was sole range of the spectrum used inadvertently by man. In battle the visible light spectrum was initially used to collect data through observation and to transmit a priori established light, smoke and similar signals. However, those ranges of the spectrum, as well as the subsequent means capable of transmission, were considerably limited by the distance to which signals were relayed. Inevitably, transmission was dependent on the broadcasting position (Data Terminal Position) as well as particular transmission sectors. Not until the invention/discovery of radio waves was the electromagnetic space used to its full potential. Following this, the possibility of confrontation in this very environment materialised. The last decade of the 19th century saw the first confrontation in the electromagnetic space. This was marked by the invention of the first wire telegraphs and the transmission of militarily useful signals via radio waves. War, as seen from this perspective, began to take shape at the turn of the 20th century. It was at that time that a certain level of technology was reached allowing the radio to pay service to the military. Almost simultaneously, with this new use for the radio, there was a sudden outbreak of war within the electromagnetic space. At the very beginning, military operations aimed at intercepting and deciphering information sent via radio. Moreover, as a standard procedure they sent out signals in order to disrupt the ones sent by the enemy. With radio technology ever quickening its pace 106 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE of development, new methods of waging clandestine war began to emerge. Novel solutions, based on divergent scientific thought began to emerge, these included: reconnaissance, pre-emptive strikes, radio-location, and radio propaganda. In the years separating the two World Wars the seeming gigantic radioelectronic advancement did not translate itself into new modes of combat nor into an improvement in combat methodology. The main area of confrontation was reconnaissance and warmongering done via radio programs. This was mainly in the KF band. By contrast during the 2nd World War, following 1940, the opposing armies saw a rapid development in the forms and means of waging electromagnetic warfare. The allied forces` scientists and engineers brought to a successful end a multitude of programs that provided the military with a substantial quantity of modern reconnaissance and jamming equipment capable of efficient work across a variety of frequencies. Furthermore, this new technology could emit signals disrupting electromagnetic energy of a considerable intensity. The Third Reich and other Axis Powers were unceasingly carrying out developmental research. They were focusing acutely on defence reconnaissance and radio-wave interferences. Through such steps they strived at maintaining the survivability of their radio-electronic systems. The aftermath of World War Two was characterised by an intensive speeding up in the improvement of technology and forms of waging electronic war. The whole process was further galvanised by experiences gained from different local wars and pockets of military conflict. Especially relevant ones to the issue discussed here are the following: The Korean War of 1950s, The Vietnam War (1964 – 1973), The Middle East Conflicts (fought in the years 1967, 1973, 1981), The Falklands War (1982), The Persian Gulf War (1990 - 1991), The War in Yugoslavia (1999). The aforementioned conflicts have all paved the way for modern electromagnetic warfare. Operations carried out across FM waves have come to be dominant in the aerial, marine, and ultimately cosmic environment. This viewpoint is very clearly reflected in West European countries` policies and in their use of electromagnetic warfare systems. The Iron Curtain countries of the Cold War period firmly believed that an electronic appliances` primary function should rest with ground forces. It played a secondary role when it came to the Navy, and Airforce. The overall proportions of this technology being installed and their tactical usage are visible to this day. Such a glaring disparity of approaches to the same issue takes its source in World War Two experiences. It is also justifiable by the scientific and technological boom in the Western Block. More importantly, one must not disregard here the ongoing arms race. Its two main sides: The USA and The USSR were bent on worldwide domination and were in an urgent need of advanced reconnaissance systems that would remain operative over vast distances. 107 WALDEMAR SCHEFFS At that time it was only long range aircraft that could meet the high technical standards set for reconnaissance. Back then space reconnaissance was at its “drawing board” stage. US strategic reconnaissance gave rise to new directions on the development of electronic equipment, including recon and jamming devices. Long range reconnaissance with an accompanying spurious signal stands at the center of innovativeness. It constitutes the essence of technological thought and prevails in the construction and later use of electronic devices. The electromagnetic wave setting has become an undeniable domain in the arms race and covert operations. The Work of Electronic Warfare Systems under Electromagnetic Conditions In accordance with the established doctrinal provisions, operations taking place within an electromagnetic setting are carried out in all manner of military activities and should be taken for granted. Such operations are mainly the domain of special units equipped with reconnaissance, jamming, and electronic defence systems. The electromagnetic setting allows for electronic warfare. Thus, the operational area of electronic warfare is electromagnetic space as well as radio-electronic sources emitting and receiving electromagnetic energy. The EW (electromagnetic warfare) setting is characterised by the following traits: the range of electromagnetic spectrum used, the density of frequencies used, the surrounding density of electromagnetic energy, the total number of operating electromagnetic devices per square kilometer, the deployment of individual radio-magnetic devices and their proximity in relation to the contact line of troops, the specification and distribution of key military facilities e.g., main communication junctions, radar stations, reconnaissance centers, communication satellites. Electronic war spans over the same range of frequencies used by hostile radio-electronic systems which include communications, radio location, tele-detection, and radio navigation. The relevant band range from 30 KHz to 40 GHz to infrared and finally to light visible to human eye. The deployment of particular radio-electronic devices determines which areas and which frontiers are manned with the required amount of equipment. Being familiar with charts down to the minutest detail is key in estimating the effectiveness of RM (radio magnetic) interference from specific sources. Moreover, it is essential that there be a detailed specification of vital RE (radio electronic) facilities as well as their viable positions. This is done in order to set a proper course of action for reconnaissance and allow an appropriate amount of time for jamming with the use of electromagnetic impulse or munitions. Electronic Warfare with diversified operational and tactical activities of troops strives at gaining information about the systems and measures of electronic ground forces; the aircraft forces and their defence potential; the navy; and weapons operating in outer space. Disruption and deliberate disorganisation of the reconnaissance systems of hostile armies and their commanding officers is central to its definition. Of all the mentioned ways of waging this kind of war, the EM 108 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE waves setting is slowly but surely taking the lead. One can provide a number of examples of armament systems where electronic devices play a subsidiary role in achieving the expected results is of top priority: 1. command and communications systems (C2W) 2. radio-technical systems 3. munitions control systems (missiles, UAV) 4. reconnaissance systems (e.g. optoelectronics) 5. aircraft defence breaking systems (SEAD) 6. electronic warfare systems (including EM impulses) 7. IT systems (including cybernetic systems) 8. navigation systems (GPS, Glonass) 9. various back-up systems used by the navy and ground forces The electronic equipment in question is being used continuously irrespective of war, crisis or peace. The only factor susceptible to change is the extent of military operations in each of the respective states. The approach toward the work of electronic devices in the EW environment within the Polish Armed Forces and in relation to the whole theory refers to specific tasks and is strictly task-oriented. During peace, military headquarters make all the necessary preparations over a certain timespan. Those preparations are subsequently tasted on the range. The planning officers of particular electronic combat units analyse hostile activity, assess potential risks, plan the chain of operation stages, see them through, and finally check whether the entire enterprise has yielded the expected results. They verify this by receiving the enemy`s signals from particular bandwidths. Should the operation turn out a success they proceed with the next stage. If the results do not come up to the expectations, the whole procedure is repeated or the final decision verified and the operation continues. The rule of thumb in operations and planning is: plan-realise-check-verify. It has a strong footing and immense historical background and has been widely used by virtually any armed forces involved in electronic warfare. For almost eight years now a new concept concerning EW has been on NATO`s agenda. Its centrepiece is to ascertain specified end results even prior to planners beginning their work. The concept came to view in a publication issued in 2008 under the title, NATO Electronic Warfare Policy (MC 0064/10). It rests with the planner to define the results of electronic combat operations conducted under electromagnetic conditions. Moreover, it is their duty to assess how this will affect the success of the operation. This leads to an entirely new outlook on the planning phase, the preparation, and the actual carrying out of electronic combat. The previous approach had it that with a certain amount and specific type of EW equipment, the enemy`s EW potential was expected to be diminished. What was taken into consideration was the degree of damage to hostile electronic potential with a rough estimate of the outcome of the battle. The operation was to be repeated until the desired effect was reached. The latest approach, by contrast, is 109 WALDEMAR SCHEFFS achieving the objective by any means. Depending on the challenge ahead a varying amount of equipment and munitions is used in order to accomplish the end result. If the EW arsenal of a given country happens to be insufficient, it is enhanced by a surplus from other NATO states. Thus the new framing of electronic warfare assumes joint operations. In a leap-frog over the next few subsections, it could be claimed that such operations will most certainly play a fundamental role in future electromagnetic warfare. The Automation of the Work of Electrical Equipment in Electronic warfare Systems The concept of automation is applicable to both the analytical and planning process. Moreover, it also refers to the procedure of realising combat operations via the electronic route. Finally, one can talk about the automation of information transfer to the decision-maker and back. A consequential question follows: can all processes be automated? Furthermore also, can all reconnaissance and jamming devices be coupled into separate automated systems? The latest generation of these technology items leaves the assembly-line semi- or fully automated and serve as multi-task appliances. We run up against problems trying to piece together the old with the cutting edge. Keeping to standards in this situation boarders on the impossible. Some items fail to be automated due to their technological incompatibility. Others can be automated, however only to some extent. Financial and technical analyses state in no uncertain terms that building EW systems on older generation devices will generate financial losses. A more advisable solution would be the development of a whole new system based on our own engineering thought and with the aid of domestic industry. To better understand the problems connected with automation, it is essential to possess a good knowledge of the characteristics of conducting operations in an electromagnetic environment. The Polish Armed Forces fight this war mainly from the ground and the sea. In other words, operations are run in a limited two-dimensional environment. Here we can talk about the width and depth of the battlefield zone. The potential role of the airspace has been underscored, but thus far severely underused. The possibility of realising tasks has been diminished by tactical units' demarcation lines as well as the limited range of communication between them. The pervasiveness of EW combat can be impeded by the inability to receive electromagnetic emission i.e. the radio horizon for VHF, UHF, SHF, and EFH bands. Also, of much relevance here is the distribution of hostile electrical equipment. The total number of EW systems at the Polish Armed Forces` disposal leaves much to be desired. Currently, we are far from possessing a fully fledged automated EW system. Not even the automated system Wołczenica can render the military fully automated. It is still the case that many subunits fight with no automation whatsoever when it comes to tactics and operation. The whole of reconnaissance and jamming is done manually through sound waves from command post subunits. This leaves the commanding officer of 110 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE the subunit with insufficient time for reaction to the rapidly changing conditions on the battlefield. Combat dynamics is characterised by a quick pace of change. Consequently, without an instantaneous reaction to the detected sources, the tactical unit will be exposed to electronic hostilities from the enemy. In practice, there is no need to jam every single source. In some situations it is left to the soldier`s discretion to decide which source should take priority. That is why automated command and control apparatus should be equipped with manually operable equivalent. Control relations at the level of EW subunit The exchange of information The relation of command from the command post of the tactical unit WE WE WE WE 20 25 WE 20 WE 15 25km 10 10 5 FEBA Picture 1. EW Company formation at the tactical level The tactical operating of a EW company via radio is by direct orders issued by G2 SD tactical unit (pic. 1). The entire system is controlled by the EW chief commander and individual posts are run by the EW company commander. The update on the progress of the operation is sent to the analysis and assessment team in the G2 unit. The presented command mode of the EW company devoid of a fast radio connection severely undermines the effectiveness of electromagnetic combat. This is also the case at the operational level. Without automated systems, the HF band cannot be used to its full potential. A particular subunit equipped with outdated technology does not match the high standards of the modern battlefield. The lack of automated systems controlling reconnaissance and jamming has its consequences in the located radio signal being terminated even before the jamming initiates. The HF jamming subunit works in phonic-manual mode most of the time, although it also has an in-built semi-automated control unit. Its wear and tear 111 WALDEMAR SCHEFFS causes its fallibility. The EW system code-named Przebiśnieg was to have been an answer to these shortcomings. The system is used by an EW company at the tactical level. It constitutes an internally automated system at the subunit level. It has significantly improved the system`s detection, tracking, and jamming capabilities. Up to now, it has not reached the required reconnaissance penetration across the entire reconnaissance zone of the tactical unit, approximately 50 km., even though the antenna was operating at 50 meters above sea level. Each subunit in the system is controlled via radio using a TDMA time loop emitted from the commanding vehicle. This is synonymous with automation. What is more, each system is perfectly capable of individual work, being independent from others, and aggregating information intercepted by the commanding vehicle. However, one downside of the system is the yet unresolved problem of a simultaneous display of the results obtained from reconnaissance and tracking in the EW company command vehicle. The commanding officer has only radio or radio location devices to rely on. He or she does not have insight into data verification essential in assessing the tactical and/or operational character of each source. Yet, the very basic design flaw of the Przebiśnieg system is the lack of direct connection of automatic data transmission and control in the commanding tactical unit. The commanding unit should be able to send and receive data to and from the system respectively. It is a top priority that this missing element be designed, developed, and put to use in the ground forces. It is vital that a vehicle receiving and sending data automatically should be able to make use of the existing means of transmission. Otherwise the system will co-operate with the EW subunit only. If this is the case neither the commanding officer nor the headquarters will receive data in real time but with a considerable time lag. There is a real danger that vital decisions will be taken based on partial data. This being said, it is obvious that automation of EW subunits is an absolute necessity. In the future development of EW systems the main emphasis will be placed on data transmission. The speed with which reconnaissance and prevention function have a major say in the efficiency of the systems. A fast track to achieving this goal is possessing a perfect medium of data transmission. Still in the pipeline, the system Kaktus is to meet this requirement. It will be able to transmit data in almost real time. The system, apart from having an internal automated module, will be equipped with external modules as well. With a variety of communication systems data aberration will hardly be noticed. Such a technical solution ensures the unhindered flow of information in the form of written text, graphics or images. The messages will be able to carry substantial byte-load and will not lose out on quality. For the operation to be carried out in sync with the commanding unit an appropriate reception model is a prerequisite. A separate transmitting vehicle with a direct access to the internal system of data circulation should also meet this condition; without one, even the best system remains a manually operated device of very limited use. In these types of units, data have to be collected first, then 112 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE processed, and finally presented to the commander, who is the ultimate decisionmaker. Needless to say, it takes a considerable amount of time for the data to complete the full cycle. Currently, EW units in the Polish Army have a large portion of this technology produced abroad. The technology is being used at different frequency bands. The vast majority serves to identify and track radio sources. The search and interception of signals relevant for EW units is central to reconnaissance proceedings. The technology used today is capable of detecting most signals, the medium being electromagnetic waves at virtually all frequency bands. The intercepted signals are not always broadcast by radio transmitters. Often the source of transmission cannot be established with certainty. The spectral analysis of such signals helps conclude that their origin may as well be radio waves, computer emission or microwaves. Signals of this type will also be detected and intercepted. Going back to the Przebiśnieg system again, it must be pointed out that there is a possibility to detect and track electronic devices that are beyond the interest of military decisionmakers. Radio receivers are designed to receive a signal up to 3GHz and radio location receivers up to 18 GHz. The problem lies in their ability to identify signals. With an appropriate database built up of signals carrying no information at all such identification is possible. Therefore, reconnaissance appliances can serve a double function. Some will satisfy the needs of EW, others can be used as multifunctional recon apparatus, depending on the need and applicability. Apart from EW purposes, multifunctional receivers will be searching for atypical signals at different bandwidths. With available database patterns serving a touchstone function, it will be possible to identify and jam the source of emission. Here the jamming procedure is a whole different issue in itself. Jamming devices emit energy that makes hostile devices dysfunctional. The information thus transmitted changes its character, and in other situations it is destroyed. The role of those devices is twofold as well. They may be used in EW systems. They may also be used as signals distorting the signal proper in computer networks. If it is assumed that spurious signals carry an additional program such as a virus, then this kind of hostility lies in the domain of the cybernetic environment and can be dubbed cybernetic warfare. The Cybernetic Environment – Terminology Operations across and within computer networks should be understood through the prism of the changes that have been taking place during military conflicts as well as operations other than war. With the end of the Cold War period and the global, bipolar, military status quo, an entirely new political situation has emerged. The situation has changed dramatically when it comes to global security. Over the last few decades we have been witnessing emergency situations we never faced 113 WALDEMAR SCHEFFS before. An immediate result of those changes is a non-standard use of armed forces and a new approach toward planning, commanding, controlling, and collaborating with domestic troops as well as allied forces abroad. We are also observing a major change in the attitudes toward non-military organisations, for instance, humanitarian organisations under military supervision. The massive influence those changes have, has given rise to a number of asymmetric effects on domestic and hostile forces. This exemplifies new hazards in the area of military operations. The traditional methods of waging war are being superseded by surprise attacks using small groups of troops in many places simultaneously. A physical attack, aside from gunfire, has come to be associated with other mediums and cyberattack certainly counts as one of them. Cyberspace is the “primordial soup” that spawned all manner of means of information transfer, be it the spoken word, printed messages or images at present, and holographic images in the future. As far as easy availability of information is concerned, global data transfer constitutes a bona-fide revolution. The military are trying to make the most of this state of affairs. Any commanding officer`s decision can be tracked online. Commanders and their troops have become mass media hostages. Their decisions are assessed by domestic and foreign audience. The cybernetic setting, which has become their working ambience, is transparent to public opinion always hankering after the latest developments. The fast tempo of development in the IT area made such easy access to information possible. Countries all over the globe started coming up with different definitions of information networks. The concept as we know it began to take on new meaning when approached from a global perspective. It has been extended to encapsulate gathering data, detecting and jamming the information setting. For some time there has been a noticeable increase in the bulk of material published on the topic of cyberspace. Many authors have been taking the term for granted, without giving much thought to its true meaning. Some of them seem to blur and skew its meaning in attempting to present their views. One consequence of the nascent change was a new doctrine proposed by the US Armed Forces in December 2008. It was made public as The National Military Strategy for Cyberspace Operations (NMS-CO). It defines the cybernetic domain, enumerates potential threats, and nephralgic areas. It constitutes a basis for further military action in this area. The doctrine itself is an expression of a multidimensional strategic approach by the US Army to the use of cybernetic operations ensuring the nation`s supremacy in this field. According to the doctrine, this objective is to be achieved through an integrated cybernetic offence with defensive operations aided by highly-qualified personnel. The doctrine is an attempt at defining cyberspace. Cyberspace is a domain characterised by the use of electronics and the electromagnetic spectrum for gathering, modifying, and exchanging data via network systems and the accompanying physical infrastructure. The document contains an older definition from a previous publication (JP 1-02). It reads as 114 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE follows: cyberspace – a virtual environment in which digitalized information is made available via computer networks. These two framings of cyberspace differ glaringly when juxtaposed. While in the older version access to data is exclusively through computer networks, the latest version includes a selection of electronic devices and accompanying physical infrastructure. Both definitions refer to already existing information networks. However, cyberspace`s social dimension should also be taken into account. Traditional social relations stand in great contrast to the ones maintained over and with the help of the Internet. Time and space lose their core meaning in cyberspace. Interpersonal relations are of the essence. In this respect borders between countries have ceased to exist and people using the Web have become uncontrollable. Everyone is connected to everyone else while remaining an anonymous netizen. It should be reiterated that cyberspace can be approached from different angles. It could be treated as a human activity aided by information technology, where all activity is synonymous with technology, and where geographical notions are irrelevant. As was pointed out by P. Villo “… its elements are devoid of an expansiveness dimension, they function within and can be subsumed under a specific timeframe across which information flows. […] Integrated computers and computer displays render the division into the here and there non-existent. It is almost a cliché to say that cyberspace is a new medium transferring data at light speed by means of bits. Even without a sharpened definition we seem to know instantly that what authors have in mind are computer networks in general and the Internet in particular. Cyberspace is treated as something created artificially. A value stripped of geographic parameters, immeasurable and limitless. As Z. Bauman pointedly observed: ”its frames and boundaries are measured by the current level of IT advancement and the extent to which the world has been Interneticized”. Indeed, what we call distance in cyberspace is far from being an objective impersonal datum physical in character. All remaining factors, by means of which group identities arise, gain and preserve their uniqueness. The character of contact between networking users has changed since the first stages of cyberspace. Interpersonal relations have turned into a form of partnership, while freedom of speech is gaining wider and wider ground. Territorialism has become a thing of the past. It is no longer possible to control who communicates what to whom. The most pressing issue then is not so much an unimpeded flow of information but the control of virtual space. Democratic countries wanting to control cyberspace are obliged to adhere to fundamental human rights, the freedom of expression being one of them. It has been decided that since cyberspace cannot be controlled, the effects of its functioning ought to be minimised. The results of those measures can be observed in a limiting of access to some Internet content for underage users. Access to sites promoting pornography and violence are automatically censored. Similar steps are taken by companies toward their employees. The same is the case with authorities banning access to 115 WALDEMAR SCHEFFS aggressive, subversive or otherwise unwanted Internet content. In some Asian and Arabic countries such practice has become standard. Many authoritarian regimes go to great lengths to keep their society ignorant. They purposefully block Internet sites, some of which are fertile ground for insurgency. Such countermeasures may prove effective, as a broadband connection in these countries is still a rarity. Cyberspace is thoroughly discussed in an official document published in Poland in 2008 entitled Governmental Program for Cyberspace Protection for the years 2009-2011 – Provisions. It is a reaction to different measures taken by the EU. The document provides specific guidelines for the Polish presence in cyberspace. It also provides a simple definition of the term, which reads: Cyberspace is communication space consisting of a system of internet links. It provides some names of governmental organisations working in the cyberspace environment, which include: MSWiA, ABW, MON, SKW. Moreover, it mentions non-governmental organisations, and owners of resources, etc. It informs that the Polish Ministry of Defence (MON) has been granted its own share of responsibility for cyberspace. The legal basis for the Armed Forces jurisdiction is the document Decision of MON nr. 375/MON dated 29/07/2008 concerning the response to computer incidents in the National Defence Department. This can be taken as red that the military had already been involved in cyberspace activities. Following government decisions The Minister of National Defence formed The Polish Armed Forces Centre for Cybernetic Security, which is to be in charge of cybernetic hostilities at the operational level. Professionals working at the office define operations in cyberspace as an easy access to and wide use of electromagnetic waves. Following their idea of cybernetic activity; It is a global expanse within an IT setting comprising the Internet, telecommunications networks, and IT systems. Cyberspace can be understood as accomplishing different objectives via cyberspace route. Those measures include activities whose aim is to gain and protect relevant data. This take on the matter corresponds with the American definition. Cybernetic operations are a true evolutionary milestone. Obviously, the trend setting country in this respect is The United States of America. It can boast the most advanced IT in the world. With the document DD 3 – The US tries to define cyberspace, extending its core meaning to include cybernetic operations and cybernetic defence. The concept has been extended to include by an IT domain. Here, cyber-ops are explained away as cybernetic solutions where self-interest plays a key role. Such operations include activities in IT networks and activities defending the Global Information Grid. The set of aforementioned definitions help to sharpen the concept of the cybernetic advantage to operating in cyberspace as a method of carrying out hostilities in a given time and domain without unwanted interference. 116 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE The Correlation of Electrical Apparatus After WW2 both civil and military theoreticians were of the view that future wars will be strictly tied with outer-space and the electromagnetic spectrum. The views expresses placed the EW waves as the most palpable background for military conflict. This claim is substantiated by numerous examples of the use of electronic weapons throughout history. The evidence for the shift toward the EM dimension is further confirmed by many innovations introduced to the field over the years. The view expressed by the historian Michael Howard in his book War in the History of Europe tellingly frames the issues related to the development and use of electronic means of communication, cryptography, reconnaissance, and radio location. (…) The side that prevailed eventually was more capable of keeping track of the enemy`s movements, deciphering its messages, and at the same time it could keep its own secrets secret. During World War Two this would not have been possible without the know-how of intercepting radio signals. It can be assumed that already in those years a new war environment was being exploited. One can bring forward countless examples of attempts at categorizing military activities and defining all war dimensions. Up until recently military confrontation was taking place in a three-dimensional environment. This matches very closely human cognition and understanding. Strife at a modern battlefield transcends these barriers. Some theorist talk about as many as six modern warfare dimensions altogether. One of them is Colonel R. Grabau of the German Armed Forces who discusses the multidimensionality of war by pointing to six aspects in waging it. The first three are rather standard and include the following: X-width, Z-depth, and H-height. Additionally, he introduces time, information, and electromagnetic spectrum. He envisages the last three factors to be decisive in future conflicts. The same conclusion was reached independently by a colonel from the United States Airforce in the first years of the 1990s. Colonel John Warder put forward his claim of strategic paralysis, where he presented his Warden`s Model. According to his theory, any enemy can be seen as a collective system of subsystems. Thus, any organisation can be regarded as a structure composed of five inner rings that form a unit and serve different functions. He includes in his model a number of organisations: companies, the military, terrorist organisations, organised crime, among others. Here is an approximation of how his model is supposed to work: 1. Political elites i.e. the controlling factor. 2. Basic institutions – earlier referred to as organic needs transferring energy from one ring to another. 3. Infrastructure. 4. Society – the human factor. 5. Defence Systems – composed of demographic groups. 117 WALDEMAR SCHEFFS The model is organised along the following lines; each of Warden`s rings functions in a specific settling: the sea, ground, air, outer-space, cyberspace. Taking into account current conditions, the model calls for a slight modernisation. Nowadays the preferred setting for various activities is electronic rather than electromagnetic. Thus the fifth ring is divided into two parts, the cybernetic setting and the electromagnetic setting. Air Defense Systems Society Cosmos Infrastrucure Basic Institutions Political Elites Sea Ground EM Environment Cybernetic Environment Electronic Setting Source: Own work. Picture 2. A modified version of Warden’s Model The problems with automation of electronic devices concern the EW waves environment. Neither automation nor electronic systems are issues keenly pursued by Polish military decision-makers. The past as well as ongoing military conflicts especially in Bosnia, Iraq, and Afghanistan provide irrefutable evidence that the IT setting is becoming more and more important in battle. Hence the questions: can electronic equipment be used to detect IT networks? If that is the case, then which devices are these specifically? Can these devices also work in other environments? Perhaps they are operating within a yet undefined one. Traditionally a battlefield used to be described as a closed geographical area, within which hostilities are carried out. The very definition of the battlefield imposed ways of waging war. Nowadays modern combat uses other environments as well. By their nature, they are far removed from the battlefield in a geographical sense, which is responsible for the radical change in the ways war is waged. This is noticeable even at a very fundamental level. As a case in point we can observe network-centric hostilities connected with maintaining a continuous, unimpeded flow of information from the decision-maker to appropriate sensors. Multifunctional 118 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE devices of a global range help individual troops accomplish strategic goals. They keep soldiers up-dated by a continuous flow of data so that they can take optimal decisions. Another telling example is antiterrorist hostilities, especially the ones in a network-centric environment. In the case of opposing an unidentified enemy it is difficult to talk about a battlefield as such. In this context military operations rarely bring the expected result. Asymmetrical conflicts are characterised by an atypical battlespace area. The enemy and its pursuer are constantly on the move. The side whose position is compromised loses out. Conversely, the side fighting by stealth controls the situation. A reaction to this state of affairs was a new concept proposed by the US military. What used to be called a battlefield is now superseded by the battlespace. It includes strategic, operational and tactical conditions irrespective of their geographical location. From this angle, operations even at the tactical level are conditioned by a vast number of factors, most of which lie beyond the commonly understood battlefield. Here, one can talk about other settings for activities. Generally speaking, traditionally organised operations limit the manoeuvrability of the commanding officer with respect to the monitoring and assessment of the situation. His recon capacity is not fully used. This situation is instantly resolved with the application of a network centric approach toward military operations. In other words, the IT and electromagnetic environments prevail. Geospace IT Warfare Environment Network-Centric Environment Working environment of electronic devices in cybernetic operations Electronic Devices. Electronic Devices. Electronic Devices. Electronic Devices. Electronic Devices. Working environment of electronic devices in Electronic Warfare Electronic Environmnet Source: Own work. Picture 3. The working environment of electrical devices in an Electronic Warfare and Network-Centric Setting 119 WALDEMAR SCHEFFS The use of electromagnetic energy in air, outer-space, and water, as well as the use of computer systems in cyberspace directed military action toward a totally new environment where Electronics plays the most important role. Obviously, arms in the traditional understanding will long remain a vital part of any army`s arsenal. However, they will probably be used to scare off potential enemies. The common denominator for this environment are electronic systems and devices. We have thus entered a new era of the electronic environment. One cannot overvalue its role as it is used to operate and control virtually every piece of equipment. Man is an essential component of this mechanism. Autonomous military operations are now possible, which is another great achievement in the field of cybernetic science. Independent operations carried out at sea, in the air or on land with the use of electronic equipment further bear out the claim that we are witnessing the emergence of a novel battlefield environment. With this in mind, the electronic environment can be described as follows: • The set of all objects including their attributes and dependencies between them, which due to certain criteria of assignment to the system, have been excluded from it. • The totality of inanimate elements both natural and created by man existing within a particular area including the links and dependencies between them. The concept of the setting in which electronic devices function has been narrowed down to the total number of inanimate elements resulting from human activities in a particular time and space. This paper has viewed the electromagnetic setting from many different angles. A considerable amount of space has also been devoted to a number of problems connected with an automation of electrical devices in their working environment. A different issue is automation in other environments. The resultant question is, can equipment functioning in other settings also be automated. The characteristics of the setting have been provided. The conclusion is that electrical devices functioning in this setting are mainly computers. However, apart from them, there is a wide range of auxiliary appliances. Carrying out operations in cyberspace means facing the same challenges pertaining to Electronic Warfare. The hostilities in both environments are comparable if one assumes that the means of combat in cyberspace are reconnaissance, jamming, and defence. The fundamental question is whether they are the same in nature. Cybernetic reconnaissance aims at gaining information about the movement of objects in computer networks. In other words, it is concerned with gathering data that is of interest to the recipient, intercepting information from identified objects, detecting relevant sources and tracking them. Therefore, it can be concluded that these are very similar tasks that lie at the core of Electronic Warfare. What has partially changed are the tools used to accomplish these goals. The radio receiver has given way to the computer equipped with appropriate software. This software constitutes the key and is the fundamental difference between cybernetic and 120 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE electromagnetic warfare. With a closer look at the issue one encounters a further problem. Computers are equipped with receiver-transmitter devices such as Wi-Fi or Bluetooth. Consequently, an electronic appliance together with a computer form a transmitter-receiver system. Through their protocols, Wi-Fi devices allow for data to be transmitted over a long distance by means of 2.4 GHz electromagnetic waves. Taking this into consideration we can say that receiving devices are starting to function like similar devices used in EW. In a nutshell, information reconnaissance is electronic reconnaissance realised by searching emission sources, intercepting and tracking signals transmitted via electromagnetic waves. What changes is the character of the detected devices. By contrast, information reconnaissance within cybernetic warfare focuses on the search for objects, programs, and their interception, detection and tracking in computer networks with the use of impulses and, to some extent, electromagnetic waves. The way to access computer networks is via the electromagnetic spectrum or direct connection to the network. G2 Source: Own work. Picture 4. The idea of radio-electronic reconnaissance Granting the fact that that under certain conditions radio-electronic and information reconnaissance is feasible by means of electromagnetic waves, one may wonder whether it would be possible to construct a universal tracking device. Such a hypothesised item would be able to monitor computer networks and other electronic equipment working at similar frequencies for both cybernetic and electromagnetic warfare. If we assume that EW breaks out in a civic setting then construction of the device is viable. With just one such remotely splayed item capable of receiving a wide frequency spectrum, it would be possible to gain access 121 WALDEMAR SCHEFFS to electronic devices of interest to EW and to receive impulses at the working frequency of practically any network. Remote connection to such equipment would make it possible to connect to any particular network undetected. Intercepting radiotransmission in computer networks G2 Interception radiotrasmission from own unit Direct connection to network Source: Own work Picture 5. The idea of cybernetic reconnaissance EW subunits universal electronic device Intercepting radiotransmission in computer networks via common electronic device CW subunits Source: Own work. Picture 6. A model of a common locating device in electronic and cybernetic warfare 122 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE Apart from electronic devices typical for electronic warfare, cybernetic warfare will also be using jamming devices and technology for cybernetic defense. Interference and jamming in this sense is tantamount to introducing spying software into computer networks. This means gaining specific data in specific networks and computers using all manner of methods. Moreover, what is also understood by jamming is introducing software in order to cause physical damage to software e.g., destruction of database content, virus infection, overload causing hardware to go haywire, deliberate overloading of the CPU, RAM, and graphics board. Broadly speaking, there are two ways of accessing computer networks. Breaking into computers from any place on the globe. The other being direct connection to network. Many receivers take necessary safety precautions, which prevents access to their databases. Information seekers are expected to possess a formidable body of knowledge, which with the level of IT education available, is not a problem at all. Additionally, a much more severe problem is posed by networks located outside the reach of cyber-warriors. Providing special units with universal devices might be a solution to this problem. Such devices could be used for electronic reconnaissance in the traditional sense, but at the same time they could monitor a given area for networks of interest. As soon as one has been located, then with the use of appropriate software, cybernetic warfare ensues. Automation and the universality of reconnaissance have been mainly due to cost cuts and tightening of the budgets. Another consequence is the miniaturisation of devices and gear. The smaller a device is, the less it costs to produce. The best examples are sensory devices, whose functions range from detecting to jamming to booby traps. Another issue is computer network security. From the point of view of cybernetic warfare, defence comes down to the technical protection of computers with the help of programs, monitoring devices, the surveillance systems. Furthermore, it includes barring access of unwanted individuals and/or programs to the network itself, the server, identification cards, and finally to the premises. The automation of electrical devices for the needs of both EW and CW is possible to a certain extent and in relation to highly specialised reconnaissance devices. Experience gained from past military conflicts teaches us that the future combat environment will force us to change much in our ideas and attitudes. The proposals made in this paper may contribute to finding novel technical solutions. Conclusion The ongoing evolution in the organisation of military operations in environments other than electromagnetic, as well as the permanent reorganisation of reconnaissance does not concern only structural and doctrinal changes. Focus on other environments means a deep transformation, which is predicted to last 123 WALDEMAR SCHEFFS relatively long, perhaps even more than twenty years. The heart of the matter is the a change in the mentality and concepts concerned with activities in IT networks and approaching electronic devices from a broader perspective. The electronic and cybernetic dimension is becoming a reality. Personal, tactical, structural and technological changes impress upon us different attitude toward functional and constructional considerations of electronic devices operating within different environments. Homogenous devices operating within a single setting are costly, inordinate in size, and easily detectable on the battlefield. By contrast, miniaturised multifunctional devices will be able to achieve levels of efficiency unattainable for older technology. They will excel at accomplishing complex tasks. Thus, automation of such devices is a prerequisite and a necessity. These changes are being made and probably will be taking place during missions organised by the military. This is taken to mean that altogether three processes are taking place in parallel: (1) the participation of reconnaissance in missions with the use of state-of –the-art recon gear, (2) automation systems, (3) the search for new technological solutions. That is why reconnaissance operations will be carried out under very hard conditions. Taking this into consideration, it can be assumed that in the coming years the dominant environment for The Polish Armed Forces will be the electromagnetic environment. The automation of systems will be developed systematically. When it comes to the cybernetic environment, the automation of devices is limited in range. Yet, considering the difficulties accessing certain networks, especially LAN networks, common electrical devices (sensors) could undergo this process. New concepts referring to electronic equipment are discussed by different panels of experts. It is for academics to decide whether some will enter the technical language. After verification from scientific circles they will be included in doctrines and books. Those considerations are still to come. Automation and miniaturisation are changing scientists` views on problems of reconnaissance in different environments. Not only do the EW units work in the EM spectrum, but they are also looking for ways to expand and work efficiently in other environments. With hindsight, the rapid development of technology and the speed of changes will cause a revolutionary shift from the electromagnetic spectrum to a wholly new environment. It barely needs pointing out that we must do all there is within our power not to miss it and keep abreast with the times. Bibliography Bauman Z., Globalizacja, czyli komu globalizacja, a komu lokalizacja, “Studia socjologiczne”, nr 3, 1997. Bauman Z, Globalizacja, Warszawa 2000. Bógdał-Brzeinska A., Gawrycki M. F., Cyberterroryzm i problemy bezpieczeństwa informacyjnego we współczesnym świecie, ASPRA-JR, Warszawa 2003. 124 THE AUTOMATION OF ELECTRONIC EQUIPMENT IN CYBERSPACE AND ELECTRONIC WARFARE Czeszejko S. Działania elektroniczne w NATO i Siłach Zbrojnych Rzeczypospolitej Polskiej – próba kategoryzacji, AON, Warszawa 2011 Cyberspace Operations (DD 3-12), Centrum Rozwoju Doktryn i Edukacji Sił Powietrznych USA, 2010. Grabau, Sześć wymiarów wojny, WPZ nr 1,2,3, Warszawa, 1987 Howard M, Wojna w dziejach Europy, Ossolineum, Wrocław 1990. Konopka L., Walka sieciocentryczne sposobem działania sił zbrojnych w przyszłości, Myśl Wojskowa, nr 2/2006. Mały słownik Cybernetyczny, Wiedza Powszechna, Warszawa 1973. Materiały robocze Centrum Bezpieczeństwa Cybernetycznego, Białobrzegi, 2011. National Military Strategy for Cyberspace Operations – NMS-CO, Joint Chiefs of Staff, Waszyngton, 2006, Price A., Narzędzia mroku, Wydawnictwo Dolnośląskie, Wrocław 2006 Rządowy program ochrony cyberprzestrzeni RP na lata 2009-2011 – założenia, Warszawa, 2009. Scheffs W., Walka elektroniczna w operacji i walce, AON, Warszawa 2005. Scheffs W, Środowisko działania sensorów walki elektronicznej, ZN AON nr 4/2010 Sienkiewicz P., Wizje i modele wojny informacyjnej. w: Społeczeństwo informacyjne – wizja czy rzeczywistość ?, Biblioteka Główna Akademii Górniczo-Hutniczej, Kraków 2003. Vego M., Systemowe kontra klasyczne podejście do działań bojowych, Kwartalnik Bellona nr 2, Warszawa, 2009. http://en.wikipedia.org/cybrprzestrzeń 125 NDU Scientific Quarterly no 4(89) 2012 JAROSŁAW SOLARZ CBRN RECONNAISSANCE IN THE POLISH ARMED FORCES Jarosław SOLARZ, Ph.D. National Defence University Abstract Modern combat operations are carried out in a constantly changing reality. The speed and diversity of these changes means that parties to the conflict work with limited access to information. For many years, it has been known that one of the most difficult types of combat operations are conducted in terms of the use of weapons of mass destruction. The immense power of destruction combined with the massive contamination typical for that weapon means that the problem of quickly gathering reliable information about WMD strikes and contaminations is still extremely important. For this purpose, CBRN reconnaissance has been developed, however because of the importance of the project and the considerable diversity there are several interpretations as to what it involves. This article is an attempt to assess the relevance and credibility of the various theories of CBRN reconnaissance. It discusses the history of that type of reconnaissance, its nature and numerous application examples. The analysis examined the rules in force in Poland's CBRN reconnaissance which result from the current understanding of doctrine. In addition to considerations relating to the reconnaissance, the U.S. solution were presented as a comparison. Particular attention was paid to the analysis of tasks, methods and techniques of CBRN reconnaissance, which in most cases still remain unclear. At the same time effort has been taken to present proper, according to the author, an interpretation of all these elements of CBRN reconnaissance, allowing for the verification of the suitability of existing tasks, methods and techniques and to propose a more useful solution. Key words – CBRN, WMD Modern threats, manifested in the form of various types of contamination can be diverse in nature. In general, however, there are no major problems in dividing them into two separate, quite different types. The first one is derived from strictly military threats, specifically threats generated by nuclear, chemical and biological weapons. The second type of threats, occurring also in peacetime, usually are the result of the potential impact of large numbers of toxic industrial chemicals which occur in the national economy. 126 CBRN RECONNAISSANCE IN THE POLISH ARMED FORCES For many years in the Polish Armed Forces, to overcome these threats, a number of different projects have been prepared, which now operate under the concept of CBRN Defence1. Currently, CBRN Defence is seen as a set of undertakings carried out in order to deter the enemy from using WMD and ensuring the security of forces during operations in terms of contaminations caused by the use of nuclear, biological, chemical and radiological weapons as well as by the release of dangerous substances in situations other than a WMD strike2. The achievement of such a formulated goal of CBRN Defence will never be an easy task. This is due to the enormous potential for destruction, which targeted accurately can cause death and destruction on a scale rarely seen. An additional complication is the unusual variation of mass destruction, which makes the defence effort very different. But in all cases, to achieve the objective of CBRN Defence it should be pursued by the full and proper use of all available forces and means. The implementation of these tasks are carried out within the wide spectrum of CBRN Defence System, in which the tasks conducted first are those whose purpose is to avoid contamination. Among them, certainly, CBRN reconnaissance should be found; however, is that the case? The purpose of this article is to identify the place and role of CBRN reconnaissance in the Polish Armed Forces within the overall task of determining the functioning of a modern CBRN Defence System. During the investigation answers will be sought to the questions: What is the CBRN Defence System and what made it? What is CBRN reconnaissance? What are the methods, tasks and techniques of modern CBRN reconnaissance? A Brief History As mentioned, in the past there operated a number of terms relating to the general sense of defence against weapons of mass destruction. In certain periods there simultaneously operate two or even three types of combat service support. Originally, this was due to the separation of the various "defences" into antichemical, anti-biological (antibacterial)3 or anti-nuclear, but later, after simultaneously been used for a long time there developed an anti-chemical defence 1 Previously, there were anti-chemical defence, chemical support, anti-gas defense, anti-nuclear defence and anti-biological defence - see. I. Nowak, J. Solarz, Ewolucja zadań obrony przeciwchemicznej w Wojsku Polskim, ZN AON, No. 3/1998 Warsaw. 2 Obrona przed bronią masowego rażenia w operacjach połączonych, DD/3.8, MON, Warsaw 2004, p. 5. 3 In this respect, the detection of biological attacks was more wishful thinking than a real possibility, so this aspect of the story appeared in OPBMR rather rarely. This was due to very poor technical preparation of troops in this area. Even today only a few armies in the world are supplied with equipment to identify biological contamination. 127 JAROSŁAW SOLARZ (chemical support) together with Defence Against Weapons of Mass Destruction (OPBMR). Just as many, if not more numerous, were the changes in the specific activities that occurred within OPBMR, chemical support or anti-chemical defence. Despite these changes each time the tasks were among those more or less related to CBRN reconnaissance or CBRN detection. Among them were found quite "exotic" tasks, such as for example the observation of preparations for an assault by toxic agents or the detection of enemy preparations for the use of nuclear, chemical and biological weapons. The list of tasks associated with CBRN reconnaissance, which occurred over the years in anti-chemical defence, CBRN defence and other early varieties of "defence" is shown in Figure 1. 1918-1924 1924-1934 Observation of preparations for the chemical assault 1934-1939 Observation of preparations for Contamination reconnaissance the assault toxic agents 1941 – 1945 (West) 1943 – 1955 (East) Reconnaissance and marking of contaminated areas Chemical reconnaissance Nuclear reconnaissance Infection reconnaissance 1955 - 1964 1964 - 1976 Chemical and nuclear reconnaissance Chemical and nuclear reconnaissance (detection) 1976 - 1985 CHEMICAL SUPPORT CBRN DEFENSE Chemical and nuclear reconnaissance Detection of nuclear detonations and chemical attacks and incendiary agents Reconnaissance of contamination and infection CBRN DEFENSE CHEMICAL SUPPORT 1985 – 1994 1985 - 1990 ANTICHEMICAL DEFENSE Detection of enemy preparations to use nuclear, chemical and biological weapons, 1990 - 1994 Detection of nuclear detonations and chemical attacks and incendiary agents Chemical, nuclear and biological reconnaissance 1994 – 2004 Detection of nuclear and chemical attacks; CBRN monitoring (reconnaissance) Source: Retrieved own study on the basis of I. Nowak, J. Solarz, Ewolucja zadań ..., ed. cited Figure 1. Evolution of CBRN reconnaissance tasks 128 CBRN RECONNAISSANCE IN THE POLISH ARMED FORCES From the information contained in figure 1 it can be concluded that despite the many changes in terminology and how to interpret the various projects they are all related to a specific task area. Basically, it can be assumed that the tasks were of two types, either related to contamination reconnaissance or complex detection of enemy strikes using nuclear, chemical or biological methods. The realisation of CBRN reconnaissance tasks has always been a challenge, mainly because it required careful coordination and a lot of effort and resources. All these efforts, however, were strongly associated with other projects CBRN Defence, because only together could they constitute a whole, aimed at achieving the CBRN Defence objectives. CBRN Defence System To achieve these objectives the CBRN Defence System was established, which, according to the definition is an orderly arrangement functioning in times of peace and war, focusing on the coordination of planning and organisation – with executive regulations realised by the elements in such a way as to provide the strength and resources to achieve the goals CBRN Defence4. To ensure an integrated whole, aimed at achieving the objectives CBRN Defence, the system should take into account all possible aspects of the defence. Thus it must include specific, specially prepared subsystems, which will make possible the achievement of the individual objectives involved. In fact the CBRN Defence system consists of five stand-alone subsystems, interconnected and correlated in such a way as to obtain the best possible result. These sub-systems are: CBRN detection, CBRN protection, CBRN decontamination, rescue and management. Graphic characteristics of the system are presented in Figure 2. The structure and nature of the respective subsystems leads to the conclusion that the survival of the dangers of a WMD attack or onset of a ROTA event will be based on three basic pillars, namely the detection of threats, CBRN protection and their elimination. Proper coordination of these tasks will be possible only after combining the total with the management subsystem. From this observation it follows that one of the essential elements of the system is a subsystem of detection of CBRN strikes and contamination. It is in fact, a system whose primary goal is to quickly assemble the fullest information about the risks generated by weapons of mass destruction or ROTA events. To accomplish the tasks of this subsystem the following were stablished: CBRN Warning and Reporting System (SWS), which includes: a sources of information (detection units); analytical laboratories; and CBRN warning and reporting centres. 4 See. J. Solarz, E. Malicki, M. Młynarczyk, Wojska chemiczne w systemie obrony przed bronią masowego rażenia, AON, Warsaw 2009, p. 9. 129 JAROSŁAW SOLARZ CBRN PROTECTION SUB-SYSTEM CBRN DECONTAMINATION CBRN DETECTION SUB-SYSTEM SUB-SYSTEM RESCUE SUB-SYSTEM Figure 2. CBRN Defence System components It is easy to note that to date none of the names for any of the elements of the system gives reference to the principle of CBRN reconnaissance. This does not mean, however, that this type of reconnaissance has already completely disappeared. Quite the contrary, by penetrating deeper into the structure of the Warning and Reporting System the traces of CBRN reconnaissance will become highly visible5. CBRN Defence tasks Another clue leading to CBRN reconnaissance are OPBMR tasks. The definition of defence against weapons of mass destruction implies that it is a set of undertakings ... which in a simple and effective way should ensure the realisation of its objectives. Currently6, in line with the doctrinal requirements, we distinguish five tasks, which include: – Detection, identification and monitoring (DIM); – CBRN Warning and Reporting; – CBRN Protection; – Hazard Management; – Medical Countermeasures and Support. Even a preliminary analysis of these tasks indicates that, in principle, they are not single projects, but all of them are groups, incorporating a number of different, often very complex tasks. In the first case we are dealing with the project, defined as DIM, which stands for detection, identification, and monitoring. The Polish equivalent is the same, on 5 For example, in the form of sub-units, reconnaissance patrols and checkpoints. Previously, the number and nature of individual CBRN tasks varied widely. See. I. Nowak, J. Solarz, Ewolucja zadań obrony.., Ed. cited. 6 130 CBRN RECONNAISSANCE IN THE POLISH ARMED FORCES the condition that the first element will be seen as “detekcja”, not as sometimes happens “wykrywanie”. But still no word about CBRN reconnaissance, with the exception of the DD/3.8 document, which places it among CBRN detection. This interpretation is not correct, and the only acceptable alternative appears to be the detection of contamination (strokes). The problem of understanding the detection of contamination is another aspect that needs to be developed. There is a peculiar duality of the concept, which is to detect contamination while being assimilated in the detection of the same contaminants (i.e. finding the fact of contamination) and the detection of WMD strikes and other events leading to the formation of contamination. Both interpretations are appropriate and should be considered together. The second element located in the name of the task is identification of the contamination, which is based on the sampling of contaminated materials and their study aiming to identify the type, nature and character of the contaminant. The last element of DIM is the monitoring, the action, the purpose of which is to observe the level of the hazard. It is based on a continuous or periodic occurrence of pollution control (or lack thereof), which allows for a quick and flexible response to changing threat levels and to plan further action on the affected area. In general, it can be concluded that the primary goal of respective DIM elements is the adequate military response to the threat of contamination due to the presence of chemical, biological and nuclear substances. Typical ways of reacting may be as follows: 1. DETECTION – alerting troops and launching procedures and protective measures; 2. IDENTIFICATION – determining the nature and level of risk, optimising safety procedures and risk management; 3. MONITORING – control over the level of threat and response to changes. Separation of respective DIM elements indicates the apparent specificity of the tasks that are carried out in the framework, and that no major obstacles can be performed separately. Despite this, individual perceptions of individual DIM elements are not a good idea, as detection, identification and monitoring of contamination are a consistent, comprehensive and interconnected conglomeration of projects and tasks that need to be considered together. In practice, all of these tasks are carried out in this manner. The basic task of detection is the early detection of the presence of chemical or biological agents or radioactive material, which adversely affects the health, before they have a negative impact on the realisation of tasks (resulting in alarming)7. As 7 You have to remember that in nature we find a number of naturally occurring chemicals, biological materials, and radioactive substances. Their common presence is harmless until the moment when they exceed certain levels of contamination defined (for each substance). This may occur for example, after WMD attack or releasing of toxic industrial chemicals. 131 JAROSŁAW SOLARZ a result, early information can be sent which will enable the troops to adopt an appropriate level of personal protective equipment (warning). Due to the required speed of detection of contamination their full identification is excluded. Typically, the information obtained is limited to the detection of whether a hazard exists or not. In general, detectors may be only a function of warning, which in turn would allow for a significant reduction in the time required for training, as well as the size and weight of the detectors. A more detailed diagnosis of the danger arises only at a later stage in the process of identifying contamination. Its main task is to define (determine the characteristics, the analysis of) the nature of the substance or species in terms of their quantity and quality. In this way, we get an opportunity to confirm the type and nature of the risk and to optimise the level of protection as well as to select appropriate risk management measures. Generally speaking, the information obtained details the identifying information provided by the detectors. The last step in DIM is monitoring, during which scouts conduct a continuous or periodic monitoring of the presence (or absence) of contamination. It can be carried out in relation to contaminants of all types: chemical, biological and nuclear. The three parts of DIM gives the impression that these three elements are its tasks. However, even a cursory analysis of the source document allows you to identify the actual tasks performed in the DIM. According to ATP-3.8.18 there are: – CBRN Reconnaissance; – CBRN Sampling in accordance with SIBCRA Standards (AEP-10/AEP-49) and STANAG 2112)9; – CBRN Field Analysis; – CBRN Forensic Analysis. It is easy to notice that it is only here for the first time, that the term CBRN Reconnaissance is presented. To clearly understand and properly qualified this it is worth comparing the different elements in the DIM-tasks that are carried out within its framework. In this way we obtain a statement shown in Figure 3. From the data presented in the figure it follows that the three tasks carried out in the framework of DIM are directly related to the identification of contaminants. Thus, CBRN reconnaissance should include both the detection and monitoring of contamination. This interpretation, however, is not the end of the process because as it turns out, some tasks of identification will be carried within CBRN reconnaissance. This is a sampling of contaminated material, although, unlike the SIBCRA teams, mainly for operational purposes and on a much smaller scale. 8 ATP-3.8.1 CBRN Defence on operations, volume I, Brussels 2010, s. 7-8. AEP-49 NATO handbook for sampling and identification of radiological agents. (SIRA), Brussels 2006; AEP-10 NATO handbook for sampling and identification of biological and chemical agents, Brussels 2000; STANAG 2112 Nuclear, biological and chemical reconnaissance, Brussels 2005. 9 132 CBRN RECONNAISSANCE IN THE POLISH ARMED FORCES DETECTION CBRN RECONNAISSANCE MONITORING CBRN SAMPLING CBRN FIELD ANALYSIS IDENTYFICATION CBRN FORENSIC ANALYSIS Figure 3. Diagnosis of contamination vs DIM So if we accept that some of the tasks associated with the identification of contaminants also fall under the term CBRN reconnaissance then we get the full picture of this project. In summary, we can conclude that the place of CBRN reconnaissance is on the whole an area specified for the detection, identification and monitoring of contamination with the exception of the part that relates to the identification carried out by specialised SIBCRA teams. The graphic interpretation of the space occupied by CBRN reconnaissance in the DIM is shown in Figure 4. CBRN CB CBRN DETECTION IDENTYFIKATION RN RE CO NN AIS SA NC CBRN MONITORING E Figure 4. The space occupied by CBRN reconnaissance in the DIM For a better understanding of the nature, place and role CBRN reconnaissance its methods and tasks should be presented. It turns out, however, that even this is not entirely clear. The problem stems from the different approaches to the tasks of 133 JAROSŁAW SOLARZ CBRN reconnaissance. According to the previously quoted ATP-3.8.1 in CBRN reconnaissance tasks we include: 1. CBRN Surveillance; 2. CBRN Field Reconnaissance, including reconnaissance of the road (route), zone, and the area; 3. CBRN Sensitive Site Reconnaissance; 4. CBRN Survey; 5. CBRN Monitoring. The analysis of the cited "tasks" leads to the conclusion that they are rather types, forms and methods of CBRN reconnaissance, maintained in specific circumstances, in terms of need and opportunity. In this way, it is hard to talk about tasks, which are known to be typical for the activities10 conducted under CBRN reconnaissance, and not as a form or method of the same reconnaissance. There seems to be a much better interpretation of reconnaissance tasks found in the FM 3-11.19 study11. According to the American point of view, CBRN reconnaissance considered as the main way to avoid contamination includes tasks in which the further implementation will lead to achieving the final objective. These tasks include: 1. Contamination detection (detection); 2. Identification of contamination (identification); 3. Determination of contaminated land (marking); 4. Reporting about contamination (reporting); 5. Contaminated material sampling (sampling). The presented set of tasks explicitly specify the form, scope and sequence of the respective steps (tasks) of CBRN reconnaissance, and ensure the achievement of the objective in a complete and comprehensive manner. According to the above, first we should make a note of the fact of contamination detection, then determine (identify) the contamination, after that we need to mark the contaminated area, and finally give a report of contaminations. In addition, in some situations, you may need to load samples of contaminated material. It should be noted that all of these tasks (except perhaps the last) will be conducted in the same way, regardless of the method of reconnaissance. At this point, it might be considered that the problem of tasks and methods for CBRN reconnaissance has been resolved. Unfortunately, references of CBRN reconnaissance methods are difficult to find in the literature, both academic and instructional. Instead, we can meet tasks which, as previously noted, do not fulfil the standard criteria for the tasks, and are more suited to the form or method. What 10 Task is an activity to be performed – see. Słownik języka polskiego, PWN, Tom 3, Warsaw 1989, p. 898. 11 Multi-service tactics, techniques, and procedures for NBC reconnaissance, Washington 2004, s. I-1. 134 CBRN RECONNAISSANCE IN THE POLISH ARMED FORCES is more, in the previously mentioned U.S. proposals, we can find projects treated not only as tasks, but also as missions12. These are: 1. Search (searches) 2. Specific identification of contamination (surveys) 3. Observation (surveillance) 4. Contaminated material sampling (sampling) 5. Reconnaissance of roads, areas and zones (router, area, zone reconnaissance) A careful analysis of the set of tasks leads to the conclusion that the second interpretation of tasks (by FM 3-11.19) is a specific combination of the two previously discussed solutions. Thus, interpretation introduces a mess that not only does not help the understanding of CBRN reconnaissance but actually it makes it complicated. It seems that the authors of this document, by introducing two different interpretations of CBRN reconnaissance tasks, lost their way a little bit and as a result instead of the bright, clear image of reconnaissance, created an interpretive chaos. Conclusions Summing up the discussion, you can confidently say that CBRN reconnaissance is realised within the detection, identification and monitoring (DIM) which is one of the five projects that CBRN Defence consist of. The only problem that arises is the need for understanding the project as a unified whole, without a separate examination of its individual components. Only in this way will you be able to look inside and see the reconnaissance, which, as it turns out, is only apparently hidden somewhere. On the other hand, CBRN reconnaissance is an essential pillar of the CBRN Defence System, in which it is an integral part of the warning and reporting subsystem. The currently existing division of CBRN reconnaissance tasks (ATP - 3.8.1) is unclear, and the confrontation with the existing rules of reconnaissance is confusing. Moreover, other existing approaches and interpretations are also inconsistent and vary greatly, even within a single publication. For this reason, there is a need for a separation of the tasks and methods of CBRN reconnaissance and an unambiguous interpretation. The proposed solutions are shown in Figure 5. 12 There. 135 JAROSŁAW SOLARZ CBRN MONITORING CBRN SENSITIVE SITE RECONNAISSANCE CBRN SURVEY CBRN SURVEILLANCE CBRN FIELD RECONNAISSANCE METHODS (TECHNICS, FORMS?): TASKS 1. CBRN DETECTION 2. CBRN IDENTYFICATION 3. MARKING 4. SAMPLING 5. REPORTING Figure 5. Proposed tasks and methods of CBRN reconnaissance 136 OD INTELIGENCJI ROJU DO WIELOAGENTOWYCH SYSTEMÓW DO NAWIGACJI… NDU Scientific Quarterly no 4(89) 2012 FROM SWARM INTELLIGENCE TO MULTIAGENT SYSTEMS FOR MOBILE ROBOT NAVIGATION Emilia MIKOŁAJEWSKA, Ph.D. Maj (ret.) Dariusz MIKOŁAJEWSKI MSc Abstract Swarm intelligence is perceived as complex social behaviour emerging from simple interactions of unsophisticated agents. It is derived from the collective behaviour of natural systems, e.g. ant colonies, but may be adapted to artificial systems. This situation gives various chances for military use of swarm intelligence technology to navigate mobile robots. This article aims at investigating the extent to which the available opportunities in this area are being exploited. Key words – robotics, artificial intelligence, swarm intelligence, military applications, battlefield robots Introduction We are deeply convinced that many commanders observing the harmonious, rapid manoeuvres of shoals of fish or flocks, think how is it possible and dreamt of similar harmony of subordinated military units. But this is not science fiction – scientists are aware of advantages derived from nature imitation. Information technology solutions based on natural (biological) patterns play an important role in the genesis of artificial neural networks (ANN), genetic algorithms (GA), simulated annealing, swarm intelligence1, and many others. There are a lot of useful solutions based on biological patterns, what more their number increases with each day (e.g. chemical computers (biomolecule-based computing2)). The cause of this situation is the perceived difficulties in effectively solving some important scientific problems using only classical hardware and software. Despite 1 Kennedy J., Eberhart R. C. Swarm Intelligence. Morgan Kaufman Publishers, San Francisco 2001; Hantak C. Comparison of parallel hardware based and graphics hardware based platforms for swarm intelligence simulations. Integrative Paper, UNC-Chapel Hill 2003; Bonabeau E., Dorigo M., Theraulaz G. Swarm intelligence: from natural to artificial systems. Oxford University Press, Oxford 1999. 2 See also research of I. Willner (Hebrew University, Jerusalem). 137 EMILIA MIKOŁAJEWSKA, DARIUSZ MIKOŁAJEWSKI quick development, current possibilities of „classical” information technology are limited by: − computationally complicated problems (even despite well known algorithm), e.g. chess games, − adaptive systems fading dynamical change of situation/environment, e.g. business management, stock exchange simulations, etc., − fully-autonomous systems, − fuzzy-logic systems, e.g. intelligent human-machine interaction, multimodal interaction with speech recognition. Despite the aforementioned advantages, we should be aware of the limitations of the methods which nature uses to solve its problems: − nature makes compromises, e.g. choosing first useful, but not optimal solution, − nature's strategies are not always successful (i.e. may be deceptive), − some natural mechanisms may be to difficult to capture and formulate the algorithm, − some problems, despite being efficiently solved by nature, may be solved better (more efficiently, quicker, cheaper, etc.) another way – due to this, people use a much larger number of means than nature. Swarm intelligence is perceived similar to some kind of computational problems by: 1. goal: optimalisation of task fulfilling, 2. basic application range: − search (e.g. for food), − route selection (e.g. shoals of fish, flocks), − transport (ants), − complex group behaviour emerging from simple activities of individuals (ants, termites, bees, etc.). Thus similar solutions may be used to solve similar problems: − multiple interactions among autonomous agents scattered on an area (important because of their task), − self-organising control and co-operation (without central management), − labour division and task allocation. Swarm intelligence as a basement for multi-agent systems Swarm intelligence is a perceived feature of the system, which is characterised by coherent global patterns emerging from collective behaviour of simple agents interacting locally with the other similar agents and the environment. Thus swarm intelligence provides a framework useful the in research of collective (distracted) problem solving approaches which operate without central control or any global 138 OD INTELIGENCJI ROJU DO WIELOAGENTOWYCH SYSTEMÓW DO NAWIGACJI… model. The same way is possible for complex behaviour of the group (swarm, colony) consisting of autonomous individuals (agents) fulfilling simple activities within a determined close environment. Complex behaviour of the whole group, necessary to fulfil task and achieve success, emerges as a result of the group ability to self-organise the agents' activities. Functions of agents themselves are usually simple and limited, influencing the simplicity of the agents’ construction. Single agent have not got any global (comprehensive) knowledge, apart from “local” knowledge about its close environment (“neighbourhood”). The agent gets to know about this neighbourhood thanks to: − interactions with it (using artificial „senses”), − interactions with the closest similar agents (at least one agent) – this is a process of exchange of „local” knowledge among agents, − environment modification – as optional indirect way of communication among agents. The activity of agents is usually strictly limited. They can move or modify their environment. An agent (if it can choice) takes a decision concerning the next step (activity) on the strength of the current status of the closest neighbourhood. More than one option makes this choice rather random, but generally selected activities are more probable than the other. Single agents are relatively independent – they have not got superiors or even any global plan. Thus their behaviour depends on two main issues: − preliminary programming, called „local plan”, consisting of the rules of operation: e.g.: move randomly and search for food, if you find food: pick it up, remember location of the food, and then return to the group, − interactions with the closest agents and environment, consisting of the rules of operation: e.g. inform closest agents, where the food is. Swarm intelligence uses two key mechanisms: − self-organisation – global structures emerge from repetitive local interactions, resulting in a process similar to collective decision making, − stigmergy – stimulation through work, consisting of indirect communication and/or coordination based on environment modification, useful e.g. for cooperative transport purposes. Self-Organisation within the group of agents thanks to both direct and indirect interactions is perceived as very effective. Solutions found due to aforementioned collective decision making are much more complex than possible for a single agent. What is more this result, similar to the effect of distributed processing, is achieved without any defined complex computational processing. Agents may learn how to assess the stimulation and its meaning (positive or negative) – this process provides an exchange of knowledge between individual learning and group learning. In spite of the fact that not all mechanisms of swarm intelligence are clear. We can define basic features of the swarm intelligence: 139 EMILIA MIKOŁAJEWSKA, DARIUSZ MIKOŁAJEWSKI − simple and cheap, but autonomous individuals (agents), − distributed control, − purposeful use of interactions: agent-agent, agent-environment, and agentenvironment-agent, − use of direct or indirect communication (including stigmergy), − scalability: from several agents to many thousands of agents, − increased operational reliability thanks to redundancy and simple construction of agents (homogenous or heterogenous). Thus an artificial swarm intelligence system should be: − simple, − adaptive, − stable (i.e. behaviour of the agents should be coherent and aiming at the same goal), − sufficient in the area of quality of operation, i.e. result of operation may be perceived as satisfying, but not necessarily optimal (the best possible), − in selected cases: should provide various reactions in the same conditions. Current areas of swarm intelligence application are as follows: – optimisation, e.g. in telecommunication networks, – robotics, – movement patterns within transport and production systems, – simulation of group (social) behaviour. Examples of swarm intelligence application are as follows: − searching (e.g. food) by social insects as pattern of optimisation e.g. in telecommunication networks and travelling salesman problem (TSP), − cooperative transport in insects – important for specialists in robotics, − adaptive labour division and task allocation in ants – undisturbed despite lack of central control, global situation assessment, and systems to pass directions on – as patterns of control algorithms (e.g. in robots) resistant to interferences, − nest building by social insects – as patterns for self-reconfigured robots and systems, − group sorting and classification – useful in automatic data analysis systems, − movement of shoals of fish or flocks – useful in crowd movement analysis, traffic analysis (including rush hours, traffic jams, etc.), − alife (artificial life) simulations – from simple forms of artificial life to advanced simulations of social and/or evolutionary processes, − tests of distributed systems, wide area systems, and software. The best optimisation techniques based on swarm intelligence are perceived as (depends on the task): − Ant Colony Optimisation (ACO), − Particle Swarm Optimisation (PSO). 140 OD INTELIGENCJI ROJU DO WIELOAGENTOWYCH SYSTEMÓW DO NAWIGACJI… There is need to admit, that due to the quick development and diversity of solutions there is a lack of common criteria for the purposes of assessment and compartmentalisation of swarm intelligence systems. Practice shows useful tools in the aforementioned area: simulations, and compartment of flexibility and resistance to errors (similar to robots competitions). Ant Colony Optimisation Colonies of social insects (ants, termites, bees) are able to fulfil tasks requiring flexibility and intelligence based on single insects (simple, unified individuals, without knowledge, without intelligence). Single insects use their senses and play their role based on very simple rules. The spectrum of their possible behaviour is significantly limited. What's more, single insects do not know about the general status of the whole colony, directions of its development, and tasks division. Global structure (e.g. ant hill) emerges from activities of a lot of single insects. What's more – it is stable, self-controlled, adaptive (e.g. to changes within environment) unit3. One of the most important pieces of research on social insects is on methods of cooperative terrain search (e.g. for food). Despite the fact that a single ant is able to search only a small part of terrain, ants divide work and co-operate e.g. exploiting food resource found by one of them. Thus group behaviour of an ant colony is perceived as a compound of interactions among single ants belonging to the colony. Because of it there is a possible resultant complex in ant colony behaviour. First attempts of the ACO4 application to optimise artificial systems took place in the 1980s. Ants become the general concept of a pheromone trail in communication derived from biological patterns. Bonabeau et al. showed the first ACO system in 1989. This system provided simple rules concerning the behaviour of single ants (agents) within a moving column of ants. Indirect communication uses pheromone trails: a route with pheromone (laid down by an ant which found food) seems be more attractive for other ants. Thus a stronger pheromone trial indicates not only information, but even a call for help (e.g. in food transport). Pheromone evaporates, so if no ant refreshed it (e.g. after food resource exploitation), this route becomes unattractive. A second important ant feature is the ability to find the shortest path from the food resource to the ant hill. Pheromone trails play a key role in it. Ants create (and maintain) pheromone trails, but the shortest path is the most attended, the transfer takes the shortest time period, thus 3 Dorigo M., Stützle T. Ant Colony Optimization. MIT Press, Massachusets 2004; Dorigo M., Di Caro G. Ant Algorithms for Discrete Optimization. Artificial Life, 1999, 5(3): 137–172. 4 Navarro Varela G., Sinclair M. C. Ant Colony Optimisation for virtual-wavelength-path routing and wavelength allocation. Materiały Congress on Evolutionary Computation (CEC’99), 1999; White T., Bieszczad A., Pagurek B. Distributed fault location in networks using mobile agents. Materiały 3rd International Workshop on Agents in Telecommunication Applications IATA’98, 1998. 141 EMILIA MIKOŁAJEWSKA, DARIUSZ MIKOŁAJEWSKI this way is the most common refreshed with pheromone, and the most attractive. Thus we can observe the global solution for a whole group of ants derived from the behaviour of every single ant. What is more: if any obstacle will appear on the aforementioned shortest path – the same mechanism will provide the shortest avoidance or (if avoidance is not possible) even the new (shortest in the new conditions) path. Scientists perceive the aforementioned mechanisms as being very effective, because they are useful since millions of years. Substituting ants with simple (artificial) agents we can observe simple framework for various tasks. Basic task seems be simulation of travelling salesman problem. More complex task is simulation of the telecommunication network overload, freight transportation, or traffic monitoring. Some aspects of ACO are useful for logistical support (including e.g. drugs for hospitals), task allocation, and even (in selected cases) strategies of operation for whole companies5. Proper use of ACO requires: − proper analogy choice, − proper environment simulation, including its dynamical changes, − proper simulation of agents' behaviour (especially heterogenous agents fulfilling different tasks), − proper choice of the simplest rules concerning agents’ activity, based on experience, and providing required group behaviour – thus rules do not limit behaviour of single agents, and let them find unknown, better solutions, especially if the current solution is not useful, − that the result may be satisfying (e.g. meeting the criteria), but not always optimal (the best possible). Features of insects significantly influencing success (both natural and artificial systems) are as follows: − flexibility – ability to adapt to various environment conditions, − operational reliability – group fulfil its tasks despite errors (or even damage) of several single agents, − self-control – lack of central control and management system. 5 Mohamad M. M. Articulated robots motion planning using foraging ant strategy. Journal of Information Technology - Special Issues in Artificial Intelligence, 2008, 20(4): 163–181; Mohamad M. M., Taylor N. K., Dunnigan M. W. Articulated robot motion planning using Ant Colony Optimisation. Materiały 3rd International IEEE Conference on Intelligent Systems, 2006, ss. 690–695; Mohamad M. M., Dunnigan M. W., Taylor N. K. Foraging Ant Motion Planning for Articulated Robots. Materiały International Joint Conference SICE-ICASE, 2006, ss. 4285–4290; Mohamad M. M., Dunnigan M. W., Taylor N. K. Ant Colony Robot Motion Planning. Materiały IEEE International Conference on Computer as a Tool: EUROCON 2005, ss. 213-216. 142 OD INTELIGENCJI ROJU DO WIELOAGENTOWYCH SYSTEMÓW DO NAWIGACJI… Particle Swarm Optimisation The concept of PSO was developed by social psychologist James Kennedy and engineer (electrician) Russell Eberhart in 1995. It derives from earlier research on the behaviour of flocks (of birds). The behaviour of a flock emerges from simple rules describing activity of single birds during flight: − set direction and speed aiming at remaining inside the flock, − set direction and speed aiming at not collide with other birds (in the closest neighbourhood). If any bird flies towards discovered food, the closest birds follow it. As a consequence whole flock files in the same direction, unless another bird discovers a more attractive source of food. Implicit rules allow for synchronous and collision-free movement, due to efforts of individual birds to remain at the optimal distance to neighbours. Making the analogy: aforementioned food searching is similar to searching within an area of potential solutions for the best of them. The distinction of the best solution from the others needs to allow for comparison (by particular single particle) of an individual's own results with the results of its „neighbours”. If the results of one of the “neighbours” are better then its own, the particle follows it – this way the best tactics are copied by others6. Thus generally PSO constitutes a simulation of a simplified social system7. But we should be aware, that human behaviour is much more complex, e.g. may be based on feelings and opinions. Due to the aforemetioned analogy the two basic mechanisms controlling the searching algorithms of PSO are as follows: − exploration of the space in the searching process aims at the area of the best previous solutions – it influences a quick convergence of the algorithm, but may terminate only on the first found solution, e.g. local minima instead of the global minima, − use of information concerning previous achievements in searching process – PSO's one-way information sharing method: only the best (local or global) individual (particle) may share its knowledge with the others; what's more each of the individuals bases action on its own experience (including its own best position to compare with the proposed one). Advantages of PSO are as follows: − few parameters controlling optimisation process, − handy representation of solutions, − simple rule of transformation from one solution to another. 6 Basement of PSO’s genesis is perceived assumption that social information sparing among individuals form the same team/community constitutes significant evolutionary advantage. 7 Fealko D. R. Evaluationg Particle Swarm Intelligence Techniques for solving university examination timetabling problems. Doctoral thesis. Nova Southeastern University 2005. 143 EMILIA MIKOŁAJEWSKA, DARIUSZ MIKOŁAJEWSKI Applications of PSO have to establish undisturbed equilibrium between individual behaviour and group behaviour due to: − focus on individual behaviour which causes separate searching for the solution and a lack of knowledge sharing with „neighbours” (result: endless searching procedures or termination on the first found solution, e.g. local minima), − focus on group behaviour which causes common reaping benefits from knowledge of the other individuals (result: lack of individual search, group focus on the first found solution, e.g. local minima). Evidence from experiments proved that not numerous „neighbourhood” provides increased model efficacy. In the case of PSO “neighbour” means: next in the row/column, but not exactly “close”, because distances between particles may be bigger. PSO algorithms are perceived as efficient in solving a wide spectrum of problems, independent in the number of dimensions or size of problems. The biggest advantage may be their simplicity and scalability, and moreover: − rapid solving of non-typical problems, − ability of the optimisation of difficult mathematical problems, both analog and discrete. Multiagent systems One of the most interesting forms of co-activity (cooperation or competition) of huge groups of simple agents are perceived multi-agent systems (MAS). MAS are similar to ACO or PSO. The general result (as realisation of the system goal) emerges from a compound of activities of a lot of simple agents, interacting with each-other, based on basic rules implemented in each of the agents. Thus MAS constitutes intelligent distributed software. The description of the agent (in a MAS context) changes depending on task and application. In the most general case agent consists of two main parts: software (logical, as information), and hardware (physical, as robot, other machine or e.g. part of production line). Thus a dedicated technology of software is necessary. The aforementioned technology should provide simulation and implementation of individual and social behaviour in distributed systems. Multi-agent system consists of such elements as: environment, objects in the environment, agents in the environment, and relationships among agents. Thus features of a multi-agent system are as follows: − it consists of autonomous agents: each of them fulfils its own task, and this task may be (but not necessarily) coherent with tasks/goals of the whole group of agents, − way/kind of communication describes environment, − decision making is distributed (i.e. every agent has its own level of autonomy). 144 OD INTELIGENCJI ROJU DO WIELOAGENTOWYCH SYSTEMÓW DO NAWIGACJI… Agents may exchange messages with each other. Basic types of aforementioned messages are as follows: proposal of (particular) activity, rejection/approval of this offer, and counter-proposal. Agent, as a form of artificial intelligence, may attempt to communicate to the other agent(s) – e.g. in the case of a task fulfilment demand, or reject it (e.g. if it may decrease probability of task fulfilment). Aforementioned issues are a part of agent’s autonomy within control system8. Paradigms of multi-agent systems are as follows: − reactivity – environment observation and timely reaction to its changes, − proactivity – reaction to changes in environment and activity towards (purposefully) making changes in it, − autonomy of agents – agent may act individually (without other agents or people), having control of its status and activities, − ability for social behaviour – possibility of co-operation with other agents, people, including self-organisation and grouping/clustering, − rationality – agents activity is determined by success (goals) achievement (so called control by goals), − ability to communicate – ability to share knowledge with other agents, control system, and environment (e.g. for threat identification purposes), − ability to learn and flexibility/adaptation – agents improve their operation with time, − mobility – ability to change location within environment9. Basic tasks of multi-agent systems are as follows: environment sweeping/search, movement control, movement within formation. Aforementioned tasks may be fulfilled by four basic kinds of agents: − logical agent – its decision is a result of deduction, − reactive agent – its decision is a result of environment analysis (situation to action mapping), − bdi agent (beliefs-desires-intentions) – its decision depends on bdi combination, − layered architectures – its decision is a result of the co-operation of software layers (horizontal or vertical) – each of them is responsible for the other layer of environment abstraction10. Basic classification of multi-agent technologies is as follows: − based on agent paradigms: Prometheus, Styx, HLIM, Cassiopeia, Tropos, GAIA, MASE, SODA, etc.., 8 Hakansson A. Agent and multi agent systems technologies and applications. Springer Verlag, New York - Heidelberg 2010. 9 Wooldridge M., Jennings N. R. Intelligent agents: theory and practice. The Knowledge Engineering Review, 1995, 10(2): 115-152. 10 Gnatowski M. Wykorzytsanie systemów wieloagentowych we współdziałaniu robotów mobilnych. Rozprawa doktorska. Instytut Podstawowych Problemów Techniki Polskiej Akademii Nauk, Warszawa 2005. 145 EMILIA MIKOŁAJEWSKA, DARIUSZ MIKOŁAJEWSKI − based on object orientation: MASSIVE, AOMEM, ODAC, AOAD, DESIRE, MASB, AAI, etc., − based on knowledge engineering (KE): CommonKADS, MASCommonKADS, CoMoMAS itp., − based on requirements engineering (RE)11. Thus multi-agent systems constitute a practical programmatic implementation of distributed artificial intelligence - DAI12. The most important military applications of multi-agent systems are as follows: − multi-level adaptive simulations of warfare13, − route planning with the passing by of danger zones, − fulfilling various tasks providing situation awareness, − Interoperable Command & Control based on MultiAgent Systems – IC2MAS), − multi-agent robots. It seems that the aforementioned applications will be a significant part of the autonomous military technology, based on both programmable agents, land robots (including mechanical mole robots), flying robots, and buoyant robots. They may constitute an important part of the Net Enabled Capability and Common Operational Picture paradigms. Multi-agent robots Useful examples of the effective application of multi-agents systems are constituted by multi-agent robots. Single autonomous robots are currently technologically accessible. The next step is the use of teams of robots, co-operating with each-other, and aiming at the same goal. But we should be aware that there is no assumption that one robot is one agent. Relationships of robot-agents are much more complicated. Basic are as follows: − extended agent – agent is built both in robot and control system, − agent built in robot, and its image is built in control system, mainly for simulation purposes, − agent built in control system, and robot is only its tool, 11 Alonso F., Frutos S., Martinez L. i wsp. Towards a natural agent paradigm development methodology. MATES 2004, LNAI 3187, s. 155-168. 12 Cetnarowicz K. Pojęcie M-agenta i koncepcja systemów wieloagentowych. [In:] Stanek S. (ed.) Rozwój informatycznych systemów wieloagentowych w srodowiskach społeczno-gospodarczych. Wydawnictwo Placet, Warszawa 2008; Cetnarowicz K., Dreżewski R., Byrski A. i wsp. Agentowe metody inteligencji obliczeniowej. [In:] Stanek S (ed.) Rozwój informatycznych systemów wieloagentowych w środowiskach społeczno-gospodarczych. Wydawnictwo Placet, Warszawa 2008. 13 See also research of B. Kamiński from Division of Decision Analysis and Suport, Institute of Economics, Warsaw School of Economics. 146 OD INTELIGENCJI ROJU DO WIELOAGENTOWYCH SYSTEMÓW DO NAWIGACJI… − group of agents built in control system, controlling simultaneously one robot or even group of robots14. Important issue seems be the architecture of the robot(s): – deliberative – robot has its own model of environment, and changes in it are made by contact, – behavioural – robot has not got its own model of environment, but gets to know about the environment during observation, action, and reaction, – hybrid – tasks are divided into the two aforementioned types15. Examples of the aforementioned architecture constitute: AuRA, CEBOT, ATLANTIS, SSS, TCA, SAPHIRA, ARA, DAMN, 3T, ALLIANCE, BERRA, SWARM-BOTS, YAVUZ, BUSQUETS, VOMAS or Tripodal Schematic Control Architecture. There is a need to admit that agents do not always have concordant (or even consistent) goals – see e.g. problem of common access to the same resource. Thus full cooperation of all agents may be not possible (e.g. ACO may not be applicable). This situation requires the modification of the single agent software: the adding of a bit of competition among agents may provide quicker and more effective task completion. Tasks for groups of robots can be divided into: – tasks, which can be fulfilled by a single robot, but group of robot will fulfil it quicker, and/or more effectively, etc. (e.g. through task sharing), – task which cannot be fulfilled by a single robot, and only a group of cooperating robots can achieve the success (e.g. cooperative transport). Teams of homogenous robots are redundant: one robot can play the role of another (e.g. in the case of serious damage). From the other point of view heterogenous robots, fulfilling different tasks within the team, provide a wider spectrum of possible applications for the whole team. Their specialty differ, but this feature may be necessary in more complex tasks. Applications of multi-agent robots are wide: from industry16, through health care (micro-robots and nano-robots17), to the role of advanced tools in search and 14 Gnatowski M. Wykorzytsanie systemów wieloagentowych we współdziałaniu robotów mobilnych. Rozprawa doktorska. Instytut Podstawowych Problemów Techniki Polskiej Akademii Nauk, Warszawa 2005. 15 Gnatowski M. Wykorzytsanie systemów wieloagentowych we współdziałaniu robotów mobilnych. Rozprawa doktorska. Instytut Podstawowych Problemów Techniki Polskiej Akademii Nauk, Warszawa 2005. 16 Krasiński A. Wieloagentowy system robotów mobilnych. Opis projektu. Prace Naukowe Instytutu Cybernetyki Technicznej Politechniki Wrocławskiej, 1998, 98: 241-247; Gnatowski M. Wykorzystanie systemów wieloagentowych we współdziałaniu robotów mobilnych. Rozprawa doktorska. Instytut Podstawowych Problemów Techniki Polskiej Akademii Nauk 2005; Bartyna W., Ambroszkiewicz S. Architektura systemu wielorobotowego, język komunikacji i protokoły. Materiały X Krajowej Konferencja Robotyki, Miechowice 2008; Ambroszkiewicz S., Cetnarowicz K. On situating agents in multi-robot systems. Materiały CS&P'2005 Workshop; Skrzypczyński P. A Team of Mobile Robots and Monitoring Sensors – from Concept to Experiment. Advanced Robotics, 2004, 18(6): 583–610. 147 EMILIA MIKOŁAJEWSKA, DARIUSZ MIKOŁAJEWSKI rescue operations, etc. Multi-agent robots may be useful in military applications too. Battlefields based on Net Enabled Capability (NEC) needs these solutions as a useful supplementation of weapon systems, reconnaissance and identification systems, fulfilling stealthily important tasks behind enemy lines independent of weather conditions for example. Teams of homogenous multi-agent robots (even: flying or buoyant) due to their numerical force and redundancy are extremely resistant to damage. What more every agent is able to replicate another one (e.g. one damaged). Use of multi-agent robots in search and rescue operations, both in urban complexes, and terrain hard to reach due to other causes will significantly increase current possibilities18. According to current knowledge multi-agents robots for military purposes should provide: − flexibility, including supplementation and modernisation during operation, − ability to fulfil tasks even in very hard conditions (loss of many agents/robots, severe damages) – result may be only satisfying (e.g. fulfilling criteria), but not optimal (the best possible), − ability to work in various conditions (as a part of land forces, navy, air forces, and even in space), − ability to use heterogenous agents (for task division purposes), − ability to work using incomplete information (e.g. unknown area) or in quickly changing environment (e.g. location of people within the closest neighbourhood), − ability to collaborate with single soldier or military unit – collaborative robotics, − stability, − effectiveness. Military possibilities of multi-agent robots was noticed earl19. Research is being conducted almost all around the world, including NATO countries. Leading research centres are as follows: − DARPA – UltraLog and Cougar projects20, − NASA Ames Research Centre and NASA Glenn Research Centre21, In the beginning almost the whole effort was focused on robots able to work in space, including exploration of neighbouring planets. Military applications of the aforementioned robots resulted from their ability to fulfil tasks in variable 17 Mikołajewska E., Mikołajewski D. Neurorehabilitacja XXI wieku. Techniki teleinformatyczne. Impuls, Kraków 2011; Mikołajewska E., Mikołajewski D. Roboty rehabilitacyjne. Rehabilitacja w Praktyce, 2010, 4: 49-53. 18 Looije R., Neerincx M., Kruijff G.-J. M. Affective collaborative robots for safety & crisis management in the field. Materiały ISCRAM 2007 - Intelligent Human Computer Systems for Crisis Response and Management 2007. 19 Multi-Robot Systems in Military Domains. RTO TECHNICAL REPORT TR-IST-032/RTG-014. 20 Por. Integrated Computerized Deployment System (ICODES). 21 Wong E., Litt J. S. Autonomous multi-agent robotics for inspection and repair of propulsion systems. Materiały AIAA 1st Intelligent Systems Technical Conference 2004. 148 OD INTELIGENCJI ROJU DO WIELOAGENTOWYCH SYSTEMÓW DO NAWIGACJI… (including unpredictable) conditions and environments, despite loss of a significant part of agents. This makes multi-agent robots an almost ideal tool on the battlefield. UNASSISTED WITHIN TEAMS: ROBOTS + PEOPLE Route reconnaissance Reconnaissance (incl. NBC) and target intelligence Search and rescue operations Combat and indirect suport, air suport, naval support, increased mobility Applications of cooperative robots Weapon carriers, medical systems carriers Patrols (incl. patrolboats), warning systems Diversion Transport & Logistics Fig. 1. Selected military applications of multiagent systems of mobile robots The most important Polish research centres in the area of multi-agent systems and multi-agent robots are perceived as the Institute of Computer Science at the Polish Academy of Sciences, AGH University of Science and Technology in Cracow, and Poznań University of Technology. Moreover, research on selected issues of multi-agent systems and multi-agent robots are conducted in the majority of Polish universities, as part of artificial intelligence and/or robotics. 149 EMILIA MIKOŁAJEWSKA, DARIUSZ MIKOŁAJEWSKI Conclusions Multi-agent robots are still at the beginning of their development. Further development needs more research in the area of perception, navigation, planning, distributed control, etc. This situation allows for other chances for the military use of swarm intelligence technology to navigate mobile robots, as an alternative for humanoid robots, and the supplementing of other dynamically developed solutions: exoskeleton with the living operator22. A key issue may be human-machine interaction and the ability of intuitive cooperation between humans and the independent robotic environment, increasing their effectiveness on net-centric battlefield. 22 E. Mikołajewska, D. Mikołajewski: Egzoszkielet jako szczególna forma robota – zastosowania cywilne i wojskowe. „Kwartalnik Bellona” 2011, nr 1, s. 160-169; E. Mikołajewska, D. Mikołajewski: Zastosowania automatyki i robotyki w wózkach dla niepełnosprawnych i egzoszkieletach medycznych. „Pomiary Automatyka Robotyka”, 2011, nr 5, s. 58-64; E. Mikołajewska, D. Mikołajewski: Exoskeletons in neurological diseases - current and potential future applications. “Advances in Clinical and Experimental Medicine”, 2011, nr 20(2), s. 227–233; E. Mikołajewska Neurorehabilitacja. Zaopatrzenie ortopedyczne. Wydawnictwo Lekarskie PZWL, Warszawa 2009, s. 74-76. 150 OPTIMIZATION OF LOGISTIC SYSTEM IN THE POLISH ARMED FORCES NDU Scientific Quarterly no 4(89) 2012 ECONOMY OF SECURITY AND LOGISTICS OPTIMIZATION OF LOGISTIC SYSTEM IN THE POLISH ARMED FORCES Col. Assoc. Prof. Wojciech NYSZK, Ph.D. National Defence University Abstract The optimisation of the logistic system results from the urgency of complex problems and regulations appearing due to the logistic transformations in the Polish Armed Forces and also from adjusting its structures for tasks and commitments as well as for the planned and performed organisational-functional changes. The goal of elaboration is to introduce these changes in the process of the logistic support of military troops during peacetime, mainly at the angle of tasks performed by military logistics according to the needs at all army organisational levels. Undoubtedly, an essential factor for implementing changes adjusted to the logistic system of the Polish Armed Forces is the membership of Poland in the North-Atlantic Alliance (NATO) and the European Union (EU). It requires the necessity of taking permanent actions aiming at, among other things, the complex integration of the logistic system in the Polish Armed Forces with the structures of Alliance, mainly with its procedures to achieve the essential level of standardisation and unification. The general purpose of this process is an increase in the effectiveness of military forces and the enlargement of the access to defence resources of the member states. Removal of inaccuracies in logistics of the Polish Armed Forces is accomplished at stages. The basis for the undertaken ventures are the decisions of the Minister of National Defence, records in the programs of Armed Forces development and the plans of development for the logistics imposing the new task-structural competences or verifying the existing ones. Key words – logistic system, subsystem, codification, logistic equipment, stationary logistic potential 151 WOJCIECH NYSZK Introduction Membership of the Polish Republic in NATO intensified the adaptation process in the Armed Forces. This process is aiming at reaching a required level of standardisation in all military activities and its functioning systems, including logistics. The transformations of the Polish Armed Forces and their involvement in NATO structures also forced the need for transforming the logistic system at an angle of adjusting it to the standards obligatory both in the armies of the EU and NATO. The result of these changes was the acceptance by Poland of the long-term requirements of defense initiatives resulting in a wide spectrum of allied commitments in the consecutive editions of NATO Armed Forces Objectives as – Defence Capabilities Initiative (DCI), Prague Capabilities Commitment (PCC). A very important role was also played by the conclusions resulting from crisis reactions and operations in the on the Balkans, 11th September in U.S. and military actions in Iraq and Afghanistan. Outline of the functioning of the logistic system of the polish armed forces The act of The Polish Armed Forces being involved in task accomplishment as part of the NATO Alliance generated new requirements for military logistics demanding a systemic and far-reaching approach. The tasks of the logistic system were divided into the six basic areas that were not covered by the assumptions of logistic doctrine. In such a logistic system as the Polish Armed Forces all subsystems at the particular levels of organisation in the army did not have any parallels. At the central level, the logistic system of the Polish Armed Forces was formed only by the three subsystems; managerial, material and technical. The Chief of the General Board of Logistics was responsible for the logistic system of the Polish Army. The Board of Logistic Planning and the Material-Technical Board in the General Staff were subordinated to the Chief. The Material-Technical Board functioning in the structure of General Staff was an organisational cell appropriate for creating the directions of development and elaborating the structures of functional-organisational logistics in the Polish Armed Forces during peacetime, crisis and war. The Chief of the General Board of Logistics supervised the operational readiness of the logistic system. He established and determined the main directions and ways of task accomplishment for the logistics in the national and international area. The other elements of the subsystem were beyond the responsibility area of the Chief. 152 OPTIMIZATION OF LOGISTIC SYSTEM IN THE POLISH ARMED FORCES To appreciate the importance of problems in the General Board of Logistics 2000 – 2004 the basic trends of optimisation were specified to adjust the logistic system for the standards obligatory in the NATO Armies and the EU. The urgency of optimisation came also from: − a necessity of setting in order the task priorities specified in legal regulations and decisions of the Ministry of National Defence; − a necessity of adapting areas of competence in logistics, which were dispersed till now, to the tasks resulting from “The Logistic Doctrine of Polish Armed Forces”. The purpose of doctrine is to draft procedures essential for managing logistics in the Polish Armed Forces including cooperation with logistics of commands in the NATO and international organisations supporting the logistics of the Polish Armed forces during peacetime and war; − the providing of a 30-day self-sufficiency fixed length of time for Polish military troops during operations abroad; − the need to provide a considerable flexibility in possibilities of logistic adaptation to various climatic conditions; − lack of commonly functioning software systems to support the management of logistics; − insufficient progress in indexation and codification; − low level of staff professionalisation. An important factor determining the state of the logistic system and possibilities of its essential changes was a lack of impact of the Chief of General Board of Logistics (coordinator) on the allocation of financial assets for task accomplishment. A systemic lack of grounds for direct impact on achieving the logistic purposes financed by branches of the Polish Armed Forces was acutely experienced. It caused either obstacles or made at impossible to execute the task accomplishment in the required ranges and to the planned deadlines. The applied system of persuasion was not always so effective, especially in a situation of the permanent shortage of financial assets. The limitation of military expenses implied the necessity of actions tending to improve the management efficiency that was quite possible due to a unification and integration of the entire logistic system. It forced the centralisation of the logistics management processes. Taking advantage of the conclusions from the currently functioning logistic system in the General Board of Logistics of the Chief, the Concept of reorganisation of the Logistic System in the Ministry of National Defence was elaborated with the following assumptions: 1. Optimisation and adaptation of the executive potential of logistics in the three branches of the Polish Armed Forces to the real needs resulting from previous commitments together with the accomplishment of the regional logistic system. 2. Removal of the basic obstacles that curtail and disturb the functioning and efficacy of logistics in the Polish Armed Forces. 153 WOJCIECH NYSZK 3. Restructuring of logistic systems in an essential range according to new conditionings in the Polish Armed Forces and NATO. When fulfilling the assumptions of “Concept ….” from the part of the logistic potential at the level of General Staff and the branches of Armed Forces by the end of 2006 the legal body for guiding the executive logistics was established as the Inspectorate of Logistic Support for the Armed Forces. Now it is the Central Logistic Organ in the Ministry of Internal Affairs and is the only one to provide complex logistic support inside the state and for military troops in missions abroad. Simultaneously the Inspectorate of Logistic Support has the authorisation of the competent entity to keep at its disposal the financial assets of the second degree. The Inspectorate of Logistic Support for the Armed Forces is the decisive centre capable of the complicated solving of tasks in the range of: 1. The competence function for logistic equipment. 2. The Central Logistic Organ standardising the entire management of logistic resources from their implementation to withdrawal. 3. Moreover the Inspectorate performs tasks in: a) adjusting the logistic system of Polish Armed Forces to requirements of NATO and the EU, b) elaborating the rules to protect needs of mobilisation and war concerning the combat and material assets, including assessment of size, dislocation and rules of gathering, deployment, c) supplementing the needs of logistics in a framework of: - maintaining the budgetary and mobilisation reserves of the state, - preparing the GN for the tasks resulting from PMG, - support of domestic and allied forces by the civil sector, d) responsibility for achieving the logistic purposes on the scale of the Armed Forces, e) coordination of the entire complexity of a mission resulting from the duties of host nation and the state sending its military troops abroad. Simultaneously, the Inspectorate of Logistic Support took over part of the tasks from the General Board of Logistics, most of the tasks from branches of the Polish Armed Forces (with exception to tasks connected with logistic planning) and tasks from the Head of Transportation and Troop Movement, as well as part of the tasks from the Infrastructure Department of the Ministry of National Defence. The creation of the Inspectorate made it possible to bring order into problems connected with the issues of command and the performance of tasks in the rear zone, especially in a framework of logistic support (including HNS) and its functional connections with the system beyond the military. After the creation of the Inspectorate of Logistic Support the logistic system at particular levels of organisation in the Polish armed Forces is composed of: 1. The Board of Logistic Planning – as part of the structures of General Staff – as the logistic planning section that preforms the function of the organiser of the 154 OPTIMIZATION OF LOGISTIC SYSTEM IN THE POLISH ARMED FORCES logistic system and it is responsible for contributing to the elaboration of the development program of the Polish Armed Forces. It is also responsible for the proposals for the medium and long-term development programme of the PAF in a framework of improving the logistic system. 2. Sections of logistic planning G/A/ N-4 at the level of military branches of PAF. 3. Logistic planning in the military staffs (G/A/ N-4 and the Chief) and their executive structures at the tactical level covering the mobile units and logistic devices designated for direct logistic support during peacetime and war. The organisational structures of logistics at this level provide management of logistic support in the military units and cooperation with the logistic structures of NATO according to the Objectives of The Polish Republic Armed Forces. Moreover, at this level the intention tend to remove the financial-economic tasks from the commanders responsibility on account of operational-educational tasks. For this purpose there is a specialised military unit: the Military Economic Section that is subordinated to the Inspectorate of Logistic Support. The final model of the logistic system in the polish armed forces In the final model a logistic system should be characterised by mobility, flexibility, simplicity and an ability for rapid reaction. It ought to be organised in such a way to provide for self-sufficiency and to make possible task accomplishment and maintenance of combat capacity in the supported troops. A method for improving its efficiency is to reorganise the logistic structures and to combine them with a decrease in the cost of the functioning of military units in the particular branches of the Armed Forces and the continuation of ventures connected with the integration of logistic subunits at the tactical level. The results of this program show an improvement of the system dealing with the management logistic resources. The implemented concept will rationally relieve the commanders’ burden of financial-economic tasks and will not deprive them of deciding about priorities in a framework of logistic and financial support of military units. As a consequence of the planned changes in the logistic system of the Ministry of National Defence the Military Economic Sections, as the support unit subordinated to the military bases, gather the needs and deliver supplies as well as render services for the supported units according to the priorities settled by the commanders of branches in the PAF. Taking into account the experiences resulting from long-term participation of Polish military units in peacekeeping operations, it is necessary to notice the need of implementing the logistic solutions according to NATO standards, that is 155 WOJCIECH NYSZK a condition enabling them to function without conflict in a multinational environment. In the case of supporting troops in allied operations, it is extremely important to gain a transparent uniformity of documents and procedures used by logistic organs in staffs and military units. That in turns, may constitute the basis for success in the domain of logistic interoperability. It is a factor stimulating the proper functioning of multinational logistics. Obtaining a prospective model for the functioning of a logistic system should be considered with optimising the structures of the stationary logistic potential of the Armed Forces submitted to the Chief of Inspectorate of Logistic Support. The restructuring and optimisation of the stationary logistic potential is possible on account of the forming of Regional Logistic Bases on the grounds of dispersed stationary elements of technical and material support. In the final model (after 2012), 4 Regional Logistic Bases will render logistical services in the region of responsibility for the military units of all military branches in the Armed Forces regardless of their subordination. The next very important element at the disposal of modern logistics is a possibility of searching for new solutions for the performance of logistic support using outsourcing. A modern battlefield develops due to technical and civilisation progress. It generates new demands also in the framework of military support. One of the methods of improving army logistic support is the use of an external supply of sources and services rendered by non-military entities. The concept of outsourcing has been widely applied in the activity of economic entities; that is the new strategy of management connected with delegating outside the tasks not connected directly with the basic activity of an organisation. That is why the organisation can focus its resources and assets on the areas constituting the basis of its activity. Experiences of many states within the framework of NATO point at the great possibility of effectively using this form of service rendering. The departmental Team (Group) for implementing the contract system of services beyond the military was established by the Minister of National Defence. This Team specified the area where an array of proposals concerning rendering services in the following domains is included: • Repairs and services for military equipment, telecommunication nets and computer equipment, • Leasing vehicles, load equipment, machines, aggregates and specialised devices, • Utilisation of combat assets, rockets, fuels, rubber goods, chemical agents, disinfectants, medical waste, expired supplies as well as toxic waste, • Transport, • Gathering and storing reserve supplies, 156 OPTIMIZATION OF LOGISTIC SYSTEM IN THE POLISH ARMED FORCES • Social cover of the military, • Maintenance of military estates, • Training sessions, • Legal and administration assistance, • Security of facilities, • Security of the Polish Logistical Components (nutrition, services of laundry and repairs, supplies of fuels and grease products, supplies of common use assets, organisation of camps, accommodation and social services, repairs of modern equipment. However, the priority in seeking new solutions should be the combat readiness of military troops and their capability to perform tasks and missions during peacetime, crisis and war. The Armed Forces ought to preserve skills for performing training and support with security during the situation of crisis and direct threat. Disturbances in rendering services provided by civil contractors cannot influence the combat readiness of the Armed Forces. It seems that the solution employed within a framework of outsourcing should be supplementary to a support system and functional security in the range of Armed Forces having a positive correlation. A lack of systemic solutions in this range also results, among other things from a limitation of the legal system of the Polish Republic and legal gaps regulating these problems at various levels of departments. It concerns among others the things regulations in a legal act on public finances, public orders, taxes from goods and services, VAT, the signing of agreements by the units of the public finances sector and the departmental regulations in the range of military commanders responsibility as well as the branch regulations concerning the economy in the budgetary unit of the military. The considerable possibilities in this field may bring about the planned legal act on public-private partnership. Nowadays, accomplishment of new tasks of the Polish Armed Forces, including logistics, imposes organisational and functional changes as well as also generating the necessity of improving the processes of logistic support. When improving these processes the priority is to gain predominance in access to information that must be gathered, stored and shared in a proper time at an appropriate level of decision while guaranteeing the required security level. It can be done when building and implementing the integrated, multilevel information system. Despite the fact that what is to be done is known, the existing organisationalfunctional conditionings, habits, restructuring of tasks and competences and lack of long-term prognoses obstruct the creation of a finally integrated, multilevel information solution. The creation of such solutions requires a holistic strategy covering description of particular processes of management at all organisational levels of logistics. 157 WOJCIECH NYSZK The application of modern technologies from tele-informatics in the department of national defence requires the analysis of state investigating density of information networks. In particular, it concerns the coordination of basic information ventures: the sector of main accountant and logistics. Right here The coherence between sectors must be maintained right here; financial, material, technical, medical, transport, movement of military troops and the infrastructure. In the logistics, finances or personnel departments of national defence, there is not any information system functioning to support all organisational levels, in particular the branches (sectors] from the economic sector in the budgetary unit of the military thorough regional bases for materials, military districts, kinds of military forces to the central level. The current lack of stability and transparency of logistical components at all organisational levels of national defence badly influenced the projecting and implementing of information systems. A lack of information structures or their inefficient remainders in logistics, financial assets dispersed in departments, a lack of prospective programs and plans for financing the information science development obstructs the implementation of modern information solutions. The currently functioning logistic systems of information should be adjusted to the new requirements or remade. Depending on the level or sector, the particular information systems are not mutually correlated and integrated so their utility does not fit the present needs. It is suggested that the ventures in the range of logistics of the national defence branch would cover all organisational levels of military branches and include the logistic systems: material, technical, medical, transport and troop movements as well as infrastructure to integrate them also with the finance and employment sectors. The basic trends in development of the military logistics with the information nets should cover the latest technologies (software, applications, equipment, computer networks) and tele-information security. Moreover, it is necessary to accelerate the development of a system of identifying the defence devices as the basis for the creation of databases enabling the computerisation of the entire property of the military. In the final effect the Integrated Multilevel Information System Supporting the Logistic Activity should be established. The system would work during peacetime, crisis and war to enable the exchanging of information with similar systems functioning in the national economies of NATO and EU states. Conducting a uniform registry in terms of quantity, quality and value and material-financial planning, based on an integrated informational system, requires a credible system of identification and classification of resources remaining in the department of national defence and the new ones implemented to be used. The implementation of such a system will enable the functioning of all planning, registering reporting systems in the national defence department. The biggest 158 OPTIMIZATION OF LOGISTIC SYSTEM IN THE POLISH ARMED FORCES obstacle in effectively introducing the modern solutions in tele-information has been the lack of a uniform basis to identify all defence products. In taking into account the need of interoperability[IO] in the range of the Alliance in the area of logistic processes, it is necessary to perceive also the necessity of the common implementation of the NCS NATO Codification System in the department of national defence. Due to the complexity of identification and codification processes, as well as the magnitude of engaged forces and assets, in the initial stage the Uniform Index of Material (UIM) will function in the department of national defence. The UIM is created, maintained and distributed by the competent entities and administrated by the logistics department. It will be the solution that improves the management of the military resources in the national system by the identification and classification of all products (resources) as a matter of material-financial turnover in the department of national defence. Identification and classification by UIM will enable a stocktaking of defence products and point at the products that due to their qualities of “NATO importance of supply” will be the first things proposed by competent experts to be codified according to the NCS. Both identification of defence products and their integration require a rapid building and rebuilding of the coherent tele-information structure. An appropriate development of tele-information systems ought to make possible the connection of all Regional Logistic Bases with their material stocks and economic sections to the NIL-WAN and INTER-MON nets. A creation of these nets in the units of local nets should also be possible. Development of computer nets is an expensive venture so it should be performed in the logistic units when the dislocation and magnitude of logistic, financial and the personal potential is determined. Cooperation with the NATO systems, EU and national economy should also be provided. In particular it concerns the Multilevel System of ADAMS, Multi-aspect Software Model ACROSS (Allied Europe ACE Optimisation Software System) and the System of Logistic Modelling (LOGREP). The new challenges in the XXI century are connected with the implementation of modern tele-information solutions: they require new concepts, well prepared people and the implementation of accurate motivational systems. Logistics, finances and the employment sector in the armed forces are most susceptible to computerisation but simultaneously the results of the information science are not easy to be popularised by the media compared to, for instance, a purchase of multitask aircraft, combat vehicle etc. The implementation of tele-information nets into logistics, finances and employment procedures at particular levels of organisation ought to ensure a quicker achievement of purposes and an optimal accomplishment of tasks. 159 WOJCIECH NYSZK Conclusions It is reasonable to expect that the accomplishment of task areas specified in the elaboration, according to the stages and deadlines of task performance, will make it possible to achieve the assumed organisational-functional and qualitativequantitative changes in the logistics of national defence department including the operational-logistic, technical and technological capacities. They are determined by the Minister of National Defence and the Chief of General Staff and they also result from the Objectives of NATO Armed Forces, long-term requirements for Poland and its Commitments for the Defence Capacity. The result of implemented changes will be an improvement of support from the host state for the Polish Armed Forces and its functional connection with the national system of support in the civil departments. It is possible to state with satisfaction that during recent years it has been possible to implement a series of changes in the logistic system. They considerably improved its functioning and capacity of task performance in the national and allied system. The extremely advantageous effects are: − an increase in effectiveness and efficacy of logistic tasks accomplishment for the Polish Armed Forces during peacetime, crisis and war, − the rationalisation of logistic structures at particular levels of organisation in the PAF as well as competence of planning and executive organs, − an improvement of abilities for cooperation in the multinational system and providence of support for the allied forces of reinforcement, − the improvement of efficiency in managing the logistic resources of the military and a better use of resources of the national economy, − the beginning of works on systemic solutions in a framework of PMG with the identification of the PMG task area, and the schedule of task performance was elaborated, − the creation of a section in the Operational Command for performance of tasks connected with the organisation and coordination of logistic support for contingents abroad, − the continuity of works on the creation of the Uniform Material Index and implementation of logistic systems; in the Military Economic Sections, − the joining of the allied planning of stocks and displacement of military troops with the use of tele-information supportive systems of NATO, − the determination of areas susceptible for the application of outsourcing in the Polish Armed forces as one of numerous forms of military support. Bibliography Land Forces Logistic Doctrine ALP-4.2, Finale draft October 2002. Logistic Doctrine of the Polish Armed Forces DD/4. SG/2004. NATO Glossary of Terms and Definitions, NATO military agency for standardisation AAP-6 (T). 160 THE ESSENCE OF SECURITY ECONOMICS AS A SCIENTIFIC DISCIPLINE NDU Scientific Quarterly no 4(89) 2012 THE ESSENCE OF SECURITY ECONOMICS AS A SCIENTIFIC DISCIPLINE Lt. Col. Sylwester T. KUREK, D.Sc. National Defence University Prof. Janusz PŁACZEK, Ph.D. Wyższa Szkoła Informatyki, Zarządzania i Administracji w Warszawie Abstract The objective of this article is to present the essence of security economics as part of a modern scientific discipline in the methodological context of reflection. We present the evolutionary nature of security economics, its specific field of inquiry and attributes such as: language, research methods and science streams. This article also included information about connections with other disciplines, functions and usability (pragmatics) of security economics. We briefly highlight research and academic centres which are engaged with economics and defence inquiries. All presented information can be treated as an outline of these problems, which have methodical characteristics and knowledge ordering. Key words – security economics, usability The evolutionary nature of security economics Security economics has its evolutionary origin in historical knowledge. It appeared as a result of economics science of wars and the fundamental economics of national security. Political consciousness of economy during battles and wars grew in line with war measures and their development. Years ago tribal wars were not prepared, together with the preparation of food, clothes and armaments. As the nation grows along with production power, it lead to wars. This lead to supply needs for certain products. Governments and commanders noticed the connection between military power and economy. Experienced leaders understood that the greatness of an army in the field depends not only on the size of the nation but also on the economic potential. Financial support was always a very important key. For ages this was a problem for rulers. During mercantile times, trade exchange was identified with the power of a nation. During classical times the production role was emphasised, which is the main source of a nation's wealth along with with military power. During physiocratism times the most important thing was selfsufficiency in food production – an important factor during an economic blockade. It is known that the level of military techniques determined the method of fighting, and always enforced new requirements for back-ups, which are the dynamics and 161 SYLWESTER T. KUREK, JANUSZ PŁACZEK structures of societal reproduction processes. The war economy system was established during the First World War and became a new science discipline – war economics. War economics between the First and Second World Wars put a great contribution in economic preparations for the new World War. Especially the role of industry and technical progress of battle equipment. At those times the obligatory rule was “economy works for the front line needs, for the army”. Then the new effect of the arms race between the two opposed economy-political systems appeared which was projected on economy growth. Even if there was a peace between the two blocks, the level of budgets of the nation did not allow for them to resign from typical war economy actions. Economic-Defence studies are important now, especially during times of peace. That is why war economics is called now defence economics. They focused on connections between space planning and defence system, on creating economy mobilisation plans, energy and food system, as well as economy calculation of the role of the economy-defence system. Both names (war economics & defence economics) have traditionally a historical meaning tied between national defence and national economy. There are an essential number of premises indicating the way of defence economics' evolution towards the new science discipline – security economics. The most important premise is political changes in Europe during the 1980’s and 1990’s. At that time the Warsaw Pact and Berlin Wall was demolished. The nations of central Europe moved on towards a democratic system and its economy towards a free market model. These nations limited their defence budgets and size of armed forces. In the literature of those times it was noticed that there were changes in analysing the national economy in order to strengthen security in a crisis, not military but terrorist crisis, natural disaster or lack of food, energy and water supplies. Another very important issue is that Poland is a member of NATO (since 1999) and European Union (since 2004). The complete opening of Poland meant also that information penetrated from the Western countries. The real military threat cannot be excluded, which causes the necessity of a permanent capability of military standard levels. There is always a possibility of local outbreaks or the necessity to participate in alliance operations. It is important to define the strategic challenges and potential sources of menace for the country (alliance) as well as operation prevention actions. Prevention strategy in the modern world has greater and greater meaning and is more efficient. That is why it should be developing, its methods should be modernising, people should be informed better. The extra military menace and its meaning grow more and more. The number of threats is growing nowadays: organised crime, terrorism, atomic weapons, economic wars, information’s blockade, financial dependence or technology espionage. We are constantly bombarded by media with the effects of natural disasters or damages to the 162 THE ESSENCE OF SECURITY ECONOMICS AS A SCIENTIFIC DISCIPLINE ecology. To resist against all these threats we need to employ the organised, well trained forces with mobile equipment. On one side there is the army (national and alliances) on the other side there is the whole governmental machinery (extra military). However, this system (crisis and security reaction system) is not ideal and requires much effort to improve. The war economy in the army is far away from the analysis as well as the economy in the army. The action field moved for the peaceful forming of economy security basis which means the economy resistant to modern, extra military threats. The clear stream has been aroused connected with the crisis reaction during peace times. We should consider the macro and micro scale of the researched effect. This issue concerns local needs of certain economy or industry brunches as well as groups of countries, alliances, continents or even the whole globe. Summarising it means the need of extending present defence economics research of the new elements. The new matters of extra military field should be included into new discipline - security economics. The range of this discipline has been evolving constantly, that is why the identity accents in its name as well as the relations between and the merits connections (figure 1). Security Economics “SE” Defense Economics “DE” EW < EO < EB EW ⊂ EO ⊂ EB Military Economics “ME” Figure 1. The range of present economic-defence disciplines The field of inquiry To correctly define security economics we should define two basic concepts. Security, according to general principles, is understood as a lack of threats or protection against threats. To understand it on a political basis (nation) we can say it is a result of organised protection and defence against all military and extra military, foreign and domestic threats, employing all governmental forces. In fact 163 SYLWESTER T. KUREK, JANUSZ PŁACZEK there is a symbiosis of the security threats elements, in the first place – extra military characters. Economics has been defined as a part of economy which researches economic activity in a certain field of national economy. Its objective is to define by scientific methods the effective instruments of economic policy and the economic rules in this field. Both definitions corresponds with each other very well. They indicate how to manage, in what form, and by what instruments. All of this is to efficiently manage economics against all threats. That is why economics connects two groups of science – security/defence and economy; as well as being connected with political science. In general it can be stated that security economics is a particular scientific discipline, which researches essentials, forms and methods of national economy functions, which are ready to fulfil the national security task and it analyses and evaluate the economic security level of the country. It concerns the effectiveness of economic resources during peace, crisis and war. The objective of economics is to help create a rational security policy. So, the main task is to look for a way for the efficient management of the national reserves to create national security. The subject of security economics is the correctness of the building economy process system, which is focused on the three different states of the nation: peace, crisis and war. Nowadays the research program of security economics is more complex than a few years ago, and include such issues as: dividing of the burden of defence within a framework of alliances, managing security and defence systems in crisis, civil-military cooperation, economictechnical possibility for support in times of natural disasters, social-economic costs of armament conversion, reconversion of army personnel and economical terrorist’s premises. The research object of this discipline (specialty) are the economic basis of security and defence of the nation (EBoSaD – figure 2, table 1), particularly defence economy in different types. The research includes the connections of economic process to create a rational security policy. Defence economy which is the EBoSaD core is a fundamental part of any nation, and every nation must utilise part of the nation’s economy for its own defence policies. This part has been always variable and grows during a military crisis. There were situations in history during world power wars where the role of defence economy was very slight. In the Middle East there is a paradoxical situation where in peace time, the nations finance the security needs as in war. There are four types of defence economy (table 2): – peaceful defence economy – when the burden of gross domestic product is less then 7-8%, – war readiness economy (sometimes crisis) – when it/s over 8%, – war economy – it’s over 14-16%, – demobilisation economy – when the burden of gross domestic product is diminishing in a short time. 164 THE ESSENCE OF SECURITY ECONOMICS AS A SCIENTIFIC DISCIPLINE CONSUMPTION AND DEVELOPMENT NATIONAL ECONOMY A B C Space not useful for security and defense matters “Double usage” space Space used only for security and defense matters SECURITY ECONOMICS ECONOMY BASIS OF SECURITY AND DEFENSE (EBoSaD = B + C) Economy Basis of Security and Defense Management System Defense Economy System Defense economy managing Defense (military) industry Economicdefense infrastructure Adjustment of defense needs capabilities of economy Economicdefense reserves Scientific and technical progress Economic mobilization REGULATION SPHERE International economic-defense cooperation Defense Logistic System Defense needs fulfilling Services for defense system Host nation support (HNS) REAL SPHERE Figure 2. Economy basis of security and defence 165 SYLWESTER T. KUREK, JANUSZ PŁACZEK Table 1 Interpretation of the content of economy fields with the view point of different needs fulfillments Space Economy Meet the basic needs A Meet the consumption; Needs of higher type and development; Rational transformation space Optional cost of security comparing to other needs Economy basis of consumption and development B C A+B B+C Security economics Space not useful for security and defence matters “Double usage” space Space used only for security and defence matters Economy basis of security and defence Commentary: The certain spaces are created by: A - B - C - Indispensable reserves for civilians surviving, governmental functioning (taking care of children, sick people, minimum of administration). During peaceful times the reserves are used for consumption and development, but during times of threat may be used to counteract (communication and transportation, after conversion production). It is also the space of rational transformation of the reserves. Reserves used for security needs only (military industry, reserves and stocks in case of war, supporting the alternative supply sources). Table 2 The characteristics of defence economy types Peaceful defence economy War readiness economy War economy Defence expenditures < 7-8% GDP Defence expenditures > 8% GDP Defence expenditures > 14-16% Demobilisation economy Burden of GDP is diminishing in a short time The above factors are relatively general and have to be compared over a period of several years. For some countries as increase means “hot war” while for others it means nothing more than just doubling the defence expenses. Besides that these factors must be observed, because they indicate the based relativeness of connections between economy and defence. The ability of defence a state economy (majority in EBoSaD) to achieve the next stages of readiness (or decreasing) means that a defence state economy is very flexible. The more flexible it is, the faster and more able able it is to fulfil its defence functions. For sure it is a fundamental characteristic of modern defence economy. This flexibility is defined as the ability to change, even for a huge organisation, with a negligible loss of time or resources. It depends mostly on management skills, moral readiness of the nation to meet new challenges and on the economy function. It is said the economy is more flexible if it has more reserves at its disposal (production, transportation). Also the mobility of labour 166 THE ESSENCE OF SECURITY ECONOMICS AS A SCIENTIFIC DISCIPLINE force, and technological ability means that the key role is taken by managers, engineers and scientists. Defence economy is a real core EBoSaD of the country and it has its own role to play. The basic goal is to create premises to build the financial basis of security and defence and to ensure the survival of civilians during crisis or war. Its aim is to effectively exploit the existing economical potential for the sake of the security. The typical examples of the peaceful defence economy tasks are: – to prepare and constantly update the economy mobilisation plan in case of threat or war; – to maintain, support, train, and equip the army, as well as its building and military facilities; – to adjust technological infrastructure to defence and security state requirements; – to create conditions for the survival of civilians in extreme situations, e.g. preparing civil defence; – to gather state reserves; – to prepare production and technical (repair) bases in the industrial branch during times of threat and during war; – to run the science and research studies in defence and security fields; – to participate in the task and operations for the alliance’s armies and in realising defence investments. The basic economy elements of security and defence which speaks of its readiness for the action are among others (figure 2.): defence industry, strategic reserves of the state, economy-defence infrastructure, science-research centres, international economy-defence cooperation and defence logistic. The key role is state economy organisations who manage the security and defence of the state. The important premise that defines EBoSaD is considering the conditions of economy functions. The main conditions of this type are: geographical position of the state; economic and military alliances; level of economic growth; level of reserves (manpower, materials and assets (cash, gold reserves etc); location of defence-economic potential; volume of defence expenditures. To characterise security economics among nationwide knowledge we may separate three attitudes: – considering security economics in security and defence sciences taking into account that it appeared together with war science, we can learn from military conflicts; – including security economics in political science as an inquiry of the internal and international political relations, because war is a political act; – including security economics as a part of general economy science as one of detailed economics. The object of its interest is the state economy but in a defence function. 167 SYLWESTER T. KUREK, JANUSZ PŁACZEK At the same time we reject the thesis that security economics can be a separate science discipline. We are sure that security economics lies in the middle of these sciences. It also depends on the place of lectures and science centres. In Poland for years defence economics was a specialty of economy sciences. Currently security economics is included in security or defence sciences as a result of stereotypical premise, that if it is security, it must be connected with military uniforms. It should not be connected this way. We understand that the government is responsible for national security, but individually businessmen and consumers create economic systems and have bigger roles to play, about which A. Smith in XVII century had written. Language, sciences streams and research methods Each science discipline has its own specific language. There are different categories which describe the current state. These categories are historically based, they are changing all the time as well as conditions of functioning and surroundings. In security economics there are specific descriptions connected with the functioning of security and defence of the economy of a certain nation. Some of the categories are brought from other science disciplines, but there are some new ones that describe certain processes better. Most often categories are: potential, reserves, expenditure, cost, analysis, evaluation, value, parameters, factors, mobilisation, methods, model, allocation. These categories are narrowed to specify the field e.g.: – reserves – to manpower, objects, financial and information; – potential – to economy, defence or military; – mobilisation – to economy, technical infrastructure, economy subject; – expenses – to defence, military, armaments, or extra military. To explain the specifics of this language we should also explain and highlight the isolation from the other sciences, which are sometimes even close to these sciences. We need to specify the following categories: – economic-defence potential, which roots are in general economy category and has its roots also in exact and military sciences (security and defence science in present); – economic mobilisation, which moved some mobilisation rules of the armies to economy ground; – strategic raw materials – their roots are in the word “raw materials” but it shows exact group necessary for security and defence needs; – war economy – expresses clearly the impact on a different country with the economic tools to force the beneficial behaviour; – intensity of economy – which means the ability of the economy to resist against bad conditions due to military actions of the enemy; 168 THE ESSENCE OF SECURITY ECONOMICS AS A SCIENTIFIC DISCIPLINE In the extra military category we can specify the following: – compensation of defence purchasing; – crisis management (reaction); – trans-frontier migrations; – action supporting the host state; – double-use equipment (goods); – economic espionage; – civil-military cooperation. In consequences there are three parallel main streams of the science of modern security economics: – first is a continuation of a present stream of war economics with the matters of: manpower in war economy, war distribution etc.; – the second has roots in defence economics, widening of disarmament economics, crisis management etc.; – the third one regards extra military threats as an organisation and functioning of the state organs, assortments, state reserves. All of the above science streams should serve the national security policy in the alliances as well as between continents. Considering science’s methods there are analysis and synthesis used in many different science disciplines. Also there are certain statistics methods used such as induction and deduction. Sometimes the interviews enrich the analysis. The science method depends on the task character and source of information. History’s wars and economies give comprehensive materials for research and study. Also it is important to make comparisons to today’s conflicts. It is very important to study this kind of historic material to observe the proper connections which demonstrate the basic war-economy processes. At the same time the anticipation of discovered trends and rules can help with the future planning and predicting of conflicts. Connections with other disciplines, functions and usability of security economics Security economics, as with each science discipline, has connections to a number of sciences and disciplines. It takes full advantage of their achievements. The strongest connections are with different economy branches like industrial, agricultural, transport and trade economics. Is has also connections with international affairs economics, geographical economy and the finances of the state. Defence and security sciences also play a significant role, as well as political and military alliances. This analysis considers periods of both war and peace. The military equipment, manpower etc – all of these are keys to the technological progress. The administration, law, exact sciences give the type of research methods and knowledge. Summarising there are clear connections between economy, 169 SYLWESTER T. KUREK, JANUSZ PŁACZEK security and political sciences. And we cannot forget about these discipline's surroundings, especially about the technological, social and political sciences (figure 3). 1 2 8 3 7 6 4 5 Legend: 1. Defence-Economic thought 2. Military-economic history 3. War economics 4. Military economics 5. Economic-Defence planning and programming 6. Economic-Defence simulation 7. Economic-Defence policy 8. Economic security Figure 3. The closer and further surroundings of security economics We can say that the functions of security economics are different from other science disciplines. There are three main functions: cognitive, creative and practical application. The first means information acquiring and their selection. In this area there is a huge amount of information which should be found, ordered and grouped. Nowadays the inflow of the economic, security/defence and political information is so great that we have to use special filters to choose the information needed for future research. The next function is a result of analyses, evaluation and formulating a hypothesis which need further verification. We can easily say it is a “specific laboratory” where all the products are put to test. The third function is realised in the process of postulations and conclusions. Based on this generalisation 170 THE ESSENCE OF SECURITY ECONOMICS AS A SCIENTIFIC DISCIPLINE we can form the statements, which enrich the theoretic thought of the researched discipline. We need to consider also the usability of this science discipline. We can strongly recommend the thesis that economics is extremely useful for state security. It is expected to give the answers and solutions, methods and instruments. Also it has to warn and stimulate, offering different questions. There is a need for this kind of research world-wide to create an efficient security system for people and nations. Security economics research programs and the researches centres It is difficult to describe the most important science problems of security economics. It depends on two premises: the first is the institution needs for this kind of research; the second one is a result of research scientists. There are eight following standard topics (figure 3): 1. The field of defence-economic thought: – origin; – connections and dependences; – forming the opinions; – theories. 2. Military-economic history: – role of war loot in the ancient countries power; – economic basis of Middle-Ages wars; – growth of the navy during Mercantilism times; – industrial revolution in England and war technology development; – economy bases influence on massive conflicts increase. 3. War economics: – war resources mobilisation; – war catering; – war economic effect; – war finances; – war resources allocation; – war production; – war costs. 4. Military economics: – finance army planning; – resources efficiency; – standing army economics’ dilemma; – civil-military cooperation (CIMIC); – alliances’ role in economic supporting; – military costs. 171 SYLWESTER T. KUREK, JANUSZ PŁACZEK 5. Economic-Defence planning and programming: – tools; – economy mobilising planning; – technological infrastructure utilisation for the SBiOP need; – economic conditions of the stabilising missions; – economic-social effect of disarmament; – management of defence-economic resource system; – economic-defence analyses related to cost-effect; – modern economic mobilisation. 6. Economic-Defence simulation: – economic-defence potential measurement; – economic-defence condition vaulting; – diagnoses methods and techniques; – modelling of the connections. 7. Economic-Defence policy: – army role in the economic-defence potential; – defence direction; – methods of economic-defence policy creating; – alliances; – decision-making; – arms traffic; – analyses and evaluation of the resources; – role of resources and strategic reserves; – role of the domestic industry; – international cooperation; – security and defence costs; – terrorists premises and cost of the terrorists control. 8. Economic security: – modern economy intelligence; – economic security of sectors (energy, raw, finance, food, ecological etc); – economic security threats of the country; – methods and resources of the economic security. The above subjects may be of different shades. In the effect we wanted to show the connections between theory and practice. We hope, presented problems may be a present program of security economics research. It is important to point out the research sciences centres and the scientist. There are seven main centres: – British centre at the Defence Study University Centre in York (K. Hartley, D. Greenwood, M. Kalder, G. Kenedy, J. Lovering) and scientists in other centres (N. Cox, J. Thompson or R.P. Smith). – American centre at The University of Texas in Dallas (T. Sandler, D. Arce), Harvard University (E.B. Kapstein, L.D. Olvey, J.R. Gulden, R.C. Kelley), 172 THE ESSENCE OF SECURITY ECONOMICS AS A SCIENTIFIC DISCIPLINE California University (J. Hirshleifer, M. Interiligator, M. McGuire) and also people working at other centres (A.L. Ross, G. Kennedy, N. Hooper, D. Braddon, P. Dowdall, M. Kaldor). – Swedish centre at the International Stockholm Peace Research Institute (SIPRI) and Peace and Conflict Research Division at Uppsali University (M. Sollenberg, P. Wallensteen, I. Anthony, E.M. Loose-Weintraub, E. Skons, S. Deger, W. Omitoogun, C. Perdomo, D. Fruchard, S.T. Wezeman, P. Satalenheim, M. Ward). – Russian centre at the Russian Science Academy, Russian Natural Reserves Academy, National Economy Academy (W.K. Senczagow, W. Chaczaturow). – German centre at the Budesrepublic Academy in Hamburg and Koblence University (J. Gerber, G. Kirchhoff, G. Werner, O. Hahn, H. Einhorn and G. Kozianka) and also the representatives of Military Economy Dachau Association (J. Blackert, E. Kuhn, M. Ebig, J. Saalbaum, P. Neuhaus). – Czech centre at the Defence University in Bern (M. Krc, J. Nedbal, J. Selesovsky, V. Sefcik, L. Odehnal, L. Stancl). – Polish center connected at the National Defence University (Z. Stachowiak, M. Sułek, J. Płaczek, L. Kościelecki, S. Kurinia, J. Wróbel, J. Olszewski, K. Stańczyk, S.T. Kurek). In other European countries (France – J. Aben, J. Fontanel and Italy – Jean Caro) these problems are also mentioned, but in very limited research. In every country all these problems are being analysed even if there is no specialists in this field of research. There is also a periodical magazine edited “Defence and Peace Economics”. This bi-monthly magazine was first edited in 1990 as “Defence Economics”. It is concerned with subjects like: economical aspects of defence, disarmament, conversions and peace. The readership of this magazine consists of international scientists and authors. The analyses and researches in the articles speaks of mathematical aspects of the research. Summary Summarising we can say that there is an authentic need for this kind of security economics analysis in Poland and in the wider world. Security economics is written for a positive impact in the scientific process and to help the economy and political sciences. There is research and scientific works as well as monographies and manuals and articles being published. This subject is lectured on at many academic centres. There are a number of great research teams of specialists and experts. The scientific thought is creating and research methodology is creating and verifying. All of these mean that we, as this article's authors, being at the same time the representative of this thought, are assured of the great prognosis of this thought for the future. It will find an important place among modern science. 173 SYLWESTER T. KUREK, JANUSZ PŁACZEK Bibliography Ekonomika obrony statu. Vybrane kapitoly, Krc M., Odehnal L. a kol., VA v Brne, Brno 1998. Єkonomuчeckaя бeзaпacиocть Poccuu, oбщuй kypc, пog peg. Ceнчaгoba B.K., Deлo, Mockba 2005. Gospodarka obronna Polski w końcu lat dziewięćdziesiątych. Szanse i zagrożenia, red. J. Płaczek, AON, Warszawa 2001. Górski P., Płaczek J., Skarżyński M., Sułek M., Wojna a gospodarka. Problemy, myśl, proces przemian, AON, Warszawa 2008. Hartley K., Sandler T., Handbook of Defense Economies, Elsevier, New York 1995 i 2007. Kurek S.T., Koniunktura gospodarki obronnej. Syntetyczne ujęcie modelowe, AON, Warszawa 20011. Kurek S.T., Logistyczny wymiar systemu obronnego państwa, Zeszyty Naukowe AON, Nr 3(83), Warszawa 2011. Płaczek J., Ewolucja polskiej myśli obronno-ekonomicznej w latach 1976-2000, AON, Warszawa 2001. Stachowiak Z., Kurek St., Kurek S.T., Bezpieczeństwo ekonomiczne RP, AON, Warszawa 2004. Sułek M., Programowanie gospodarczo-obronne, Bellona, Warszawa 2008. Wybrane problemy ekonomiki bezpieczeństwa, red. Z. Stachowiak i J. Płaczek, AON, Warszawa 2002. Zarys ekonomiki bezpieczeństwa, red. J. Płaczek, AON, Warszawa 2009. 174 THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES NDU Scientific Quarterly no 4(89) 2012 THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES Lt. Col. Sławomir BYŁEŃ, Ph.D. National Defence University Abstract The War Game and Simulation Centre (WG&SC) is able to support different kind of Computer Assisted Exercises (CAX’s), also it has the ability to conduct geographically distributed exercises. This article is an attempt to present the problems of logistics costs in CAX’s. The objects of research were the real logistics support of CAX’s, conducted at various locations. In comparison with other types of exercises, the use of computer simulation significantly reduces logistics costs. However, differences in the costs of logistics are also found in the Command Post CAX exercises. It depends on where they are carried out. Information contained in this paper shows the way to optimise and rationalise logistics costs. Key words – logistics, cost, the optimization Introduction Since the beginning of the twenty-first century, commands and staffs of leading armies of the World have developed the use of computer simulation for training in order to replace the practical deployment of troops. Nowadays, in this area an increased share of distributed computer simulation is assumed. Similar trends can be observed also in the training of the Polish Armed Forces. Awareness of the direction of the focus of leading the armed forces of NATO countries, led to the establishment in the Polish Armed Forces of a dedicated organisation of cells controlling computer-aided exercises1 CAX (Computer Assisted Exercise). Based on the decision of the Minister of National Defence2 in 2002 work began on creating a War Games and Simulation Centre (WG&SC), which operates in 1 Instructions for preparing and conducting exercises with headquarters and staffs in the Polish Armed Forces. DD/7.1.1 (A). MoD, Warsaw 2010, p. 8. 2 The basic documents that define the tasks, subordination and structure WG&SC were “Regulation No. 54/MoD of the Minister of National Defence, dated 21/08/2001 in the matter of the creation of WG&SC at National Defence University” and “Regulation No. 51/MoD of the Minister of National Defence, dated 08/26/2002 ordinance amending the years on the creation of the War Games and Simulation Centre in the National Defence University”, (Journal of Laws No. 16, MoD, September 17, 2002). 175 SŁAWOMIR BYŁEŃ conjunction with the American simulation systems, designed for the modelling and simulation of join operation ¬ JTLS (Joint Theatre Level Simulation). The WG&SC, in order to meet the global trends in the organisation of CAX exercises, and most of all to try to meet the demands Ministry of Defence, General Staff and Type of Armed Forces leaders in the rationalisation of expenditure on training, has set it self the objective of optimising the cost of computer-aided training, with particular emphasis on logistics costs. The purpose of this article is to demonstrate the economic benefits of the organisation of CAX exercises, carried out in a dispersed form. Keywords: the command post exercise, computer assisted exercises, distributed exercises, optimisation of costs, logistics costs. Systematic approach to the costs of military logistics Between 2008 and 2012, due to the economic situation actions were taken by the state at all levels of the Polish Armed Forces aimed at reducing the cost of military operations, especially the promotion of solutions according to the rationalisation of the use of funds allocated for defence. The basis for the functioning of the Polish Armed Forces is the defence budget for the calendar year, which consists of property and personal expenses and expenses related to the operation of armaments and military equipment, as well as expenses associated with the training of commands, staffs and troops3. It is in the rationalisation of expenditure on training, including CAX exercises in WG&SC, that measures have been taken to ensure its optimisation. Issues of logistics costs4 are among the most difficult and complex problems of modern logistics. The problem involves even the definition, separation and isolation. In the literature, there is the concept of logistics costs in different sections according to different classification criteria, and experts point to the different sources and types of costs and how to identify their structure5. Information on costs, their height, where the formation, deviations, etc., are the basis for conducting economic analysis, and thus economic decisions boil down to 3 Generally, the defence budget is divided into: defence expenditure (expenditure incurred for the functioning of the defence system of the country), military expenditure (costs money spent on the functioning of the armed forces and military expenditures (purchase of armaments and military equipment, and military construction.). See.: J. Płaczek, Economics of defence, NDU, Warsaw 1994, p. 80. 4 In terms of logistics, instead of the commonly used term "logistics costs" the correct name should be the term "logistics costs", a concept that does not affect the formal principles of cost accounting. See.: K. Ficon, Economic Logistics, BEL Studio, Warsaw, 2008, p. 254 and P. Blaik, The concept of an integrated logistics management, PWE, Warsaw 2010, p 373. 5 See eg: K. Ficon, op. cit, pp. 261-296 and P. Blaik, op. cit, pp. 370-410. 176 THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES optimising costs. On the other hand, a well-functioning system of information on costs of logistics processes is necessary to determine the size of the actual costs6. Logistics costs are one of the main criteria for assessing the effectiveness of any system of logistics7, and the minimisation should be a basic requirement of logistics processes. Logistics costs, through the impact on the overall economic results are the primary quantitative measure of the effectiveness and efficiency of these processes8. Civilian logistics divides the most commonly used criteria for the allocation of the costs of logistics into the following groups9: − logistics costs in cross-generic (generic division); − logistics costs by phase of movement and places of formation (split phase); − logistics costs logistics segment / component logistics processes (the residue division process); − cost by volatility distribution. The military is increasingly placing the emphasis on economic factors, where an important determinant of the training plan is to rationalise the cost of training10. Therefore, training in planning projects includes the principle of economic calculation in terms of 'cost – effect. In this regard, action is taken: − to reduce activities with the use of military equipment by introducing a wider range of process training school and training devices and simulators; − to equip military units with equipment to assist the training process; − to ensure the widespread use by the leadership and staffs of the centres of computer simulation and war games; − to combine various levels of command exercise in all types of armed forces; − to organise and conduct combat training in an integrated way, the after-ligo ¬ nach and training sites. In the army costs of logistics include many elements (components), mainly investment: financial, property, and personal time11, and the realization of logistics processes causing the cost of logistics. The most common cost-sharing is a generic cross-section, based on the criterion of economic content. The generic includes costs such as: 6 T. Kaminski, Logistics economic branch, NDU, Warsaw 1996, p 120. Efficiency (Latin Effectus - effect) is evaluated on the basis of efficiency and effectiveness. At the same time efficiency means "doing things the right way", and the effectiveness of "doing things right". See.: P. Drucker, [in:] J. Stoner and Ch. Wankel, Directing, PWE, Warsaw 1992, p. 29. 8 Performance by Pszczołowski, the effectiveness is defined as: 1) "positively evaluated compliance effort to", 2) "is effective in terms of efficiency and versatile in the sense of the primary component synthetic ...". T. Pszczołowski, Small encyclopedia of praxeology and organization theory, Ossolineum, Wroclaw 1978, p. 219. The effectiveness according to P. Sienkiewicz is seen as an essential criterion in the evaluation of the operational effectiveness of the system expressed as "... the ability of the system to the act, leading to the desired effect as the goal of this action". P. Sienkiewicz, Theory of systems efficiency, Ossolineum, Wroclaw 1987, p. 57. In terms of military efficiency, effectiveness and efficiency are used interchangeably because of the lack of clear measures (indicators) classification. 9 See.: M. Nowicka-Skowron, Effectiveness of logistic systems, PWE, Warsaw 2000, p. 93. 10 Training Doctrine of the Polish Armed Forces, DD / 7 (A), MoD, Warsaw 2010, p. 24. 11 K. Ficon, op. cit, p. 255. 7 177 SŁAWOMIR BYŁEŃ a) material costs: − depreciation; − use of materials, fuel and energy; − material services; b) intangible costs: − salaries of soldiers and army personnel; − other personal debts soldiers and military employees fail to pay; − intangible services; − cash outflow of premiums, taxes, fees and insurance; c) other costs. Undoubtedly, the cost of the military operations budget unit (MBU) occupies a significant place in logistics costs, including: – the costs of supply and field services: – organisation of food provision; – organisation of uniform provision; – organisation of supplies, fuels, and lubricants; – organisation of munition supply; – the costs of maintenance support: – maintenance of armaments in technical performance status; – repairs of weapons and combat equipment; – the costs of transport support; – the costs of accommodation; – the costs of health service support. In general, the allocation of logistics costs corresponds to the division of the military logistics system (CSSS)12, contained in the doctrine of logistics. Types of logistics costs are show Figure 1. Fig. 1. Types of costs of logistics in the budget of the military unit activity Study The most important positions in the logistics costs of the CAX exercises are the costs of feeding, accommodating and transporting participants. 12 The „Military logistics system „… is an ordered set of elements of the organizational structure and the functional areas which purpose, interconnection and relationships ensure the smooth functioning of the Polish Armed Forces in peace, crisis and war”. See: Logistic Doctrine of The Polish Armed Forces, DD/4, MoD, Warsaw 2004, p. 21. 178 THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES Variants of Computer Assisted Exercises According to the latest classification of military operations there are three types of simulation: Real, Virtual and Constructive13. This classification is related to the division of the two variables, namely the factor of personal and work environment. Schematic division of the criteria adopted by the simulation show in Figure 2. Fig. 2. Types of simulation in computer assisted exercises Study From the point of view of the most useful CAX exercises it is a constructive simulation, carried out in a dispersed form. In countries with long-standing traditions of using simulation systems, and above all, in the U.S. and Germany, among exercises in the classic sense, are distributed CAX exercises, which use at least two simulation systems. Constructive simulation is primarily useful in training commands and staffs where as the virtual and real simulations are for training crews and improving the individual skills of soldiers. In practice, the concept of distributed organisations for CAX exercises results in different jobs being done by different components14: 13 Simulation of the real (Live Simulation) – of real soldiers using actual combat equipment that is connected to the simulated environment. Simulation of the virtual (Virtual Simulation) – a real person operating the device simulation (simulators) modeling individual equipment, vehicles, aircrafts, etc. Simulation of the constructive (Constructive Simulation) is the computer models that represent the processes carried out by the actions of people and equipment. This category includes simulation systems to conduct „war games” that model the military in real time. See: E. Cayirci, Computer Assisted Exercise Process, 5th NATO Joint CAX Forum, Ottobrunn, 30/08/2010. Available on line: iabg.de/verteidigung/.../CAXProcess.pdf. 14 See: P. Boryn, “Distributed exercises CAX as a modern form of training commands and staffs”. [Accessed: 02/07/2012]. Available on the Internet: www.csikgw.aon.edu.pl/. 179 SŁAWOMIR BYŁEŃ − JTLS operation system is based on a central computer (server), located in WG&SC; − JTLS system management is performed centrally by the administrator of the operating system WG&SC; − computer network management, which carries out CAX exercises is done using network administrators, such as the classified Defence network (MIL-WAN); − administering workstations is done by IT security teams, separated from the units participating in the exercises. Due to the criterion (geographic location) of the following options, exercises are of the following types of CAX exercises15: − Variant A – deployment all elements of the exercise in WG&SC; − Variant B – deployment the authority of the exercise in WG&SC and commands post in places of permanent dislocation (PPD) or in the field; − Variant C – deployment all elements of the exercise in places of permanent dislocation. Variants of CAX exercises in the various configurations are shown in Figure 3. Source: own study based on archival materials WG&SC [Accessed: 07/07/2012]. Available on the Internet: http://csikgw.aon.edu.pl/. Fig. 3. Schematic diagram of the variants of command-post computer assisted exercises according to their place of conduct Variant A. Deployment of all elements of the exercise in WG&SC Variant A is a classic way of organising the CAX exercise. It results from WG&SC past experiences which show that this organisational structure and form 15 In the Polish Armed Forces because of the place conducting exercises, there are two types of exercises: a) in the field and b) stationary facilities, including: the place of permanent dislocation, the backup job, and simulation centers. See: Instructions for the preparation of …, op. cit., p. 37. 180 THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES of preparing and conducting the exercise presents the least problems. In this variant both the course in JTLS system operators, and the exercise itself is conducted in WG&SC rooms. The deployment of functional DISTAFF cells of the exercise and the exercising of command facilities and equipment occur in WG&SC. The advantage of this variant is a developed (stationary) logistic infrastructure and Information Technology (IT) stores which ensures that the WG&SC facility is treated as the basic place for organising computer assisted exercises. Over the last six years of active use, the WG&SC was the most often applied variant for organising CAX exercises. The first test of this form of exercise was CAX with 2. Mechanised Corps, covername "Beskidy 06". Variant B. Deployment of the exercise authorities in WG&SC and commands post in PPD The second option of the organisation of the CAX exercise assumes arranging particular elements of the exercise in different locations (garrisons). We are talking then about conducting distributed CAX exercises. This variant is based on the distribution of the DISTAFF part, including leadership, exercise directors and OPFOR in the WG&SC, while exercising command in their command stations or in the field. In the activity of our Centre the first exercise conducted in a distributed form was training connected with different systems of command, organised in 2007 by the General Staff of the Polish Army, covername "Stokrotka 07". Variant C. Deployment of all elements of the exercise in PPD Another example of the organisation is an exercise in the form of a distributed CAX. This variant deploys elements of the exercise outside of the complex distribution of WG&SC. In this case, both the training of JTLS system operators as well as CAX exercise takes place in the permanent deployment units participating in the exercise. Such a solution was used for the first time in the full range of uses in January 2012 in a CAX exercise with 10. Armoured Bde, covername “Bóbr 12”. The methodology for calculating the costs of logistics in CAX exercises A. INPUT Analysis and assessment of the real logistical systems in command-staff computer assisted exercises (CAX), organised in 2012, comparable due to the organisational level, including: a. 11th Armoured Div. Exercise with 10th Armoured Cavalry Bde, covername “BÓBR-12”, conducted in military facilities of Żagań and Świętoszów (distributed system). b. 12th Mechanised Div. Exercise with 7th Costal Defence Bde, covername “WILK-12”, conducted in a facilities of WG&SC (stationary system). The size of the forces and resources involved in preparing and carrying out the exercise are shown in Table 1. 181 SŁAWOMIR BYŁEŃ Table 1 FORCES AND RESOURCES DEDICATED TO SUPPORT CAX EXERCISES Name exercises BÓBR-12 WILK-12 Participant Number of exercises soldiers Period of exercise preparation 11th Arm Cav Div 42 WG&SC 16 Period of exercise duration 11th Arm Cav Div 150 WG&SC 6 Period of exercise preparation 12th Mech Div 42 WG&SC 16 Period of exercise duration 12th Mech Div 240 WG&SC 32 Quantity of transportation Bus Minibus Car 1 - 2 1 - 3 - 1 1 2 - 1 - 1 - 8 - 2 - 3 - Source: own study on the basis of the documentation of exercises covername: “Bóbr-12” and “Wilk-12”. B. THE LEGAL BASIS The basis for the organisation of real logistic support for CAX exercises are: a) in the organisation of feeding: − Regulation of the Minister of National Defence on boarding soldiers16; − The decision of the Minister of National Defence in determining the monetary value of Standards Board17. b) as regards the organisation of accommodation: − General Regulations of the Armed Forces of the Republic of Poland, MoD, Warsaw 2009. − Legal act on accommodation of the Armed Forces of the Republic of Poland18. − The order of the Rector-Commander National Defence Academy No 18 of 22 April 2009 on the principles of drawing up cost paid for teaching and other educational services and a price list for the rental of premises. c) for the organisation of the transport support: − Orders of the Chief of General Staff No. 444/Log/IWsp the Armed Forces of 29 May 2008 on the indicators of the operating costs of the selected equipment tanks-automotive. 16 See: Regulation of the Minister of National Defence, No 327 of 04 March 2011 on board troops active duty military, (Official Journal of the MoD, 2011 No. 63, item. 327). 17 See: Decision of the Minister of National Defence, No. 55/MoD with 23 February 2011 in determining the monetary value of Standards Board (Official Journal of the MoD No. 5, item. 61 of 24 March 2011). 18 Legal act of 22. June 1995 on the accommodation of the Armed Forces, (Official Journal 2005, No. 41 item. 398). 182 THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES − Annex to the orders of the Chief of General Staff No. 444/Log/IWsp the Armed Forces of 29 May 2008 on the unit operation costs indicators for selected equipment service tanks-automotive. − Letter from the Head of the Inspectorate Support for the Armed Forces from 21 March 2011 on upgrade unit indicators operating costs of equipment for 2011. Organisation of the feeding of the participants of a CAX exercise The feeding of participants of a CAX exercise is done by the food standards basic school 020 and additional standards: total 110 and 160 beverages. These standards according to the provisions of the food service industry are for the soldiers both participating in exercises outside the garrison, and participating in training or exercises in garrison19. Current cash values on the Board on the activities of the individual Regional Logistics Bases is shown in Table 2. Table 2 THE CASH VALUE OF THE STANDARDS BOARD Regional Logistics Base Lp. 1. 2. 3. 4. 1 RLB Wałcz 2 RLB Warsaw 3 RLB Kraków 4 RLB Wrocław Essential standards Board [PLN] a soldier's a schol's 010 020 specjal 030 operation al 040 Additional standards Board [PLN] general drinks bread 111 110 160 13.60 14.59 19.65 21.49 6.21 1.40 1.10 14.67 15.69 21.11 22.79 5.88 1.40 1.10 13.95 14.92 19.61 21.56 5.79 1.40 1.10 13.17 14.12 18.63 20.38 5.38 1.40 1.10 Source: own study on the basis of Decision No. 55/MoD of 23 February 2011 in determining the monetary value of Standards Board (Official Journal of the MoD, No. 5, item. 61 of 24 March 2011). It should be noted that, in comparison with the provisions in force until 2011, when the whole Armed Forces applied a standardised rate, currently, these values vary depending on the area of responsibility of the individual Regional Logistics Base. Variant A. Stationary exercise conducted in WG&SC facilities. In accordance with the summary presented in Table 1, participants in the period of preparation of CAX exercises (conferences, courses, reconnaissances, workshops), and at the time of exercise is entitled to basic standards board by school board 020 and by additional food standards: 40% of the total 110 and drinks 16020. Moreover, 19 20 Ibidem, § 8. 1. See: Decision of the National Defence Minister No. 55/MoD, op. cit. 183 SŁAWOMIR BYŁEŃ in relation to the feeding of participants on exercise using the National Defence University (NDU) canteen, according to the commissioned system, one should increase costs of the food by costs posed by raw materials (mark-up of 150%). The daily rate of overall costs of maintaining soldiers in the National Defence University per capita is shown in Table 3. Table 3 DAILY RATE OF COSTS OF MAINTAINING SOLDIERS IN THE NDU + 150% of bedspread/s prime costs [PLN] 39.22 5.88 1.10 46.20 Monetary value [PLN] Norm foods Fundamental school 020 Additional general 40% 110 Additional of drinks 160 Total 15.69 2.35 1.10 − Remarks 15.69 x 2.5 2.35 x 2.5 Source: own study on the basis of Decision No. 55/MoD, op. cit. Variant B. Distributed exercise conducting in WG&SC and PPD Feeding participants of a mixed exercise involves both the provision of food in NDU canteens and the feeding of participants of the exercise in the parent unit canteens. The cash value of food standards is shown in Table 4. Table 4 DAILY RATE OF FEEDING COSTS OF A MIXED SYSTEM Standard board The basic school 020 An additional 40% of the total 110 An additional beverages 160 Total Monetary value [PLN] 3rd RLB 4th RLB Kraków Wrocław 1st RLB Wałcz 2nd RLB Warsaw NDU Warsaw 14.59 15.69 14.92 14.12 39.225 2.484 2.352 2.316 2.152 5.88 1.10 1.10 1.10 1.10 1.10 18.17 19.14 18.34 17.37 46.20 Source: own study on the basis of Decision No. 55/MoD, op. cit. Note: Adopted to calculate the monetary value of RLB Wałcz, as appropriate for the 12th Armored Div and NDU. Variant C. Distributed exercise conducting in PPD Depending on the area of responsibility of various alimentation members RLB exercises carried out using the school principal food standards 020 and by additional food standards: 40% of the total standard drinks 110 and 16021. The cash value of Board presents in table 4. Note: for the calculation of the monetary values, RLB Wroclaw figures were adopted, as appropriate for 11st Armoured Cavalry Division. 21 184 Ibidem, (Official Journal of the MoD No. 5, item. 61 of 24 March 2011). THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES Organisation of accommodation for participants of CAX exercises Variant A. Stationary exercise carried out at the premises of the WG&SC This option implies free accommodation in the unit in Zegrze, Białobrzegi and Wesoła. Accommodation in civilian hotels is approximately 150 zł per person / day. Accommodation in NDU hotels is from 50 to 100 zł per person / day (using the calculation of 50 zł). Variant B. Distributed exercise conducted in WG&SC and PPD This option implies accommodation of participants in mixed exercises. For participants in WG&SC, accommodation in units in Zegrze, Białobrzegi and Wesoła is free. For other participants in G&SC civil hotel accommodation about 150 zł per person / day. For exercises participants at PPD units, accommodation is free. Variant C. Distributed exercise conducting in PPD Accommodation of participants is free in facilities based on home barracks. Organisation of transport CAX exercise participants According to the Annex to the orders of the Chief of General Staff No. 444/Log/IWsp the Armed Forces of 29 May 2008 on the unit operation costs indicators of selected equipment service tanks-automotive22 for the transport of each unit corresponds to its own. The number of people and means of transport involved in the exercise is contained in Table 1. Adapted to calculate the distance between two locations and the number of journeys: a) The distance between Świętoszów – Rembertów – Świętoszów = about 1100 km. b) The distance between Szczecin – Rembertów – Szczecin = about 1200 km. c) The distance between Rembertów – Zegrze – Rembertów (x 2 trips – 120 km) = 3 x bus x 120 km x 8 days = about 2900 km. d) Odległość Rembertów – Zegrze – Rembertów (x 2 trips – 120 km) = 8 x bus x 120 km x 8 days = about 8900 km. Indicator unit operating costs of equipment adapted to the values indicated in Table 523. Examples: − 1 x bus averaged: 7.25 zł + 8% TAX = 7.83 zł; − 1 x minibus averaged: 3.35 zł + 8% TAX = 3.62 zł; − 1 x personal car averaged: 2.12 zł + 8% TAX = 2.29 zł. 22 Letter from the Head of the Inspectorate Support the Armed Forces from 21 March 2011 on upgrade unit indicators operating costs of equipment for 2011. 23 As an indicator of operating costs counted 8% TAX. 185 SŁAWOMIR BYŁEŃ Table 5 UNIT OPERATING COSTS OF SELECTED INDICATORS OF THE TRANSPORTATION ASSETS Source: The Annex to the order of Chief of General Staff No 444/Log/IWsp SZ of 29 May 2008, op. cit. The results of the cost of logistics in the computer assisted exercises Table 6 Our study. 186 THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES Table 7 Our study. Table 8 Our study. 187 SŁAWOMIR BYŁEŃ Conclusions from the results of the logistics costs of computer assisted exercises Our study. Fig. 4. The costs of feeding in computer assisted exercises Our study. Fig. 5. The costs of accommodation in the computer assisted exercises 188 THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES Our study. Fig. 6. The costs of transport in the computer assisted exercises Our study. Fig. 7. The total costs of logistics in the computer assisted exercises 1. The study shows that the highest total logistics costs arise in the computer assisted exercises conducted using a stationary system in WG&SC (variant A). 2. The lowest total cost of logistics are in exercises carried out in the places of the permanent dislocation headquarters (variant C). 189 SŁAWOMIR BYŁEŃ 3. The difference in the amount of logistics costs is approximately 180 thousand, which is 3.5 times less. Assuming that during the year there are two or three classes at this level, it's a serious saving. 4. From the point of view of WG&SC, the situation is the opposite. The highest costs occur in the exercises conducted a distributed system, due to the costs of accommodation and transport of representatives of WG&SC, aiming to secure the operational needs and ICT CAX in PPD practicing commands, both in the preparation (training of simulation system operators) and running exercises (part of the composition of the management exercises). 5. A shortcoming of option C is the need of human potential distraction WG&SC. This is sufficient to protect the exercise of DIV in one location for the local inputs, while in the case of exercises at the operational or strategic level such a solution cannot be considered. Advantages and disadvantages of options to organise computer assisted exercises 1. Variant A. The main disadvantages of this option includes the high cost of logistics, especially in view of the costs of accommodation, feeding and transport. 2. Variant B. In organisational terms the most optimal solution, in terms of logistics costs less favourable than option C. 3. Variant C. The advantage of this option are reduced logistics costs in all areas of domain (accommodation, feeding and transport), as exercising leadership, using their own logistic infrastructure does not generate additional costs of logistics. The disadvantages include the need for the potential distribution of WG&SC exercises necessary to protect distributed in different locations. Conclusion The increasing role of CAX exercises in the training of commands and staffs in the Armed Forces resulted in the creation of WG&SC. The trend towards the use of simulation systems in computer assisted exercise illustrates the obvious economic benefits of conducting this type of exercise. It is expected that in the future they will provide an important link in the process of training commands and staffs. On the other hand, conducting distributed CAX seems to be the perfect solution at a time when financial considerations have forced terminology to abandon the traditional practice of CAX. In addition to cost savings related to the fact that both the exercising staffs and teams, most notably playing the opponent and subordinates, carry out their tasks in places of permanent dislocation, including the operator training simulation system, the preparation of the script in a database can 190 THE OPTIMIZATION OF LOGISTICS COSTS IN COMPUTER ASSISTED COMMAND POST EXERCISES be done through the use of Internet technology and technology education can be carried out at distance (e-learning). The adoption of such solutions implies lower training costs, which in the global settlement should bring tangible economic benefits. At the same time you have to have in mind that the actions taken to optimise the cost of training cannot reduce its effectiveness. In any case, it must be ensured that the objectives of training are achieved. The analysis of CAX exercises conducted in 2006-2012 shows that the cost of logistics, without a doubt, the key items are personnel costs which, in order of size include: the cost of accommodation and food for participants of the exercises, followed by operating costs of equipment dedicated to transport participants during the exercise. Based on experience with CAX exercises conducted in the WG&SC we are able to conclude that logistical tasks carried out in the framework of a real security exercise (Real Support Exercise) are the most financially consuming aspects of the cost of the exercise. The action taken in terms of rationalisation of training may not reduce its efficiency. In any case, they must ensure the achievement of the objectives of the training. Commonly, however, it is also known that not every reduction of costs is rational and reasonable. When implemented processes are irrational, there are training losses, which in the terminology of the economic costs are lost benefits24. Therefore, it is important to distinguish between rational expenditure incurring unreasonable costs and incurring losses. Bibliography Decision No. 55/MoD of the Minister of National Defence of 23 February 2011 in determining the monetary value of Standards Board (Official Journal of the MoD, No. 55, item. 61). Documentation of Command Post CAX exercise 11th Armored Cavalry Division with 10th Armored Cavalry Brigade covername “BÓBR-12”. Documentation of Command Post CAX exercise 12th Mechanized Division with 7th Coastal Defence Brigade covername “WILK-12”. Instructions for preparing and conducting exercises with headquarters and staffs in the Polish Armed Forces. DD/7.1.1 (A). MoD, Warsaw 2010. Płaczek J., Economics of defence, NDU, Warsaw 1994. Orders of the Chief of General Staff No. 444/Log/IWsp the Armed Forces of 29 May 2008 on the indicators of the operating costs of the selected equipment tanks-automotive. Regulation No. 327/MoD of the Minister of National Defence, dated 04/03/2011 on board troops active duty military, (Official Journal of the MoD, 2011, No. 63, item. 327). Annex to the orders of the Chief of General Staff No. 444/Log/IWsp the Armed Forces of 29 May 2008 on the unit operation costs indicators selected equipment service tanks24 K. Grzybowska, Podstawy logistyki, Difin, Warsaw 2009, p. 351. 191 SŁAWOMIR BYŁEŃ automotive. Letter from the Head of the Inspectorate Support the Armed Forces from 21 March 2011 on upgrade unit indicators operating costs of equipment for 2011. Regulation No. 54/MoD of the Minister of National Defence, dated 21/08/2001 in the matter of the creation of the War Games and Simulation Centre at National Defence University. Regulation No. 51/MoD of the Minister of National Defence, dated 26/08/2002 in the matter of change on the creation of the War Games and Simulation Centre at National Defence University. The order of the Rector-Commander National Defence Academy No 18 of 22 April 2009 on the principles of drawing up cost paid for teaching and other educational services and price list for the rental of premises. 192 CORPORATE SOCIAL RESPONSIBILITY FROM THE PERSPECTIVE… NDU Scientific Quarterly no 4(89) 2012 CORPORATE SOCIAL RESPONSIBILITY FROM THE PERSPECTIVE OF THE FIRST DECADE OF 21ST CENTURY IN POLAND Aleksandra KARCZMAREK, PhD student National Defence University Abstract It has been over twenty years since the events which set in motion radical social and systemic changes in Poland took place. As a result, the conditions of business operation have changed completely. The changes influenced also ideas, methods and ways of management. Many new problems and challenges have appeared. One of them is corporate social responsibility. The author describes the changes in the perception of corporate social responsibility by Polish society based on research conducted by specialised research facilities. She also presents the trends of improving corporate social responsibility resulting from implementation of the ISO 26000 standard. Key words – business organizations, management, Corporate Social Responsibility, ISO 26000 standard After World War II Poland was taken into the sphere of influence of the former Soviet Union (as a result of the settlement made by the great world powers). This fact has affected many aspects of Polish society, including the generallyunderstood economy. During that period the "socialist" centrally managed economy had a dominant role in Poland. The political authorities decided what is to be manufactured, for whom and how. Even the prices of particular items were set at the top level. The goal of this economy was a fair and just distribution of goods, as opposed to profits made by capital owners in capitalist countries. There were two significant characteristics of the centrally managed economy: the domination of the state-owned means of production and the allocation of economic resources with a disregard for the market. The state-owned means of production included mostly capital facilities, to a lesser degree land and least of all the labor. Key decisions concerning allocation of economic resources were made by the central party and state bureaucracy, which included central planners. The economy was regulated not by the market, but by the central plan. This economic system affected also the management processes which focused mostly on completion of plans. During that period companies operated in a specific way, as they had to fulfill a number of social functions as decreed by political authorities. Therefore the issue of what we call today corporate social responsibility did not even emerged. 193 ALEKSANDRA KACZMAREK The social and political transformation which took place in Poland after 1989 brought about a change of the economic system: to that of a market economy. Companies began to operate in a new way as their roles and functions changed. Also the methods of corporate management evolved, based on the principles, methods and cases tested in other countries. However, a host of new issues appeared, related not only to the companies and their management, but also to the society for whom the companies are working. One of those issues which went unnoticed before was corporate social responsibility (pertaining to an organisation or a company). Therefore the goal of my paper is to show the changes which have occurred in the first decade of the twenty first century in respect to that area. In order to present the problems of corporate social responsibility more clearly it is necessary to define some notions which are essential to this analysis. What is social responsibility of an organisation? The simplest answer is that it is a number of obligations for organisation in order to protect and empower the society it operates in. In other words it is a concept in which the company at the strategy building stage voluntarily considers social interests and environmental protection, as well as proper relations with various groups of stakeholders. The relevant literature contains many definitions of that concept. One of them points out that it is management's duty to select such decisions and actions which contribute both to the organisation's own interest (increasing its profits) and to the protection and enhancement of well wellbeing of the society.1 This definition highlights two aspects of social responsibility. As far as protection is concerned, the focus is on refraining from actions which are socially harmful, even if they are profitable to the company. On the other hand, companies should take actions which will be directed toward prevention and elimination of various negative social phenomena. As far as welfare is concerned, the focus is on the creative role of business in attaining social wellbeing. Corporate social responsibility is one of the most dynamic, complex and challenging issues which face business leaders today. Nowadays private companies feel the increasing pressure to play a more active role in creating conditions for a better life. CSR means the involvement of business in ethical conduct and the promotion of economic development while demonstrating respect for people, local communities, nations and the environment. CSR integrates the concept of global citizenship with concern for the environment and sustained development. The practice of Polish companies shows that corporate social responsibility may appear as one of four attitudes: resistance, social obligation, social reaction and social contribution. If a company does not get involved in solving social problems or even, in some cases, refuses to accept that responsibility or decides to cover it up, this means the company's attitude is that of resistance. In the strategy of social obligation the 1 Rybak M., Społeczna odpowiedzialność biznesu – idea i rzeczywistość (Corporate social responsibility – concept and reality), Warsaw 2001, page 28. 194 CORPORATE SOCIAL RESPONSIBILITY FROM THE PERSPECTIVE… company tries to legitimise its operation by the application of economic and legal criteria. In such cases the company assumes it is responsible only to its shareholders, which practically means that it accepts only obligations designated by law. Social reaction implies that a company accepts its legal and ethical duties and, in some cases, gets involved in charity work. The strategy of social contribution is the top level of social responsibility. The fundamental principle of this strategy is to be a good citizen who proactively seeks opportunities to provide individual contribution to the welfare of the whole society.2 Social responsibility should affect any decision, whether it pertains to employees, products, quality or operations. It is a way of thinking and acting and not a separate program or campaign. As far as management theory and practice are concerned, social responsibility of an organisation is based on five domains: The domain of economic responsibility, which pertains to executive supervision, consistency of actions related to economic development of the organisation and of the society, tax contributions, cooperation with local suppliers and local work force etc. The domain of social responsibility, which pertains to work safety, health, amenities, fair remuneration, avoidance of child labor and discrimination, cooperation with community organisations, professional organisations and local authorities; in other words, it relates to human rights, labor rights and development of local communities. The domain of environmental responsibility, which pertains to preventing or minimising harmful influences on the environment, the reduction of the consumption of natural resources, support of initiatives which promote responsibility toward the environment, and the development and implementation of systems, processes, technologies and innovations which are friendly to the environment. The domain of knowledge responsibility, which pertains to learning, knowledge creation, management and sharing of knowledge, creating community access to knowledge (e.g. scholarships for outstanding students), helping to promote the education of local communities. The domain of ethics responsibility, which pertains to abiding by laws and ethical standards in all aspects of the organisation's operation, promoting ethical standards, preventing corruption and other social abuses. The concept of corporate social responsibility is very broad and complex, therefore it is difficult to establish a standard or a system which would cover all aspects of CSR. But there are some emerging tools to compare actions related to CSR: 2 Rybak M., Społeczna odpowiedzialność biznesu – idea i rzeczywistość (Corporate social responsibility – concept and reality), Warsaw 2001, page 37. 195 ALEKSANDRA KACZMAREK – The Keidanren Charter for Good Corporate Behaviour – ten principles established by the Japanese Federation of Economic Organisations, defining business activities; – Principles for Business – seven principles drafted by the international network of business leaders – Caux Round Table. The purpose of establishing those principles is to define a world standard of social responsibility which could be used to measure the performance of organisations; – Principles for Global Corporate Responsibility – a universal tool for comparative assessment prepared by the Interfaith Centre on Corporate Responsibility, which helps to ensure the responsibility of companies in line with the best standards specified by international conventions on human rights and labor; – Social Accountability 8000 – a standard developed to enable organisations to develop voluntary standards of social responsibility and their authorisation; – Sustainability Reporting Guidelines – a platform for the creation of reports on related aspects of sustainable development from the economic, environmental and social perspective; – Sustainability Through the Market – seven chief principles developed by the World Business Council for Sustainable Development that allow companies to implement practices of sustainable development and to benefit from them.3 Today the sphere of social responsibility of organisations is governed by ISO 26000, adopted on 1 November 2010. It contains the answers to key questions: – How do you define social responsibility and what are its basic principles? – What are the key areas of social responsibility? – What issues and actions are important to each area? – How to implement the principles of social responsibility in accordance with ISO 26 000? – What are the benefits of implementing the principles of social responsibility? The provisions contained in ISO 26000 show that social responsibility of an organisation means that the impact of its decisions and actions on society and the environment: (through transparent and ethical behaviour): – contributes to sustainable development, including health and welfare of the society, – takes into account the expectations of stakeholders (individuals or groups who are interested in decisions or actions of the organisation), – is compliant with applicable laws and consistent with international standards of conduct, – is implemented throughout the organisation and enforced in its activities within its sphere of influence. 3 Gustafson J., Czym jest społeczna odpowiedzialność biznesu? (What is social responsibility of business?) [in:] Biznes vol. 1. Zarządzanie firmą, Warsaw 2007, p.192. 196 CORPORATE SOCIAL RESPONSIBILITY FROM THE PERSPECTIVE… Analysis of the standard indicates that it contains guidelines for social responsibility, which may be applied voluntarily by all organisations; at the same time, it does not contain requirements and is not meant to be used for certification. A key problem related to the issues discussed is the answer to the question: how does society understand and interpret corporate social responsibility. Research conducted in Poland indicates that as the economic situation improved and market economy principles took hold, attitude toward corporate social responsibility began visibly to change. In the beginning of the 21st century Poles assessed companies primarily on the basis of the quality of their products and ways in which they treated their employees and subcontractors. Quality of service was also an important factor in the evaluation. Involvement into communal and charity activities and the issues of environmental protection were perceived as much less important. It might be said that companies were seen from the perspective of a customer who wants to buy a good product and be well served and from the perspective of an employee who needs proper treatment and a fair wage. Research conducted at that time indicated that in the opinion of the respondents the role of large companies in society is to generate profit, pay taxes and provide workplaces; in other words, to observe the law. Hence it can be concluded that the issue of corporate social responsibility was almost nonexistent in the respondents' perception and needs. It was identified mostly with the issue of the proper treatment of workers, obeying workplace health and safety rules and timely payment of wages.4 Today those attitudes are clearly changing. Increasingly corporate social responsibility is assessed by the Polish public in terms of new values. These include the attitude toward the natural environment, support for charity organisations and local communities, as well as ethical conduct. However, the promotion of principles and goals of corporate social responsibility in society is still a challenge. It may be seen that the media is more interested in showing the negative impact of companies' actions than their commitment toward initiatives benefiting society and the environment. Summary. In recent years there has been a drive to develop a common model of promotion of corporate social responsibility. Various groups of stakeholders were invited to the discussion, so that the policy will be developed from a wide perspective. The list of possible actions is long. The authorities face an important task of encouraging companies to include the policy of corporate social responsibility in their practice, especially the small and medium enterprises, which have taken modest attempts to commit to social actions on a larger scale. The following years will show how deeply the idea of social responsibility has become 4 The presented findings are based on research conducted by IPSOS Polska in 2003, as published in „Postawy wobec społecznej odpowiedzialności biznesu” (Attitudes towards corporate social responsibility), www.ipsos.pl/3_2_009a.pdf. 197 ALEKSANDRA KACZMAREK rooted in the awareness of Polish entrepreneurs and what will be actually accomplished due to the strategic thinking of benefits for all stakeholders.5 It shall also be seen how the issue will be understood and assessed by the society as a whole. 5 Rudnicka A, Wpływ strategii społecznej odpowiedzialności na rozwój regionu (Influence of the corporate social responsibility strategy on the regional development), [in] Społeczna odpowiedzialność biznesu a struktury lokalne, Poznań 2009. 198 THE PLATFORM OF HETEROGENIC SIMULATION ENVIRONMENT NDU Scientific Quarterly no 4(89) 2012 VOCATIONAL TRAINING AND PREPARATION THE PLATFORM OF HETEROGENIC SIMULATION ENVIRONMENT Prof. Józef JANCZAK, Ph.D. Maj. Grzegorz PILARSKI, M.A. National Defence University National Defence University Abstract A simulator platform of a heterogenic simulation environment is a solution which enables the conduction of a decision making process on the contemporary battlefield as part of the achievement of a network centric capability. Decisions made in this process, owing to the application of modern simulation solutions are burdened with a relatively low level of risk for the operations’ success, which is directly expressed by the reduction of losses in people and equipment. The armed forces are now involved in a wide scope of activities (military and peaceful) which results in a serious demand for the support of the activities with the use of simulation platforms. Thanks to the application of the heterogenic simulator, the army planning process can use different, complicated and expensive simulation systems, installed in a safe place, without the necessity of their installation in the region of operations where they could be destroyed as a result of operations. Key words – NCW, simulator, DMP, ACS. Introduction The simulation of the operations performed by the elements of the Armed Forces in a heterogenic environment is becoming a prerequisite in the preparation process of the command and staff units as well as a complementary element of ‘forecast’ situation awareness. Simulation, as an element of the command process, conditions the effectiveness of the undertaken operations. The aim hidden behind the creation of the simulator of heterogenic simulation environment is to assure the functioning of the simulator platform resulting in a simulation based on a model which describes various combat operations of different types of armed forces with the use of the simulation platforms which already exist, as well as the systems supporting decision making processes. 199 JÓZEF JANCZAK, GRZEGORZ PILARSKI The application of the simulator While creating the simulator platforms it is advised to take into consideration the following environmental factors: • the character of staff trainings using computer simulators, • the necessity to take into consideration the simulation scattering, • assuring the variability of picture definition presenting the combat units of different levels, • taking into consideration the character of the information exchange route in the structure entailing different levels of command – the structure of information domains, • the depiction of terrain conditions with certain details. The simulator of heterogenic simulation environment should provide the following possibilities: • to support the trainings of command posts from the level of battalion and above in accordance with the training requirements of particular armed forces, • to implement procedures of trainings’ conduct being in force in NATO, • to support the planning process on particular levels of command (identification of decision making situation, generating the decision options alongside with their assessment as well as the choice of the best decision), • to conduct trainings in the scope of crisis and peace time operations, • to ‘feed’ the simulator with information from the data bases of the existing decision making support systems of different armed forces, • to hold trainings in the regions of training units dislocation, • to be used in combat operations during the missions performed abroad, • to be used in the operation planning process as well as in the process of command in international operations, • to assess the results of the trainings or certain operations. Basic functions of the simulator The armed forces are presently involved in a wide scope of operations (military and peaceful). Such a broad competence scope requires certain preparation of the personnel. The simulation platform can be the element supporting the preparation and conduct of operations in a given scope. The simulator should be used, depending on the needs, in the following areas: • conducting trainings, most of all, with the use of dispersed simulation, • supporting units in the process of decision making especially those which use the automated command system of particular types of armed forces, • supporting the combat units (elements) during external (out of country) operations, 200 THE PLATFORM OF HETEROGENIC SIMULATION ENVIRONMENT • preparing missions, including: – determination of task structure adequate for the planned combined operations in the international environment, – simulation of the possible operations’ scenarios, – preparation of standard operation procedures depending on the possible existing operation plans, • running crisis and peace time operations. During a mission (crisis and peaceful) the simulation platform, through using the dispersed simulation, can perform the supporting function in the decision making process in situations which were not anticipated in the mission preparation process (lack of adequate standard operation procedures). A vital characteristic of the simulation platform to be applied can be the creation of ‘a virtual scenario’ of the operation course. The scenario would present the description of situations possible to take place alongside the indication of their logical and coherent outcome based on environmental conditions and the decision to run the operation. The virtual scenario determines cause-effect relations between the occurrences (the ensuing decisions of the parties and their outcomes), the counteraction between objects (the trainees – simulated units) and the surrounding (the opponent, the area of operations, meteorological conditions, the time of the year or of the day, etc.); moreover, it allows for the depiction of the given situation from different points of view. The above leads to a conclusion that the operation scenario generated by the simulation platform should include information of a dual type: • determination of possible situations presented step by step, • indication of possible options for each occurrence, at each step which can prevent, diversify or enable the situations to take place. Architecture of the simulator While setting the architecture of the simulation platform it is advised to, first of all, follow the function of the simulator of a heterogenic simulation environment, namely the integration of different simulation platforms with the use of dispersed simulation. Such attitude to the system architecture will result in the following traits: • flexibility of solution, • trainings’ cost-effectiveness, • the training elements will be dispersed, • adaptive qualities of the analyst group depending on a certain option of activity to be taken, • making the operations realistic during trainings, • integration of tools: simulation platform and decision support systems, • streamlining the automation of activities connected with the situation’s options in the process of command – application of simulation platform, 201 JÓZEF JANCZAK, GRZEGORZ PILARSKI • the flow of information based on the ICT infrastructure which is allocated or generally accessible with the guarantee of a proper level of transmission security, • safe simulation layer of the critical simulation infrastructure. The main assumption of simulation functioning in a heterogenic environment is the usage of a proper information transfer platform – ICT networks. In case of national applications it is possible to use the allocated ICT networks which already function in the armed forces. While, in a case when it is impossible to use such networks e.g. abroad, the global Internet network can be used as a transport layer. Such a solution is possible under the condition that certain security mechanisms are implemented, which allows for the transmission of secret information in accordance with the required security level. The examples below present the options of system configuration depending on the purpose and the way of data transmission to the simulator. 1. System architecture based on the simulation centre with the use of a dispersed simulation of the elements taking part in a training – implementation of data or its acquisition from the decision support systems. This option can be realised in a country and abroad. The whole group responsible for the simulator operation is gathered in one place in the so called Simulation Centre, while the participants of a training are present in the regions of the training or the permanent dislocation spots (Figure 1). Fig. 1. Architecture of simulation system – area of operation: abroad – data implementation 202 THE PLATFORM OF HETEROGENIC SIMULATION ENVIRONMENT The elements taking part in a training can use different simulation platforms, which can exchange data through the integrator, which is the key element of the simulator. The implementation of data to the simulation platforms is realised by the operators of certain simulation systems, which are the integral part of the structure of the elements taking part in a training. The operators, equipped with proper web access and interfacing with the system, can implement data about the situation of the elements of a training. The simulation product is received in the simulation centre from where it is transferred by the training management or directly to the training elements. The dispersed elements make the operations more realistic without the need of financial outlays in case of trainings conducted in one location. Moreover, the simulator's critical infrastructure is placed in one certain location (the safe one) operated by a group of specialists. The key assumption of the system architecture presented in Figure 2 is the fact that the data for the simulation platform is gained directly from the databases of decision support systems without the necessity to involve operators. Fig. 2. Architecture of simulation system – area of operations: abroad – data implementation Usage of the dispersed simulation allows for supporting the elements realising tasks outside the country by implementing data to the simulation system by operators or transmitting the data automatically from the decision support systems. When the tasks are realised abroad it is possible to assure the safety of the simulation platform, since the whole critical infrastructure and the group of operators is located in a safe place far away from the region of combat operations. 203 JÓZEF JANCZAK, GRZEGORZ PILARSKI 2. System of architecture with the use of dispersed simulation of the elements taking part in a training – data implementation. In this solution the structure of the simulation centre is dispersed into regions of training elements. The simulator infrastructure (Integrator) is located in a separate place and is maintained by the necessary team of experts. While, the data for the simulator platform can be delivered as in the previous examples through operators or is taken directly from the decision support systems. Fig. 3. System architecture with the use of dispersed simulation – administrative division into the region of operations and the region of the simulation platform infrastructure deployment – data implementation In the above solutions used abroad particular command posts use certain simulation platforms connected with one another through the platform of a heterogenic simulator, being located in a safe place far away from the region of operations. 204 THE PLATFORM OF HETEROGENIC SIMULATION ENVIRONMENT Fig. 4. System architecture with the use of dispersed simulation – administrative division into the region of operations and the region of the simulation platform infrastructure deployment – data taken from the automated command system Summary The platform of a heterogenic simulation environment is a modern solution facilitating the decision making process during combat operations both in a national and international dimension. Activities aiming at the achievement of a network centric capability by NATO member states exert the need to create tools and systems supporting the decision making process. Decisions made in the process should be burdened with the lowest level of risk for the operations’ success, which directly leads to the limitation of losses in people and equipment. The platform of a heterogenic simulator allows the army to use different complicated and expensive simulation systems, installed in a safe place, without the need to install them in the operations region where they are exposed to the danger of being destroyed. Bibliography Coleman J., Network Centric Warfare w: Directions Magazine, (2004). Kręcikij J., Wołejszo J., Podstawy dowodzenia, AON, Warszawa (2007). Wołejszo J., Metodyka przygotowania i prowadzenia ćwiczeń z dowództwami, AON, Warszawa (2005). Posobiec J., Krakowski K., Wymagania operacyjne dla symulatorów heterogenicznego środowiska symulacyjnego, AON Warszawa (2009). 205 JUSTYNA LIPIŃSKA NDU Scientific Quarterly no 4(89) 2012 PUBLIC INFORMATION OF THE POLISH ARMED FORCES Justyna LIPIŃSKA, Ph.D. National Defence University Abstract Polish MoD information policy is to build up the public understanding of military affairs, national defense and support all the activities of the Armed Forces and prevention and mitigation of information discrediting achievements. The implementation of information policy adopted is based on the provisions of the laws, regulations and decisions of the Minister of Defence. The article presents the assumptions described in these documents. Key words – Polish MoD information policy, press service, press officer Introduction It is an obligation for each charitable organisation to provide the public with information, except such information which content violates the protection of rights and freedoms of other persons or entities. In addition, information cannot be provided in an open way if it significantly disturbs public order, security or important economic interests of the state. The right to public information may be also limited due to other regulations relating to the principles of the protection of classified information. In the other cases, the organisation is required to publish any information related to its mission. Action taken by the Ministry of Defence is intended to build up the public understanding of military affairs, national defence and support all the activities of the Armed Forces, as well as promote acceptance of their mission, operating principles, objectives and capabilities. On the other hand, it aims at the prevention and mitigation of information discrediting the achievements and position of the North Atlantic Alliance and the Polish Armed Forces. Also the commanders and department heads of the Polish Ministry of Defence are obliged to stick to the official NATO policy in this matter which regulates media access to knowledge about the tasks carried out by the Armed Forces, including those which are conducted during combined operations. 206 PUBLIC INFORMATION OF THE POLISH ARMED FORCES Normative acts obliging the armed force institution for information policy The implementation of the constitutional right of citizens to information is one of the most important principles in the overall information policy of the National Defence Department. It means that each person has the right to demand information concerning the ministry of defence's issues, both positive and negative, and it is the defence department obligation to make it available, directly or through the media. Awareness of these duties makes the defence ministry realise the need to have an active information policy. The mass media play a decisive role in shaping social attitudes and public opinion in regard to the military and defence issues. Information policy in the Polish Armed Forces is governed by the following normative acts: 1. The Constitution of the Republic of Poland; The Republic of Poland shall offer its citizens the right to obtain information on the activities of public authorities and persons exercising public functions1. Article 14 of the constitution provides freedom of the press and other mass media2, and art. 54 stipulates that everyone shall have the freedom to express opinions, to acquire and disseminate information3. 2. The Act of 6 September 2001 on access to public information According to the Act of 6 September 2001 on access to public information (Journal of Laws No. 112 Pos. 1198), every citizen of the Republic of Poland has the right to get any information about the activities, competencies, legal status, and rules of the decisions taken by public authorities. These bodies are required to make available non-confidential information about their business to be published in the Public Information Bulletin and without any delay (within 14 days) to provide such information at the request of the individual. 3. The Act of 26 January 1984 "Press Law" Moreover, the Act of 26 January 1984 "Press Law" (Dz.U.84. No. 5 pos. 24) Article. 2 and 4 states that the state authorities, in accordance with the Constitution of the Republic of Poland, must provide the press with conditions suitable for the carrying out of its functions and responsibilities, including enabling commercial newspapers and magazines editors, diversified in terms of the program, with a full presentation of the subjects and attitudes4. 1 Act 61 Polish Constitution of 2 April 1997 (Journal of Laws No. 78, item. 483 with amendments). 2 Act 14 Polish Constitution of 2 April 1997 (Journal of Laws No. 78, item. 483 with amendments). 3 Act 54 Polish Constitution of 2 April 1997 (Journal of Laws No. 78, item. 483 with amendments). 4 Article 2 and 4 Press Law of 26 January 1984 (Dz.U.84. No. 5 pos. 24) 207 JUSTYNA LIPIŃSKA 4. Act with NATO alliance (MC457) In the NATO document (MC457) regulating the issue of communication with the public on military matters, the parent category is Public Information. In the Polish reality it was called "Press and Public Information Activities." It consists of activities involving the use of various forms and methods of public relations with regards to communication on military and defence issues. 5. Acts of States in the EU By becoming a member of NATO and the EU, we have adopted not only the obligations associated with the modernisation of command, communication and military technology, but also standards for public information distribution appropriate for the institutions of a democratic state. The NATO standardisation documents also define the rules for informing the public body and define how to work with the media in combined allied operations (NATO AJP 01 / B). The Polish national equivalent of this document is “Joint Operations” (Szt.Gen.Wewn.3/20/2001) which provides the information about how to give fair, accurate and fast information to the public through the media. It was defined as one of the most important tasks during the joint operation run by the operational command. 6. Act of 5 January 2010 on the protection of classified information. When the safety of the mission and the soldiers involved in the operation is threatened, there is a natural refusal to create the conditions for the implementation of journalistic activity. Access to the classified information may be limited. This process is regulated according to applicable legislation in line with the Republic of Poland Constitution, paragraph 61. 3. That issue was detailed in the Act concerning the protection of classified information dated on 5 January, 2010 (Journal of Laws No. 182, item 2010. 1228). These documents are compatible with: 7. National Security Strategy of the Polish Republic. and 8. Development program of the Polish Armed Forces in the years 20082018. In addition, civilian staff and employees of the military press are obliged to abide by international law, ratified by the Republic of Poland, such as: – The 1948 UN Human Rights Declaration; – The 1950 Convention for the Protection of Human Rights and Fundamental Freedoms; – The 1966 International Convention on Civil and Political Rights; – The 1982 Declaration on freedom of expression and information, also known as the European Charter for Media. The basic document regulating the information policy of the Ministry of Polish National Defence and the Armed Forces are: 208 PUBLIC INFORMATION OF THE POLISH ARMED FORCES 1. Information management strategy of the Ministry of National Defense and the Armed Forces of the Polish Republic for 2009-2018; 2. The Polish Armed Forces development program for 2009-2018; 3. The concept of promotion of the Polish Armed Forces for 2012-2015. Objectives of Informational policy The strategic goal of the information policy department of the Polish National Defence is to get the support and understanding of the public for the purpose, tasks and activities undertaken by this department. According to the NATO normative documents, the responsibility for the implementation of the public information policy lies with commanders and heads of organisational units and their subordinate officers, including press officers, who play the role of the experts and advisors. The main pillar in the construction of an efficient system is to inform national and international public opinion. The officer mentioned above must be aware of theirs mission in this field. Information policy objectives should be implemented by all military personnel and military employees in their daily business activities. It must also be accepted that the main principle is that every soldier involved in the potential operations or serving in the military unit may be a part of the notification process. In this case the soldier who is recommend as a statement provider to the media should receive prior methodological support from professional press tutors. The Polish Armed Forces information policy directs its activities to the: – internal environment: professional military staff, students of the military academies, soldiers, military employees, military personnel, MoD civil servants and soldiers with the allocation of mobilisation. The internal environment in this matter consists of the management of the of MoD, commanders at all levels of command and control, as well as military experts; – proximal external environment: military families, former professional soldiers, veterans, combatants, candidates for professional military service and members of non-governmental organisations which have signed an agreement with the Minister of National Defence; – further external environment: the members of the general public of the local community, school and academic potential recruits and foreign customers; – influential environment: national and international media, the government, Parliament (both lower and upper houses), local authorities, universities and schools, political parties, groups, social initiatives, NGOs, churches and religious and moral authorities. The Ministry of Defence, in the light of the information management strategy of the MoD and the Polish Armed Forces in the period 2009-2018 carries out the tasks of information propagation by use of: 209 JUSTYNA LIPIŃSKA – Information Centre of Defence (MoD CI), which manages, implements and coordinates the information in the National Defence Department; – The MoD Department of Education and the Promotion, which manages, carries out and coordinates the image of the defence resort. Information policy assumptions assume that the information policy of the Ministry of National Defence is an integral part of the government's information policy and only Ministry of National Defence rules the implementation of national defence information policy of the national defence specifies. For analysis of such an organisation, which is a military service, the public information may relate to the functioning military unit, its equipment, the impact on the environment and methods of dealing with crisis situations such as natural disasters. The military in order to communicate with the environment has a specific communication strategy that is defined by a decision of the Minister of National Defence dated. 04.07.2009 on the principles of information policy in the Ministry of Defence. The information policy department of national defence, the whole of the activities and decisions of the Ministry how to inform the public about matters of the Polish Armed Forces and defence and the formation of a positive image of the Armed Forces using available communication means, including through the mass media (the media)5. Press service tasks The main objective of an information policy department of National Defence is to meet the information needs of the public and gain public understanding and acceptance. The Director of the Public Information Department of the MoD is responsible for information policy in Polish Armed Forces. He performs tasks in the area of the information policy department by providing accurate and objective information to the public, soldiers and employees of the department at all levels of command and management of the Armed Forces. Its tasks include planning and running close cooperation with the media. Particular emphasis is placed here on the dissemination of information via e-mail or of placing it in the Public Information Office (PIO) website. One of the Director’s responsibilities is to serve as the Administrator of the National Defence Ministry PIO while supervising ministry websites with the ability to intervene in their substantive content. In addition, his office coordinates the work relating to the conduct of information campaigns and is responsible for organising training in communication for soldiers, experts and staff of the department. He is also responsible for the collection and sharing of information which is issued in various formants like promotional brochures and 5 The decision of the Minister of National Defence dated. 7 April 2009 on the principles of information policy in the Ministry of National Defence (OJ. MON No.7, pos. 82). 210 PUBLIC INFORMATION OF THE POLISH ARMED FORCES videos relating to the operations of the Armed Forces carried out by Poland. The diagram below shows the structure of the Department of the Press - Information of the Ministry of National Defence. Figure 1. Organizational Chart of the Department of the Press - Information of the Ministry of the National Defence The Ministry of Defence is the only institution standing at the top of various types of forces and entities associated with military service. Each organisation subordinated to the Ministry of Defence, or any military unit, has its own spokesman who is responsible for contacts with the media. Specific regulations on information policy in the Ministry and its subordinate units is regulated by the document entitled “The decision of the Minister of National Defence dated. 31 May 2011 on the press service of the Ministry of National Defence”. The main duty of the Press Service of the Armed Forces includes primarily implementation of the ministry's information policy in peacetime, crisis and war. The purpose of the Press Service of the Armed Forces is to organise contacts with the media and to inform the public about matters of national defence and actions taken by the MoD. Currently, the main purpose of the information is to broaden public knowledge in terms of: 211 JUSTYNA LIPIŃSKA 1. Operations abroad. Armed Forces engagement in operations outside the country is associated with a high interest from the public and the media. This is primarily due to the high risk and possibility of a loss of personnel. Therefore, it is necessary to undertake integrated measures of Public Relations to boost public understanding of both the mission and the purpose for which these activities are carried out. 2. Professionalization of the Polish Armed Forces. This process requires the preparation of relevant information and promotion campaigns to encourage people to join the army. These activities support the recruitment process and must be addressed to different audiences. The activities related to the professionalization of the army consists of all activities intended to promote elitism and the prestige of the military profession. 3. Technical modernisation of the Armed Forces. This is an area having significant potential for image development. It provides information on the process of obtaining new weapons and military equipment and can have a very positive impact on the perception of the military service in society. Therefore, it requires a long-term strategy for the preparation of information and promotion activities, including projects both on the national and local level. 4. Organisational and structural reforms. Carrying out these particular changes and with their deep adherence to public opinion and preferences ensures that the National Defence Ministry and all military institutions are seen as fit managers of public money. 5. The construction of a professional press service in the Defence Ministry. 6. The introduction of modern, efficient information systems, with the particular emphasis on electronic media. Having in mind the fact that the Internet is becoming more and more common for people searching for information, the PIO panel or MoD websites are also becoming more popular. It is therefore necessary to develop appropriate solutions to the resort and military units for the use of military telecommunication networks. 7. Providing military contingents press service equipment and technical capabilities necessary to provide the public with information about the tasks of the soldiers involved on operations. 8 The creation of the coherent and flexible emergency response system in the Ministry of National Defence. An emergency situation requires the making of properly planned and coordinated activities of the Armed Forces. This applies not only in response to emergency situations but also to the proper management of information and communication with the media and local communities affected by the problem. It is both an opportunity to demonstrate professionalism and responsibility, and, at the same time, the possibility of serious damage to the military's reputation through chaotic and uncoordinated project running. Therefore the creation of the 212 PUBLIC INFORMATION OF THE POLISH ARMED FORCES appropriate system is extremely important to build up a positive image of the military organisation. It is worth noting that the goals of information policy should be implemented by all military personnel and military employees in their daily business activities. It should be noted that each soldier of the Polish Army may be in some way a participant in the process of providing information. In the event that there is a need to provide statements to the media, each individual should have received substantive and methodological support from the press professionals beforehand. Military communication tools for contacting the external environment do not differ so much from the tools used in other charitable institutions and commercial enterprises. In addition to being a subject of military law and having access to public information the service has the constitutional obligation to publish them by PIO, the ways and means which the military service uses in communication with the environment are the same as in most ordinary companies. Therefore, The Promotion of the Polish Army Concept for 2012-2015 prepared by the Ministry of Defence lists four main instruments of policy information: – public information – the informing of the public, including the issuance of the Public Information Bulletin in the electronic form; – media relations – actions aimed at the media, building relationships with the media, allowing for effective interaction through them to the public; – Public Affairs – actions aimed at building mutually beneficial relationships with institutions of public life; – e-public relations – activities in the field of communication, implemented via the Internet (web portal, email, multimedia presentations) and intranet. The most important tool of e-public relations is the web portal of the Ministry of National Defence: www.mon.gov.pl, consisting of two parts – firstly, the CI administered by the Defence Information section and secondly, the part administered by the Education and Promotion Department of Defence www.wojsko-polskie.pl. The role of press officer in the armed forces According to the statement of the Council of Ministers, dated on 8 January 2002, on the organisation and tasks of the spokespersons in the offices of government (issued under that Act, OJ 2002 no. 4 poz. 36) press officers perform tasks related to government information policy in conjunction with the heads of organisational units of the office. The person who is responsible for coordinating the work of the Press Service of the OU is the press officer. This particular person must have a predisposition to work in the field of interpersonal communication and the ability to communicate freely and directly both orally and in a written way. It is also important to have 213 JUSTYNA LIPIŃSKA specialist knowledge of public relations, journalism and social sciences. Press and media officers are mostly professional soldiers, graduates of upper officers schools or have civilian higher education and postgraduate studies. They report directly to the commander of their military unit. Cpt. Szczepan Głuszczak who is a Press Section Chief of 11Lubuska Armoured Division in the article "Press-Military Officer of PR-sheep" so characterised his work: The most difficult step is to get the attention of all people who may be interested in this business. This is the biggest challenge for anyone who begins his journey as spokesperson. [...] We need to be very creative in our actions6. He points out that at this stage, his work does not differ too much from the work of fellow PR person from a private company. Just as he has to look for current topics of interest to a wider audience, prepare and shoot footage for what happened in his unit. Workplace is the same as in a company or a large corporation7. However, not everything is the same. The most sensitive part of the job is to keep calm in a crisis, and while staying outside the country such as on an operation. Such situations require a very high concentration and the ability to work with leaders and provide reliable and consistent information. The main tasks of the press and the press officer overlap in most of the tasks of the Press Service of the Armed Forces in the organisations described above. A detailed list of tasks given the decision in the structures of the Press Service of the Armed Forces. Analyzing the work of the Press Officer of the unit, it should be noted that the scope of its responsibilities is not only to inform journalists and the wider community about current affairs. It is also conducting ongoing and periodic analysis of the media for commanders and the formation of conclusions and proposals for the perception of the military in the media. As the spokesman of each organisation, the military press officer must keep track of what the media say about this organisation. In the case of meetings with representatives of the media, press officer takes care of the preparation of these conferences, looking after the leaders of meetings and the overall setting of the event. As a military unit is a specific organisation to which no unauthorised person has access the officer must ensure that the organisation of journalists getting into the units has the proper clearance and that he provides them assistance. If a journalist has any questions the press officer is obliged to respond to them, of course, in so far as they are authorised to do so. The Press Officer in a specific unit is also responsible for preparing material for training, and military exercises, and creating a database of photographic or film material of the unit. Spokespersons and press officers and officers in general are obliged to prepare monthly plans of undertakings, along with reports on working with the media and 6 7 214 http://www.proto.pl/PR/Pdf/Oficer_prasowy_wojskowy_PR-owiec.pdf. Ibidem. PUBLIC INFORMATION OF THE POLISH ARMED FORCES public interest areas. These plans contain information about projects for the coming month and the issues which the media are interested in. Reports are a source of information about the effects of actions taken by the press service regarding the quantity and nature of media coverage. They are described by the controversy way about the published reports, the number of conducted press conferences and other meetings with citizens having information and promotional nature. Conclusion Polish MoD and Armed Forces information policy will create a need to prepare more and more new concepts and promotional campaigns to support the recruitment process, addressed to different groups (also in terms of territorial), which provide candidates for service. A key area of action is to pass on information about military transformation which image has a significant positive potential. Therefore, the construction of the professional press service of the MoD requires building up a coherent information system, especially at the level of military units and commands, based on staff full-time release. In addition to external information focusing on the media, it should be focused on improving internal information system on matters influencing the conditions of service and discipline of the military service. This allows to fulfil the existing gap between the ability to respond to the central government institutions and capabilities and equipment of staff performing the tasks in this area at the level of military units and garrisons or commands. Currently, outside of the Information Centre of Ministry of Defence and some of the organisational units of the Polish Armed Forces (General Staff, Headquarters RSZ), there is no full time press service position. The introduction of modern, efficient information systems, with particular emphasis on electronic media creates a growing necessity to provide Internet accessibility for citizens and additionally the need to improve the situation of internal information accessibility. It is therefore necessary to develop appropriate solutions for the use of military telecommunication networks. In addition, the construction of the optimal functioning of the military press should lead to rationalise the cost of publishing in the military and "open up" the military press to the external market. Another important direction of improvement for military defence information policy is to provide military contingents with press service equipment and technical capabilities which are necessary to provide the public with information about the tasks of the soldiers involved in operations. It is all about increasing the opportunities to develop and record press releases, using television and broadcasting systems, by providing these services in the frame of a "combat camera", prepared for the implementation of film and photographic materials outside the country, while allied and coalition operations are going on. All of this requires a long-term strategy for the preparation of information and promotion activities, including projects on a national and local scale. 215 JUSTYNA LIPIŃSKA Bibliography The decision of the Minister of National Defence dated. 7 April 2009 on the principles of information policy in the Ministry of National Defence (OJ. MON No.7, pos. 82). http://www.proto.pl/PR/Pdf/Oficer_prasowy_wojskowy_PR-owiec.pdf. Polish Constitution of 2 April 1997 (Journal of Laws No. 78, item. 483 with amendments). Information and promotion strategy MON, www.wp.mil.pl / files / File / strategia_informowania_i_promocji.doc. Press Law of 26 January 1984 (Dz.U.84. No. 5 pos. 24). 216 A „CULTURAL TURN” IN THE STUDY AND CONDUCT OF WARFARE… NDU Scientific Quarterly no 4(89) 2012 A „CULTURAL TURN” IN THE STUDY AND CONDUCT OF WARFARE – A NEW ANALYTICAL PERSPECTIVE Elżbieta OLZACKA, M.A. Jagiellonian Uniwersity in Krakow Abstract The purpose of this article is to acquaint the reader with “cultural turn” which in recent years has been becoming visible not only on the level of thought about war and its analysis, but also on the level of practical change in the tactics and methods of implementation of the military action. The failure of coalition forces in asymmetric conflicts in Iraq and Afghanistan led after 2006 to a change in strategy to the one granting a greater role to the cultural knowledge and skills. At the same time, on the level of theoretical reflection, the analysis through the lens of technological development of the means of war conduct, as well as the popularity of the RMA category (revolution in military affairs) gradually gives way to a culturally oriented studies. It is caused mainly due to the fact that the 21st century wars depend increasingly on immaterial factors - knowledge, information, culture and values; rather than exclusively on the fire power. The article describes the most important concepts of Western analysts (R.M. Cassidy, J.W. Jandora, D. Adamsky), but also the Russian anthropology of war (W. Bażukow, W. Grebienkow), as well as the practical implications of the cultural approach to war (e.g. Human Terrain System). Key words – anthropology of war, cultural turn, military culture, Human Terrain System, counterinsurgency Introduction In recent decades, the view on war held by military historians and analysts has been dominated by analysis from the perspective of the technological development of the means of war. Until 2006, the Western strategy and tactics were mainly based on the use of more and more technologically advanced and precise weapons with the greatest firepower. Hence the popularity of RMA (revolution in military affairs) in the military discourse1. The Western (primarily American) specialists 1 Most known works include: T. Benbow, The Magic Bullet? Understanding the Revolution in Military Affairs, Brassey’s . London 2004; M. Knox, W. Murray (ed.), The dynamics of military revolution 1300-2050, Cambridge University Press, 2001; A.F. Krepinevich, Cavalry to computer; the pattern of military revolutions, “The National Interest” 37, Fall 1994, pp. 30-34; W.S. Lind, Un- 217 ELŻBIETA OLZACKA expected technological supremacy to ensure a definite dominance over the less developed armies of enemies. The asymmetric wars in Iraq and Afghanistan contradicted these expectations. Neither technological superiority nor greater firepower ensured success in these wars conducted under new rules. During the invasion of Iraq in 2003, the Americans, assuming that the opponent agrees with their concept of war, expected that the war would end with the defeat of the ground forces of the enemy. They were not prepared for a so-called "low-intensity" conflict that is difficult to win by means of technological superiority only. Therefore, in recent years, among researchers dealing with military issues, we can observe a significant increase in interest in the cultural side of conflicts and in the development of strategies and tactics that would take into account the cultural differences between the warring parties. Studies on the different war cultures, seeking to understand and explain non-Western ways of warfare and the different views on war and the role of violence in social life are very important these days. Their conclusions should therefore be presented to the Polish reader. In this paper we examine the most important concepts of Western analysts, but also the concepts of anthropology of war developed to the east of Poland, as well as the practical implications of the "cultural" approach to war. War as a cultural phenomenon War can be seen as a cultural phenomenon, immersed in the culture of a society that understands and conducts it in its own special way. War is shaped by the cultural system, e.g. through the prevailing views on it, concepts on the use of violence, values, ideals, "ethical horizon" and the concept of power dominant in socalled "official culture". The methods of warfare are determined not only by practical considerations, technology and efficiency, but often also by cultural considerations. History provides numerous examples of this2. We can repeat after Philippe Contamine that “war is a cultural phenomenon. The concepts of war prevailing in a given era or society influence, in a more or less visible way, its outbreak, course and conduct"3. The perception of war as not only a military, political and social, but also cultural phenomenon finds more and more supporters. An influential British historian, John Keegan is one of the pioneers of this approach. In his A History of Warfare he proves that war is a cultural phenomenon, and it is this culture that has the greatest impact on its course, and the methods of conducting it. He writes: derstanding Fourth Generation War, “Military Review”, September-October 2004, No. 5, 12-16; B. D. Watts, The Maturing Revolution in Military Affairs, CSBA, Washington 2011. As far as Polish literature is concerned, a book by Łukasz Kamiński, Technologia i wojna przyszłości. Wokół nuklearnej i informacyjnej rewolucji w sprawach wojskowych, WUJ, Kraków 2009 is worth a mention. 2 I write about this in more detail in my article Kulturowy wymiar zjawiska wojny – zakres badań i doniosłość, „Kultura i Historia” nr 22/2001. 3 P. Contamine, Wojna w średniowieczu, Marabut, Warszawa 1999, p. 269. 218 A „CULTURAL TURN” IN THE STUDY AND CONDUCT OF WARFARE… “War is more than just an extension of policy. War is an expression of the culture of a given society; (...) it is often a determinant of culture, and sometimes of the society itself”4. The impact of culture on warfare has long been recognised and analysed by anthropologists, a prime example of which is Ruth Benedict. In the second chapter of her famous The chrysanthemum and the Sword she connects the methods of warfare, as well as the ways of thinking about the phenomenon of war in a given society with a specific cultural pattern5. In the past few years, the "cultural perspective" in the analysis of the methods of warfare has also penetrated military circles. The relationship between war and culture is more often noticed and examined in the course of strategic and military studies6. As Patrick Porter notes, we deal with a "cultural turn" in studying war; and strategists increasingly refer to the knowledge of anthropologists and sociologists. The failure of American strategy based primarily on technological supremacy meant that a growing number of military analysts began to see a need to understand "the relationship between how people fight and their traditions, identity, religion, collective memory, preconceptions and sheer force of habit"7. This resulted in new theoretical concepts, emphasizing the anthropological approach to the problem of war and the need to understand the cultural differences between the various methods of warfare8. The relationship between war and culture has also been perceived as more important in the practical dimension. Cultural competence is a central value in the new American counterinsurgency field manual9. As Patrick Porter calculated, it mentions “culture” 88 times and “cultural” 90 times in 282 pages. The need to equip military personnel with language skills and in-depth cultural and social knowledge of the region is today noticed both by politicians, as evidenced by the speech of the Secretary of Defence Donald Rumsfeld in 200410, as well as by the military personnel themselves, as evidenced by the article of the retired U.S. 4 J. Keegan, Historia wojen, Książka i Wiedza, Warszawa 1998, p. 25. R. Benedict, Chryzantema i miecz. Wzory kultury japońskiej, PIW, Warszawa 2003. 6 J. W. Jandora, War and Culture: A Neglected Relation, “Armed Forces & Society”, Vol. 25, No. 4, Summer 1999, pp. 541-556. 7 P. Porter, Good Anthropology, Bad History: The Cultural Turn in Studying War, “Parameters”, Vol. 32 (2/2007), p. 47. 8 The researchers who see a need for a new theoretical approach include: T. Corn, Clausewitz in Wonderland, “Policy Review” September 2006, http://www.hoover.org/publications/policyreview/4268401.html; M. McFate, Anthropology and Counterinsurgency: The Strange Story of Their Curious Relationship, “Military Review”, 85 MarchApril 2005, pp. 24-38.; G. Packer, Knowing the Enemy: Can Social Scientists Redefine the ‘War on Terror?’, “New Yorker”, 18 December 2006, pp. 60-69. 9 The term counterinsurgency used in Western literature is translated in this paper as „wojna partyzancka”. It should however be noted that it is associated with such concepts as "small wars", "low intensity conflict", "fourth generation warfare" or the "war on terror" and relates generally to an asymmetric conflict, irregular warfare, with no clearly defined front line, scope or even the sides of the conflict. See H. Münkler, Wojny naszych czasów, Wydawnictwo WAM, Kraków 2004; M. van Creveld, The Changing Face of War: Combat from the Marne to Iraq, Ballantine, New York 2008. 10 P. Porter, op.cit., p. 48. 5 219 ELŻBIETA OLZACKA Army General Robert H. Scales, who argues that the Iraq crisis "requires an exceptional ability to understand people, their culture and motivation", and proposes a new model of culture-centric warfare11. Let us now examine the most distinctive theoretical concepts that approach the issue of war from a cultural perspective. A "Cultural turn" in the analysis of war - a theoretical approach To analyse the relationship between war and culture, researchers are looking for relevant terms that can facilitate this task. Western science on strategy has, since 1977, used the term "strategic culture"12, which is based on the quite natural assumption that "there is a connection between the wider culture of a nation / society and its strategy, in other words, culture affects the behaviour and strategic decisions”13. Alistair I. Johnston in Thinking about Strategic Culture proposed a definition of this concept consisting of two parts. “The first part, broader, covers basic assumptions related to the structure of strategic environment, the role of war in the life of society, including on the international stage (necessity or aberration?), the nature of threats and their sources, the adequacy of military force in face of these threats and conditions under which it can be used. These issues are discussed and resolved in a broader institutional framework, represented by the state. The second, narrower part of the concept of strategic culture relates to the operational level, i.e. explains how the military force can be used in an actual armed conflict”14. According to Roman Kuźniar, strategic culture not only provides ideas and norms for strategists and politicians, giving strategists specific goals and objectives, but is a kind of "lens" through which the overview and assessment of the international situation is performed15. This is important as such issues as collective beliefs regarding the image of the state, its mission and place in the international order, the role and vision of foreign policy are important for understanding the causes and nature of wars waged by the state and vary depending on the historical, geopolitical, political, social, and, last but not least, cultural context. In recent years, however, the term "military culture", has been gaining much more popularity, as evidenced by such works as: A Military Culture. A Paradigm Shift? by Karen O. Dunivin16, Military culture and transformation by Michael B. 11 R.H. Scales Jr., Culture-CentricWarfare, “Proceedings” 130, October 2004, pp. 32-36. It was introduced by an American theorist of international relations Jack Snyder in his work about Soviet nuclear strategy. See: J. Snyder, The Soviet Stategic Culture: Implications for Nuclear Options, RAND, Santa Monica 1977. 13 R. Kuźniar, Polityka i siła. Studia strategiczne – zarys problematyki, Wydawnictwo Scholar, Warszawa 2005, p. 186. 14 Quoted in: R. Kuźniar, op.cit., p. 187. 15 R. Kuźniar, op.cit., p. 189. 16 K. O. Dunivin, A Military Culture. A Paradigm Shift?, Air War College, Maxwell Paper № 10, Maxwell Air Force Base, Alabama 1997. 12 220 A „CULTURAL TURN” IN THE STUDY AND CONDUCT OF WARFARE… Siegl17, The Military Culture and The Strategic Art by Eugen Bădălan18 or a more detailed Russia in Afghanistan and Chechnya: Military Strategic Culture and the Paradoxes of Asymmetric Conflict by Robert M. Cassidy19. Despite the absence of a clear definition, these researchers refer the term "military culture" to a military institution. Michael B. Siegl writes about relations, values, goals and beliefs characteristic of an army, rooted in traditions, customs and practices, and influencing the models of leadership. The army, like other organizations, has a culture that determines the patterns of responding to various challenges20. Similarly, Eugen Bădălan understands "military culture" as a military system of values, without which "a soldier would simply be a robot”21. Soldiers, regardless of the position they occupy inside the hierarchy, are firmly rooted “in the national, European, Euro-Atlantic and universal system of values”22. These values affect their views, opinions and behaviour. Robert M. Cassidy, in turn, emphasises the strategic aspect of the military culture and defines it as a set of beliefs, relationships, and values that affect the decision on how and when to use military force to achieve strategic objectives. Culture, understood in this way, is conditioned by, and develops as a result of, historical experience, geography and political culture. Relationships between the "military culture" and the strategic culture are also noticed by other researchers. Fritz W. Ermarth in his Russia’s Strategic Culture: Past, Present and... In Transition23? argues that the strategic culture (in Russia) can not be considered as a simple result of the "military culture", i.e. of "deep convictions about how military power should be developed and used". The influence of political, economic and foreign policy culture is as equally important as the influence of military culture. Furthermore, influences between these areas are bi-directional and not always easy to grasp. In addition to the function of theoretical generalisations, most Western works that deal with military culture are very practical. The patterns of changes within the American military culture are of interest, and especially the shift in the nature of conflicts from conventional war to low-intensity conflict. According to James Carafano, the modern armed forces of the United States are inadequately prepared for the new type of operations, so-called "peacekeeping" or stabilisation missions, which represent a growing percentage of all military missions in the twenty-first century. In his article Post-Conflict and Culture: Changing America's Military for 21st Century Missions he notes that in order to better prepare the armed forces for 17 M. B. Siegl, Military culture and transformation, w: “Joint Force Quarterly”, No. 49, April, 2008, pp. 103-106. 18 E. Bădălan, The Military Culture and The Strategic Art, “Strategic Impact” No. 3/2005, pp. 5-9. 19 R.M. Cassidy, Russia In Afghanistan and Chechnya: Military Strategic Culture and the Paradoxes of Asymmetric Conflict, U.S. Army War College, 2003. 20 M. B. Siegl, op.cit., p. 103. 21 E. Bădălan, op.cit., p. 6. 22 Above. 23 F. W. Ermarth, Russia’s Strategic Culture: Past, Present, and… in transition?, SAIC Reports 2006, http://www.fas.org/irp/agency/dod/dtra/russia.pdf. 221 ELŻBIETA OLZACKA such tasks (post-conflict operations) a change within the military culture is necessary. Knowledge, skills and values that foster understanding of other peoples and cultures, as well as enable cooperation in a multinational environment should play a bigger role within this culture24. Similar arguments are also put forward by other researchers who deal with "new wars" - Robert M. Cassidy in Counterinsurgency and the Global War On Terror: Military Culture and Irregular War25 and Hugh Gusterson in his article The Cultural Turn in the War on Terror26. Karen O. Dunivin is also interested in changes in the American military culture. In her articles Military Culture: Change and Continuity27 and A Military Culture. A Paradigm Shift? she examines the evolution of the traditional paradigm on which the American military culture is based (FMA Paradigm: Masculine Warrior Combat and Paradigm). The old and, according to the author, outgoing paradigm is characterised by "exclusion" of women and men who do not fit into traditional gender roles, closure, homogeneity and relations based on hierarchy and mutual hostility. The military culture is dominated by the "cult of masculinity" (dominance of male values, norms and lifestyles) and the need to fight and win wars as the primary objective of the armed forces. According to the author, the requirements of the new, rapidly changing world force changes within this model of military culture. The new paradigm is characterised by heterogeneity, egalitarianism, and relationships based on tolerance. The military no longer rely on outdated gender categories and open to new social categories: women and homosexuals. This makes it better suited to the new roles required by the logic of new conflicts. Sheila Miyoshi Jager from the American Strategic Studies Institute has carried out a comprehensive and extremely interesting analysis. In her work On the Uses of Cultural Knowledge she examined the role of cultural knowledge in the course of new wars, distinguishing several levels on which this knowledge had been used. Starting from the tactical level, i.e. the knowledge of cultural customs, traditions, learned behaviours and norms (e.g., "do not spit in public places", "do not stare at women"), through the operational level, to the development of strategies and policies. The author argues that it is precisely at these highest levels that cultural knowledge is not sufficiently used, which reflects negatively in the conduct of military operations in low-intensity conflicts28. Dima Adamsky in his The Culture of Military Innovation chose a very interesting topic29, by examining the issue of the impact of cultural factors on the rate and 24 J. J. Carafano, Post-Conflict and Culture: Changing America’s Military for 21st Century Missions; Heritage Lectures, no. 810, 2003, http://www.heritage.org. 25 R. M. Cassidy, Counterinsurgency and the Global War on Terror: Military Culture and Irregular War, Stanford Security Studies, Stanford 2008. 26 H. Gusterson, The Cultural Turn in the War on Terror, in: John Kelly (ed.), Anthropology and Global Counterinsurgency, Universitety of Chicago Press, pp. 279-298. 27 K. O. Dunivin, Military Culture: Change and Continuity, “Armed Forces and Society” 20, no. 4, Summer 1994, pp. 531-547. 28 S. M. Jager, On the Uses of Cultural Knowledge, Strategic Studies Institute, Washington 2007. 29 D. Adamsky, The Culture of Military Innovation, Stanford Security Studies, Stanford 2010. 222 A „CULTURAL TURN” IN THE STUDY AND CONDUCT OF WARFARE… quality of changes during revolutions in the military. With the examples of Russia, United States and Israel he demonstrated that different strategic and military cultures adapt and use new technologies in different ways, which translates into different ways of conducting war. Anthropology of War - Russian researchers' theoretical proposal Equally interesting theoretical proposals concerning the cultural aspects of war are formulated to the east of Poland. The concept of “anthropology of war”, developed by Vladimir I. Bazhukov, is certainly worth noticing30. The new subdiscipline, by being "a comprehensive study of man in the military sphere"31, is supposed to combine elements of such sciences as cultural studies, sociology, psychology, history, ethnology and, of course, anthropology. The subject of anthropology of war has been defined as "human beings, culture and society in the conditions of war and military conflict, as well as in the process of preparing for them and overcoming their consequences"32. The most important prerequisite for the formation of this new discipline was the adoption of an anthropological approach to the study of war culture. What does this approach propose? The researcher lists five main directions of interest for the anthropology of war. The first one, natural and historical, examines the impact of environmental conditions on war, the armed forces and all military activities, as well as the manifestations of human nature in war culture (the impact of human instincts on behaviour in war conditions; study of the aggressive instinct). The purpose of the sociological direction is to study the culture and social structure of different social groups, military organisation and culture in times of peace and war. The third direction, psychological, deals with issues of war-time socialisation and the enculturation of the young generation, military and patriotic consciousness of society, the society's attitude to the armed forces, military aspects of the national character and mentality, the examination of human thinking in combat circumstances, determination of war-time values, customs and traditions, and examination of war-time mythology and rituals. The symbolic direction primarily consists of an analysis of semiotic and symbolic aspects of war culture, such as military flags, uniforms, ranks, medals and awards; with weapons and technology having specific signs and symbols. Military posters, paintings of battle scenes, military marches 30 Vladimir Bazhukov has developed his concept in the following works: Методологические проблемы военной антропологии, „Вопросы культурологии” № 5/2007, pp. 24-27; Военная антропология: объект, предмет, направления, методология, „Вестник Военного университета”, № 3/2008, pp. 37-45; Эвристические возможности антропологического подхода к исследованию военной культуры, Автореферат диссертации на соискание ученой степени доктора культурологии, Москва 2009. 31 В.И. Бажуков, Эвристические возможности… op.cit., p. 3. 32 Above. 223 ELŻBIETA OLZACKA and songs, military rituals and rites are of a semiotic and symbolic nature. The last direction, historical, examines man during wars of various historical eras, starting from the pre-class and ending with the modern, post-industrial society. The central concept allowing for an analysis of cultural foundations of warfare is the concept of "war culture" (военная культура). Bazhukov understands it as a "complex, multi-level phenomenon that includes axiological, normative, spiritual, ideological, symbolic and material elements”33. War culture can be viewed in a broad or a narrow sense - both these approaches are complementary. In the broad sense the war culture covers everything created by man during military operations, and thus includes political, economic and social, but also spiritual spheres. It therefore includes war-time: ideology, politics, economics, technology, science, art, doctrines, policies, traditions, and armed forces and weapons, as well as artistic culture dedicated to the issues of war. In a narrow sense, the war culture is a complex of constant, historically formed, states of consciousness and models of human behaviour in the military sphere. The war culture, understood in this way, can be expressed in military customs and traditions, military ceremonies and rituals, as well as various signs and symbols. Although Vladimir Bazhukov's concept stands out with its detailed research and vigour, the researcher is neither the first nor the only one to be interested in this phenomenon. Russian researchers have been trying to define precisely this concept and turn it into a set of concepts for the social and historical sciences. The interest and research effort of Russian specialists dealing with this issue can be divided into two directions. The first one focuses on the theoretical analysis of the war culture viewed as a whole system, which is a subsystem of the overall culture of the society. Researchers are interested in such issues as: mutual relations between war culture and the natural environment, and on the other hand - human personality; manifestations of war culture in times of war and peace, the typology of war culture, analysis of the structure and functions of war culture, the study of specific aspects of war culture: normative, axiological, symbolic, semiotic, linguistic etc.34. Finally, they study the war culture of particular countries and societies (especially the domestic one) and their mutual interactions35. In the analysis of war culture the researchers also take into account the processes of its formation and how they are affected by material, socio-economic, and political conditions. The second direction is of a practical nature. Specific issues that may interest an an33 Above, p. 3,4. See: В.Д. Грачев, В. Н. Гребеньков, Особенности языка военной культуры, „Волгоград: Известия ВГПУ”, №2 (15), 2006, pp. 24-29; В. Н. Гребеньков, Феноменологический подход квоенной культуре общества и ее нравственные основания, „Вестник ВГУ” № 3, 2008, pp. 268273; В. Н. Гребеньков, Рациональность в контексте формирования диалога военной культуры и религии, “Вестник Башкирского университета” Т. 14. №2, 2009, pp. 564-568. 35 С.Н. Ермоченко, Патриотизм как базовая ценность российской воинской культуры, “Вестник Toмского ГУ”, № 314, pp. 65-67; А. Е. Мусин, Milites Christi Древней Руси. Воинская культура русского Средневековья в контексте религиозного менталитета, СПб.: Петербургское востоковедение, 2005. 34 224 A „CULTURAL TURN” IN THE STUDY AND CONDUCT OF WARFARE… thropologist of war include: the military socialisation of youth and how it is affected by various social institutions such as family, school, university or media; how ideas about war, army and military service of various social groups, including military and political elite are shaped, how the organisational culture of the armed forces is shaped; peculiarities of thinking and behaviour of soldiers in military conflicts of the beginning of the twenty-first century36. As evidenced above, the works of Western researchers, dealing with the issue of "military culture", are primarily focused on the institution of the armed forces and are usually of a practical nature. They analyse modern military cultures, and provide guidance on how to change them and adapt them to new kinds of conflicts. These concepts deal with the important issue of the role of knowledge of the culture of the enemy, and in general - "cultural competence" - in wars conducted in a foreign cultural environment, particularly in Iraq and Afghanistan. Russian researchers, in turn, emphasize that the most effective approach to studying cultural aspects of military activity is an anthropological approach, which treats war culture as part of the overall culture of the society. War culture understood in this way is related to not only the institution of the armed forces, but in general - to a human being - and determines his/her image of war and the military, which in turn affects his/her behaviour under conditions of war and in times of peace. Russian works contain a rich theoretical aspect, which can be a great starting point for historical and comparative studies. Practical application - A "cultural turn" in strategy and tactics Including culture in military thought has far-reaching consequences in the practice of warfare. In 2006, Tony Corn, the author of a prestigious and very popular blog devoted to the problems of "small wars", and conflicts of a new type - Small Wars Journal, called for the "anthropologisation" of the strategy and tactics of the U.S. military, as only anthropology can explain the logic of new tribal conflicts, and may enable the adaptation of American military culture to the task of fighting a new enemy37. Discussions on the subject were held not only in the journalistic and academic discourses but also in military circles, as evidenced by the article of the commander of coalition forces in Iraq, General David Petraeus (from 2010 a commander of U.S. forces in Afghanistan), who drew attention to the need for an analysis of the cultural norms of the conquered societies, and for understanding the 36 В.И. Бажуков, Военная культура и национальная безопасность, „Вестник Военного университета”, № 2/2007, pp. 94-99; E.Н. Романова, Военная культура и ее основные характ ристики, “ВестникСамГУ” № 1 (60), 2008, pp. 213-218; В. Н. Гребеньков, Региональные спекты военной культуры и некоторые характеристики образа военной службы в сознании молодых россиян, „Вестник Башкирского университета” Т. 14. №3, 2009, pp. 933-937. 37 T. Corn, op.cit. 225 ELŻBIETA OLZACKA network of informal relationships between tribal institutions38. Under his guidance, a new Iraq strategy was developed, taking into account the postulates of "cultural awareness" of commanders and soldiers. One of the courses of action is to equip soldiers and commanders with the appropriate cultural competence. John W. Jandora, an analyst working for the U.S. Army, notes the importance of "cultural awareness" of the area in which military operations are conducted. Knowledge of the language, but also culture - legal and moral norms, customs and traditions - seems to be a necessary skill for any soldier working in a foreign cultural environment39. Manuals and training are supposed to serve the same purpose40. However, since equipping all soldiers with such specialised knowledge seems to be impossible, the Human Terrain System project has been developed, engaging social scientists - anthropologists, sociologists, political scientists, linguists and cultural theorists - in warfare. And thus Human Terrain Teams were born, i.e. small units which included academic experts with knowledge of the local communities and who were able to engage with them. The project, in operation since 2007, gives such results that the Ministry of Defence has decided to assign anthropologists to each brigade operating in Iraq and Afghanistan. Despite the negative opinion of the American Anthropological Association, which in 2007 condemned the idea of enlisting anthropologists, there are still scientists eager to do such work41. Montgomery McFate, an anthropologist who helped in the creation of the Human Terrain System has the following to say on the situation in Iraq and Afghanistan: "We can not build democracy, education and the banking system without the knowledge of the society in which we want to work"42. 38 D.H. Petraeus, Learning Counterinsurgency: Observations From Soldiering in Iraq, “Military Review”, January-February 2006. 39 J. W. Jandora, Military Cultural Awareness: From Anthropology to Application, “Landpower Essay” No. 06-3 November 2006. 40 Such training in the U.S. armed forces is to be carried out, among others, in the Foreign Military Studies Office (FMSO). Another project envisages carrying out specialised courses (Regional Studies), whose main purpose is to inform future soldiers of the significance of cultural awareness and understanding of how other regions, nations and societies see themselves. See. S.M. Jager, op.cit., p. 6, 10. 41 More can be learned about the project from the article of Vanessa M. Gezari, who is writing a book on the functioning of Human Terrain Teams in Afghanistan: idem, Rough Terrain: The Human Terrain Program Embeds Anthropologists With the U.S. Military in Afghanistan, „The Washington Post”, August 30, 2009. Other interesting publications on this topic, reflecting how much the idea of hiring anthropologists in the U.S. Army has proved to be controversial and widely discussed in the American press, include: D. Rohde, Army Enlists Anthropology in War Zones, “The New York Times”, October 5, 2007, http://www.nytimes.com/2007/10/05/world/asia/05afghan.html; Ch. Shay, Should Anthropologists Go to War?, “Time U.S.”, December 13, 2009, http://www.time.com/time/nation/article/0,8599,1947095,00.html#ixzz23EZOqYSU; D. Price, Human Terrain Systems, Anthropologists and the War in Afghanistan, “CounterPunch” 2009, http://www.counterpunch.org/2009/12/01/human-terrain-systems-anthropologists-and-the-war-inafghanistan/. 42 V. M. Gezari, op.cit. 226 A „CULTURAL TURN” IN THE STUDY AND CONDUCT OF WARFARE… The new U.S. Army manual, FM 3-24, on counterinsurgency is an important document aimed at facilitating the use of cultural knowledge in military operations. It reads: “Cultural knowledge is essential to waging a successful counterinsurgency. American ideas of what is «normal» or «rational» are not universal. To the contrary, members of other societies often have different notions of rationality, appropriate behavior, level of religious devotion, and norms concerning gender. Thus, what may appear abnormal or strange to an external observer may appear as self-evidently normal to a group member. For this reason, counterinsurgents— especially commanders, planners, and small-unit leaders—should strive to avoid imposing their ideals of normalcy on a foreign cultural problem”43 The strategy based on the use of cultural knowledge gives good results. It turned out that problems could be solved not only by combat action, but also through negotiations, or, for example, by providing vocational training to Afghan villages, which resulted in the reduction of the incentive for young men to join the Taliban44. Another project envisages the creation of Afghan tribal militias that would bear the brunt of fighting the Taliban45. Also in Europe - mainly in the Balkans - NATO has developed cooperation between the armed forces and the civilian population in the areas of military operations, i.e. the CIMIC (Civil-Military Co-operation), in operation since 200646. Efforts aimed at improving cooperation between universities and the armed forces in the field of scientific research and education are also significant47. Conclusions As evidenced by concepts described in this article, a "cultural turn" occurred not only at the level of thinking about war and its analysis, but also at the level of practical changes in the tactics and methods of implementation of military operations. Contact with the enemy, but also with new allies, motivated by different values, whose understanding of the concept of war and warfare is completely different than ours, made it necessary to deepen our cultural knowledge in this field. In addition to new practical solutions implemented with increasing success in the campaigns in Iraq and Afghanistan, such as the Human Terrain System described in this article, it has become necessary to introduce new theoretical categories, in 43 Field Manual (FM) 3-24, Counterinsurgency, University of Chicago Press, Chicago 2007, p. 1-15. 44 V. M. Gezari, op.cit. 45 R. L. Holt, Afghan Village Militia: A People-Centric Strategy to Win, http://smallwarsjournal.com/jrnl/art/afghan-village-militia-a-people-centric-strategy-to-win. 46 AJP-9 Nato Civil-Military Co-Operation (CIMIC) Doctrine, June 2003, http://www.nato.int/ims/docu/ajp-9.pdf. 47 Uniwersystet podpisał umowę naukowo-militarną z wojskiem, 11 kwietnia 2012, http://www.uj.edu.pl/uniwersytet/aktualnosci/video-foto//journal_content/56_INSTANCE_7Cwe/10172/5669027. 227 ELŻBIETA OLZACKA order to develop a "grand strategy" and to implement effective policy in these campaigns. Culture, influencing the way people think and behave, should be taken into account as an important dimension of strategy and policies. Not only language, ideas, beliefs, customs, symbols, values, perceptions, and awareness, should be analysed, but also the role of history and historical memory in their creation. Culture is not a collection of constant, unchanging elements that allow us to predict behaviours, but a process that we must learn to understand. The use of the term "war culture" and the ‘anthropology of war’ approach proposed by Vladimir Bazhukov and Vasily Grebenkov allow extensive comparative and historical research that can help capture the characteristics of the war culture of different societies, which is important in understanding how these societies conduct wars. This, in turn, seems necessary for the development of efficient strategies. These days changes in culture, and thus in war, occur faster than ever before. New problems arise, not only social, but also ethical, related to new methods of conducting wars. Third wave wars described by Heidi and Alvin Toffler increasingly depend on intangible factors - knowledge, information, culture, and values48. The conduct of military operations is increasingly determined by profound social and cultural change, such as media coverage of all areas of modern life. This new element of culture is successfully used by terrorist organisations that, with the use of modern media, spread panic among Western democratic societies and indirectly influence the decisions of the political elites. Modern technology, such as the use of unmanned aircraft, changed the traditional perception of ethical issues, and thus affected the so-called ethics of war49. For these reasons, it seems to me that the study of the cultural aspects of the phenomenon of war in the theoretical and historical dimension should be a research challenge for both military analysts, as well as for cultural theorists and sociologists. Bibliography Adamsky Dima, The Culture of Military Innovation, Stanford Security Studies, Stanford 2010. AJP-9 Nato Civil-Military Co-Operation (CIMIC) Doctrine, June 2003, http://www.nato.int/ims/docu/ajp-9.pdf. Bădălan Eugen, The Military Culture and The Strategic Art, “Strategic Impact” No. 3/2005, pp. 5-9. Benbow Tim, The Magic Bullet? Understanding the Revolution in Military Affairs, Brassey’s, London 2004. 48 A.Toffler, H. Toffler, Wojna i antywojna, Wydawnictwo Kurpisz S.A., Warszawa 2006. J. Mayer, The Predator War, “The New Yorker”, October 26, 2009, http://www.newyorker.com/reporting/2009/10/26/091026fa_fact_mayer. See also the essays in T. Żuradzki, T. Kuniński, Etyka wojny, PWN, Warszawa 2009. 49 228 A „CULTURAL TURN” IN THE STUDY AND CONDUCT OF WARFARE… Bendict Ruth, Chryzantema i miecz. Wzory kultury japońskiej, PIW, Warszawa 2003. Carafano James J., Post-Conflict and Culture: Changing America’s Military for 21st Century Missions; w: Heritage Lectures, nr 810, 2003, http://www.heritage.org. Cassidy Robert M., Counterinsurgency and the Global War on Terror: Military Culture and Irregular War, Stanford Security Studies, Stanford 2008. Cassidy Robert M., Russia In Afghanistan and Chechnya: Military Strategic Culture and the Paradoxes of Asymmetric Conflict, U.S. Army War College, 2003. Contamine Philippe, Wojna w średniowieczu, Marabut, Warszawa 1999. Corn Tony, Clausewitz in Wonderland, “Policy Review” September 2006, http://www.hoover.org/publications/policyreview/4268401.html. Creveld, Martin van, The Changing Face of War: Combat from the Marne to Iraq, Ballantine, New York 2008. Dunivin Karen O., A Military Culture. A Paradigm Shift?, Air War College, Maxwell Paper № 10, Maxwell Air Force Base, Alabama 1997. Dunivin Karen O., Military Culture: Change and Continuity, “Armed Forces and Society” 20, no. 4, Summer 1994, pp. 531-547. Ermarth Fritz W., Russia’s Strategic Culture: Past, Present, and… in transition?, SAIC Reports 2006, dostępne na: http://www.fas.org/irp/agency/dod/dtra/russia.pdf. Field Manual (FM) 3-24, Counterinsurgency, University of Chicago Press, Chicago 2007. Gezari Vanessa M., Rough Terrain: The Human Terrain Program Embeds Anthropologists With the U.S. Military in Afghanistan, „The Washington Post”, August 30, 2009, http://www.washingtonpost.com/wpdyn/content/article/2009/08/21/AR2009082101926.html?sid%3DST2009082802422. Gusterson Hugh, The Cultural Turn in the War on Terror, w: John Kelly (ed.), Anthropology and Global Counterinsurgency, Universitety of Chicago Press, pp. 279-298. Holt Ronald L., Afghan Village Militia: A People-Centric Strategy to Win, http://smallwarsjournal.com/jrnl/art/afghan-village-militia-a-people-centric-strategy-to-win. Jager Sheila M., On the Uses of Cultural Knowledge, Strategic Studies Institute, Washington 2007. Jandora John W., Military Cultural Awareness: From Anthropology to Application, “Landpower Essay” No. 06-3 November 2006. Jandora John W., War and Culture: A Neglected Relation, “Armed Forces & Society”, Vol. 25, No. 4, Summer 1999, pp. 541-556. Kamiński Łukasz, Technologia i wojna przyszłości. Wokół nuklearnej i informacyjnej rewolucji w sprawach wojskowych, WUJ, Kraków 2009. Keegan John, Historia wojen, Książka i Wiedza, Warszawa 1998. Knox Macgregor, Murray Williamson (ed.), The dynamics of military revolution 13002050, Cambridge University Press, Cambridge 2001. Krepinevich Andrew F., Cavalry to computer; the pattern of military revolutions, “The National Interest” 37, Fall 1994, pp. 30-34. Kuźniar Roman, Polityka i siła. Studia strategiczne – zarys problematyki, Wydawnictwo Scholar, Warszawa 2005. 229 ELŻBIETA OLZACKA Lind William S., Understanding Fourth Generation War, “Military Review”, SeptemberOctober 2004, No. 5, pp. 12-16. Mayer Jane, The Predator War, “The New Yorker”, October 26, 2009, http://www.newyorker.com/reporting/2009/10/26/091026fa_fact_mayer. McFate Montgomery, Anthropology and Counterinsurgency: The Strange Story of Their Curious Relationship, “Military Review”, 85 March-April 2005, pp. 24-38. Münkler Herfried, Wojny naszych czasów, Wydawnictwo WAM, Kraków 2004. Olzacka Elżbieta, Kulturowy wymiar zjawiska wojny – zakres badań i doniosłość, „Kultura i Historia” nr 22/2001, http://www.kulturaihistoria.umcs.lublin.pl/archives/4192. Packer George, Knowing the Enemy: Can Social Scientists Redefine the ‘War on Terror?’, “New Yorker”, 18 December 2006, pp. 60-69. Petraeus David H., Learning Counterinsurgency: Observations From Soldiering in Iraq, “Military Review”, January-February 2006, pp. 2-12. Porter Patrick, Good Anthropology, Bad History: The Cultural Turn in Studying War, “Parameters”, Vol. 32 (2/2007), pp. 45-58. Price David, Human Terrain Systems, Anthropologists and the War in Afghanistan, “CounterPunch” 2009, http://www.counterpunch.org/2009/12/01/human-terrainsystems-anthropologists-and-the-war-in-afghanistan. Rohde David, Army Enlists Anthropology in War Zones, “The New York Times”, October 5, 2007, http://www.nytimes.com/2007/10/05/world/asia/05afghan.html. Scales Robert H. Jr., Culture-CentricWarfare, “Proceedings” 130, October 2004, 32-36. Shay Christopher, Should Anthropologists Go to War?, “Time U.S.”, December 13, 2009, http://www.time.com/time/nation/article/0,8599,1947095,00.html#ixzz23EZOqYSU. Siegl Michael B., Military culture and transformation, w: “Joint Force Quarterly”, No. 49, April, 2008, pp. 103-106. Snyder Jack, The Soviet Stategic Culture: Implications for Nuclear Options, RAND, Santa Monica 1977. Toffler Alvin, Toffler Heidi, Wojna i antywojna, Wydawnictwo Kurpisz S.A., Warszawa 2006. Watts Barry D. The Maturing Revolution in Military Affairs, CSBA, Washington 2011. Żuradzki Tomasz, Kuniński Tomasz, Etyka wojny, PWN, Warszawa 2009. Russian-language literature: Бажуков В.И., Эвристические возможности антропологического подхода к исследованию военной культуры, Автореферат диссертации на соискание ученой степени доктора культурологии, Москва 2009. Мусин А. Е., Milites Christi Древней Руси. Воинская культура русского Средневековья в контексте религиозного менталитета, СПб.: Петер-бургское востоковедение, 2005. Бажуков В.И., Методологические проблемы военной антропологии; „Вопросы культурологии” № 5/2007, pp. 24-27. 230 A „CULTURAL TURN” IN THE STUDY AND CONDUCT OF WARFARE… Бажуков В.И., Военная культура и национальная безопасность, „Вестник Военного университета”, № 2/2007, pp. 94-99. Бажуков В.И., Военная антропология: объект, предмет, направления, методология, „Вестник Военного университета”, № 3/2008, pp. 37-45. Грачев В.Д., Гребеньков В. Н., Особенности языка военной культуры, “Волгоград: „Известия ВГПУ”, №2 (15), 2006, pp. 24-29. Гребеньков В. Н., Феноменологический подход квоенной культуре общества и ее нравственные основания, „Вестник ВГУ” № 3, 2008, pp. 268-273. Гребеньков В. Н., Рациональность в контексте формирования диалога военной культуры и религии, “Вестник Башкирского университета” Т. 14. №2, 2009, pp. 564-568. Гребеньков В. Н., Региональные аспекты военной культуры и некоторые характер стики образа военной службы в сознании молодых россиян, „Вестник Башкирск го университета” Т. 14. №3, 2009, pp. 933-937. Ермоченко С.Н., Патриотизм как базовая ценность российской воинской культуры, “Вестник Toмского ГУ”, № 314, pp. 65-67. Романова E.Н., Военная культура и ее основные характеристики, “ВестникСамГУ” № 1 (60), 2008, pp. 213-218. Сенявская Е.С., Военно-историческая антропология, как новая отрасль историчес ой науки, Е.С. Сенявская, „Военно-историческая антропология. Ежегодник” 2002, pp. 135-135. 231 ELŻBIETA POSŁUSZNA NDU Scientific Quarterly no 4(89) 2012 TYPOLOGICAL ASPECTS OF SINGLE ISSUE TERRORISM Elżbieta POSŁUSZNA, Ph.D. Warsaw Uniwersity of Life Sciences – SGGW Abstract th In the second half of the 20 century in the United States of America and Western Europe there appeared a new kind of worldview-driven violence defined as “single issue terrorism.” This type of terrorism has progressively gained importance. Hence, a closer look at the phenomenon becomes a necessary condition for its understanding and, in consequence, fighting it down. The author sets in the paper several goals – to look at single issue terrorism through the prism of specific typologies; to evaluate to what extent the accepted definitions of single issue terrorism are justified; to find and explain the distinctive criteria between single issue terrorism and “many issues terrorism”; to show the difficulties of any kind of classification endeavours regarding the groups, which according to common opinion engage in single issue terrorism. The paper is closed with a postulate to give up, while creating typologies, so called essential thinking in favour of Wittgensteinian thinking in the categories of family resemblances. Key words – terrorism, security The phenomenon of single issue terrorism has not been, as yet, highly popular among the researchers working on terrorism and security. So far, not one complex theoretical work addressing that issue has been written. Yet, single issue terrorism is not a marginal or atrophic phenomenon. The constant increase of this kind of offence, its growing radicalisation, multiplicity of its forms and its manifestations, as well as a permanent evolution of methods and tactics of individuals and groups who commit it is a reason to perceive this type of terrorism as a phenomenon of high danger potential; dynamic, liable to change in time and space, and thus needed to be included in the broad security perspective. There have been a few attempts to define single issue terrorism1 during the last three decades. Alex P. Schmid and Janny de Graaf were among the first ones who 1 In the subject literature the term “special interest terrorism” is used interchangeably with the term “single issue terrorism” (terrorisme à cause unique czy terrorisme lié à une cause particulière, Terrorismus für Einzelstreitfragen, terrorismo de causa única). Apart from these two the most common denominations there are various variations of the two, e.g. single-issue group terrorism, 232 TYPOLOGICAL ASPECTS OF SINGLE ISSUE TERRORISM put it forward a definition. At the beginning of the 1980s they defined single issue terrorism as “terrorism by an individual or small group pressuring authorities to grant some privilege to a larger group with which the terrorists sympathise”2. Somewhat different is the approach of G. Davidson Smith (from the Canadian Security Intelligence Service): “The term ‘Single Issue Terrorism’ is broadly accepted as extremist militancy on the part of groups or individuals protesting a perceived grievance or wrong usually attributed to governmental action or inaction”3. Later authors did not use in their definitions these too general and thus imprecise characterisations and considered “single issue terrorism” as different from other forms of terrorism due to its focus on resolving one particular issue4. In such a manner this kind of terrorism is defined by for example David Veness (from the Metropolitan Police Service) in his article “Single Issue Terrorism”: “Single issue terrorism may be defined as the adoption of the full arsenal of political violence towards the promotion of one political subject. This issue need not be strictly aligned to any political or religious ideology. Hence, supporters are narrow in their focus on the single issue but broad as regards the delivery of their message”5. Quite similarly it is defined by the analytics from the Federal Bureau of Investigation – probably the most experienced institution in counteracting the development of this type of terrorism (mainly due to the fact that the majority of ideological violence acts classified as single issue terrorism takes place on the U.S. territory). In various FBI publications one can find the following elucidation of that phenomenon: “Special interest terrorism differs from traditional right-wing and left-wing terrorism in that extremist special interest groups seek to influence specific issues, rather than effect widespread political change. Special interest extremists conduct acts of politically motivated violence to force segments of society, including the general public, to change attitudes about issues considered focused-issue based terrorism, special-issue terrorism; respectably: International Encyclopedia of Terrorism, London: Fitzroy Dearborn Publishers 1997, p. 209, Maxwell Taylor, John Horgan (eds.), The Future of Terrorism, London/Portland: Routledge 2000, p. 84, Aref M. Al-Khattar, Religion and Terrorism: An Interfaith Perspective, Westport, London: Praeger 2003, pp. 21-22. There are also attempts of going beyond this terminological paradigm – for example “reducted conflict range terrorism” (terroryzm zredukowanego pola konfliktu), see: patrz: Bartosz Bolechow, Terroryzm w świecie podwubiegunowym, Toruń: Wydawnictwo Adam Marszałek, 2002, pp. 25, 55. 2 Alex P. Schmid, Janny de Graaf, Violence as Communication: Insurgent Terrorism and the Western News Media, Beverly Hills: Sage Publications 1982, p. 56. 3 G. Davidson Smith, „Single Issue Terrorism“, Commentary (A Canadian Security Intelligence Service Publication), 1998, No 74, p. 1; and G. Davidson Smith, Combating Terrorism, London, New York: Routlege 1990, p. 7. 4 Of course, terrorist or extremist groups focused on one single issue are in many instances a part of broader movements (fighting for example for a moral restoration or new socio-political order). However, as often emphasised, the aim of their activities is not to evoke a larger political change but rather to ‘resolve’ one particular issue. 5 David Veness, „Single Issue Terrorism”, in: Barbara Szamota-Saeki, Dobrochna Wójcik (eds.), Impact of Political, Economic and Social Change on Crime and its Image in Society, Warszawa: Instytut Nauk Prawnych PAN 1996, p. 190. 233 ELŻBIETA POSŁUSZNA important to their causes”6. At the end, it is worth quoting William Dyson’s definition, who in respect to the discussed phenomenon uses two terms – specialinterest terrorism and single issue terrorism: “Special-interest/single issue terrorism involves the use of extreme force and violence for the purpose of coercing a government and/or population to modify its behaviour with respect to a specific area of concern. These extremists do not have an overall political agenda. More often than not, special-interest/single issue extremists do not seek the overthrow of a government or even a major alteration in the manner in which it operates or in the manner in which the people live. Instead, their intention is to force the government and population to change its direction in line with the philosophy of the extremist with respect to a specific subject. In many instances, the overall philosophical cause of the special-interest/single issue terrorist is fairly popular with the citizens. Therefore, rather than attempting to “educate” the public about the topic, the clandestine terrorist’s emphasis is more towards coercing and forcing the people to take a desired action. The terrorist seeks immediate change, and refuses to wait for a legislative process to bring about the desired end”7. Two of the above quoted definitions – the FBI’s and Dyson’s itemise the following distinctive features of the discussed phenomenon: (1) the focus on “solving a single issue” and (2) non-revolutionariness (no will for wide-ranged changes) in regard to the existing system (the state, society) in its entirety. In the subject literature, what should be mentioned, is that the two features are usually being accepted as the basis for classification, i.e., the criterion to differentiate between single issue terrorism and other types of terrorism. Naturally it is always an author’s terminological decision that determines the definition (the decision is usually limited by the scientific utility of the term that is being defined). The author decides on how he or she understands and characterises the analysed phenomenon. Such a definition should not be disputed with. One may (or even should) argue against an erroneous classification (ordering) of particular phenomena under such a constructed definition. Let us move then to the classification. Right at the beginning it should be noted that just a few authors tried to come up with such a classification. Kai Hirschmann was one of them. He used the number of taken up issues as the criterion and on that account divided the entirety of the phenomena labelled as terrorism into two categories: multiple-issue-terrorism (Streiffragenbuendel Terrorismus) and single-issue-terrorism (Terrorismus fuer Einzelstreitfragen). In the first category Hirschmann lists the following kinds of terrorism: ideological, political, nation-orientated, supported by the state, based on faith (religious and world-view-orientated), of the ‘chosen ones’; whereas in the second one he places terrorism “fighting” for animal rights, the environment and 6 Terrorism in the United States: 1999, U.S. Department of Justice, Federal Bureau of Investigation, Washington 1999, p. 20. 7 William Dyson, „The Emergence of Special-Interest/Single-Issue Terrorism”, presented by IIR Institute for Intergovernmental Research, Tallahassee, Florida, 2001, p. 1. 234 TYPOLOGICAL ASPECTS OF SINGLE ISSUE TERRORISM against abortion. According to Hirschmann the anti-globalists and gene technology opponents are also on the path towards single issue terrorism8. Another terrorism researcher, Guenter Loeckinger, considers single issue terrorism in the framework of a slightly different typology. By employing the motivation criterion he divides terrorism into: religious, drugs-related and political. The latter he then breaks down into left-wing terrorism, right-wing terrorism and single issue terrorism (streitfragen-spezifischer Terrorismus). Following Hirschmann, Loeckinger counts animal rights terrorism, environmental-protection terrorism, and “pro-life” terrorism in the single issue terrorism category (after Hirschmann he also believes that anti-globalists and gene technology opponents gravitate towards single issue terrorism)9. Whereas Alex Schmid having divided political terrorism into regime/state terrorism, state-sponsored terrorism, vigilante terrorism, and insurgent terrorism distinguished single issue terrorism in the frames of the latter; next to such phenomena like social revolutionary terrorism, right-wing terrorism, religious terrorism, nationalist and separatist terrorism. As above mentioned researchers Schmid places animal rights terrorism, environmental protection terrorism, and anti-abortion terrorism under the single issue terrorism category10. In their single issue terrorism classification considerations all authors quoted above have (practically exclusively) taken into account the extremist activities of animal rights defenders (animal rights terrorism), environment defenders (environmental protection terrorism), and “pro-life” activists (identified in the subject literature as “anti-abortion terrorism”). However, it is worth mentioning that there are authors who set the range of the term “single issue terrorism” rather differently. Raymond Corrado, for instance, divides anti-state terrorism into three categories: ideological terrorism (religious or secular), ethnic-national terrorism and so called issue terrorism; the latter is further divided into environmental terrorism, animal rights terrorism, anti-abortion terrorism and anti-tax terrorism11. Another broadening of the range of the term is made by the already mentioned William E. Dyson who distinguishes the following primary causes of single issue terrorism: animal rights, environmental or “eco” issues, antiabortion, and anti-genetic engineering12. One should remember, of course, that classification endeavours comprise of far-reaching generalisations. In particular cases these generalisations may obscure the issue, not clarify it. Contrasting that remark with the typologies given above it 8 See: Kai Hirschman, “Terrorismus in neuen Dimensionen. Hintergruende und Schlussfolgerungen”, Aus Politik und Zeitgeschichte, v. 51, 2001, p. 8. 9 Georg Loeckinger, Terrorismus, Terrorismusabwehr Terrorismusbekaempfung, Vienna: Ministry of Defence, 2004, p. 29. 10 Alex P. Schmid (ed), The Routledge Handbook of Terrorism Research, New York: Routledge, 2011, pp. 688, 171. 11 Raymond Corrado, Irwin Cohen, Terrorism, Burnaby: Simon Fraser University, 2000, Quoted in Jesse L. Cale, Issue Terrorism: An Analysis of Trends in North America, Simon Fraser University, November 2003, summit.sfu.ca/system/files/.../b34734508.pdf, s. 19, (12 April 2012). 12 William E. Dyson, Terrorism: The Investigator’s Handbook, Elsevier: Anderson Publishing, 2012, p. 28. 235 ELŻBIETA POSŁUSZNA would be difficult not to agree with the claim that in the case of anti-abortion terrorism or animal rights terrorism we deal with a classical example of a terrorism (or extremism) aiming at resolving one particular goal (single issue). In the case of anti-abortion terrorism the goal is obviously to place a full ban on abortion; in the case of animal rights terrorism the goal is to appoint animals with the right to life and development, which would be comparable with the ones humans possess. The instance of environmental protection terrorism is somewhat different. In my opinion, not all organisations employing this kind of terrorism focus, in their activities, on one particular issue. After a closer analysis of the tasks of some radical pro-environmental organisations, one may get the impression that although their fundamental goal is protection of the natural environment (in this very general sense they focus on a “single issue”), for many of them this goal can be achieved only if certain socio-political (often quite radical) changes are carried out; in other words, when many various “particular issues” are realised. A good example of such an organisation is, I believe, Earth First! – one of the largest, oldest and at the same time the most recognised extremist environmental group. In spite the fact that from the worldview perspective this group is of a pro-environmental character, it does not limit itself to carrying out a single, narrow-ranged task. On the contrary, in the area of its goals there are multifarious issues, i.e.: a ban on natural environment devastation, reconstruction of social awareness, decrease of population growth, thorough reconstruction of society, or the eradication of technological infrastructure. Due to the multiplicity of the goals and the fact that they are pertinent to the whole socio-political reality, not only its selected fragments, Earth First! (as well as many other extremist pro-environmental groups) may be classified as rather one of the extremist organisations of the revolutionary (transformational) type, which aim at a total change of the world, than as an organisation of the single issue type, which accordingly to the accepted definition, focus on resolving one particular issue. Another remark refers to too the narrow definition of single issue terrorism. It is not entirely clear why authors of the quoted single issue terrorism typologies do not take into account phenomena, which by virtue of explicit or implicit definitions accepted by them should almost for certainly have been placed there. As it seems, among such phenomena there are: racist terrorism (aiming at social exclusion of people ethnically different), wise use terrorism (aiming at repeal of proenvironmental restrictions), or, already belonging to previous categories, feminist terrorism (aiming at overthrowing patriarchy and “women's liberation”). All the mentioned types of terrorism do not aim at reconstruction of the existing social order but at carrying out one particular issue. Nationalist-liberation terrorism may raise a few classification doubts. On the one hand, it seems to be focused on carrying out a single issue – the liberation of the nation from foreign occupation, and on the other, that carrying out a single issue is related with (it is however not its goal, at least not as the basis for action) complex, wide-ranging transformations in the functioning of the state and society. 236 TYPOLOGICAL ASPECTS OF SINGLE ISSUE TERRORISM The above cases should, as it seems, induce an attempt of an interpretative specification of the definition of single issue terrorism (which would imply a decision concerning whether pro-environmental terrorism and nationalistliberation terrorism may be recognised as not aiming at “evoking broad political changes”) or setting the range of the defined term somewhat differently (by assigning to it a different set of designations). Such a definition specification, which would allow to include proenvironmental groups and nationalist-liberation groups in the single issue terrorism category is, in my opinion, an extremely difficult task, if ever possible. The majority of those groups strives for a fundamental, broadly understood social reconstruction that consists in the abolition of the state, eradication of technological infrastructure, changing the lifestyle of people (pro-environmental groups) and the eradication of oppressive, foreign forms of domination (nationalist-liberation groups). It can be argued however that for those groups the changes are not the goal in itself (it is not the ultimate goal of their activities). In this case, sociopolitical changes are merely a means enabling them to reach another goal, i.e. natural environment protection or liberation of their own nation. This goal can be reached, at least theoretically, without introducing larger structural changes in the functioning of the state and society. Let us notice however that in the case of those groups environmental and liberation goals are closely interlinked with the political objectives (and they cannot be separated from one another), and secondly, relying on the same principles as other kinds of terrorism (almost all of them) they can be included in the single issue terrorism category, e.g. ultra-left-wing terrorism, which revolutionary (transformational) goals may be interpreted as tools enabling the introduction of social justice or religious terrorism, which attack at a certain way of governing or lifestyle can be explained as a means for reconstructing the bond between humans and God. In this notionally difficult situation, the only solution, as it seems, is to get to terms with “interpretative failure” and acknowledge that probably just a part of environmental protection terrorist groups (the one that does not aim at social and political changes) can be qualified, on the account of the analysis of their activities, to the single issue terrorism category, and the other part should be excluded from it. However, nationalist-liberation terrorism on the whole should be rather qualified as non-single issue. For, it seems not likely, that there would be a case of nationalist-liberation terrorism, which aims at the realisation of its liberation aspirations (carrying out a single issue) without simultaneous attempts to introduce socio-political changes. The above mentioned classification difficulties compel the discerning researcher to reject a simple “notional framework” and to decide “in the moment” whether a given group (at a certain of stage of its development) focuses on single issue, or whether it aims at wideranging (revolutionary) social changes. The goals of single issue terrorism (narrow-ranged) and revolutionary terrorism (wide-ranged) are different. This difference among the goals gives hope for more efficient counteraction and prevention of this kind of phenomena. The distinction among the goals of the two types of terrorism suggests their different motivations, and 237 ELŻBIETA POSŁUSZNA hence possibly various determinations. This is the reason for looking at the violence acts and trying to find there the difference of the sources. There are many psychological theories regarding the sources of terrorism. The majority of these theories search for them in internal conflict as the effects of a maladjustment to reality and stemming from it a rampageous rebellion against it, based on violence. My interpretation goes in line with that conception. I regard that behind the willingness for radical actions there is usually a complex system of defence mechanisms, which are most commonly a reaction to experiencing the feeling of resentment13. Resentment theory has been employed many times, both, in psychological and social analyses. From the very beginning of examining this phenomenon, it has been believed that the resentment conception is characterised by a high explanatory potential, both in the psychological and social research areas. It was also used for elucidation of the key issues for this study, namely extremism and terrorism14. Resentment is a complex of hateful emotions. It arises on the basis of the feeling of inferiority stemming from the inability to reach the desired values15. Resentment, as noted by Friedrich Nietzsche, Max Scheler and Max Weber is an experience shared by the oppressed, rejected and depreciated; those, who feel they lose in the existing value order. How can one deal with a painful, overwhelming inferiority feeling? A human being with resentment will not achieve the desired values with an activity directed outwards (he or she is too weak for such an action). They will not satisfy their second paramount want as well – the need to destroy those who are the bearers and at the same time the object of their unfading hatred. However, the conflict between the desire and helplessness is staved off. Durability of situations generating negative emotions and their constant suppression lead finally to the point where the consciousness begins to pursue towards overcoming the tension between the aspiration and inability, which results in a re-evaluation of values. The essence of the “re-evaluation” is the depreciation of the unreachable (but still 13 Ressentiment is not, obviously, the only one predicate of radicalism. It seems, cultural and political processes, like globalisation and informationisatio play here equally essential role. As rightly stated by Castells, these processes endanger the areas which have been, till now, common identity generators. Due to their characteristics (aiming at unlimited cooperation with unlimited number of individuals accompanied by the lack of value-creating preferences) they cannot be identity providers. It results in the necessity of building one’s own identity on the basis of new, individualised sense sources (such that escape value annihilation processes). Of course, not all these newly formed identities must inevitably gravitate towards extremism. However, the necessity of rivalry in the scope of mutually competing justifications makes this path highly probable. Both, Nietzschean ressentiment theory and Castells’ conception of “common identity expression” shed new light on the issue of the future of single issue terrorism suggesting the conclusion that it may be practically impossible to eliminate this kind of terrorism because it is impossible to eliminate the internal impulses behind it. 14 See for example: Lauren Langman, Douglas Morris, „Islamic Terrorism: From Retrenchment to Ressentiment and Beyond”, in: Harvey Kushner (ed.), Essential Readings on Political Terrorism: Analyses of Problems and Prospects for the 21 Century, New York: Richard Altschuler&Associates, 2002. 15 Such a feeling of inferiority is not experienced by all the people but only those who due to their various psychological or physical defects suffer long lasting depreciation or incapability to create or confirm by themselves their own value, and who have limited possibilities to deal with challenges brought by reality – the reality that is “made to measure” the people who are free of such defects. 238 TYPOLOGICAL ASPECTS OF SINGLE ISSUE TERRORISM desired by the subject), the re-ordering of values and establishing in their place a new order; such an order, where his or her values (perceived before as the reason for their life failures; generating suffering and inferiority complex) are being identified with that what is positive, good, and valuable. The re-evaluation gives energy and the will to act – it gives the power to tear down the old resentment generating orders of values (breaking the old game rules). It induces acts of a terrorist character. Resentment seems to be a psychic power that forces individuals and groups to overcome, in the name of maintaining identity and a positive self-image, a conformist anxiety and become what they want to become – the sole and true creators of values and communal sense. In their case, reaching for violence becomes a way of dealing with both arising doubts and the resistance of the reluctant towards these world values. Due to the fact that the essence of resentment is a pursuit towards re-evaluating the vales (depreciation of the existing values and establishing the new, resentment inspired ones), it has to lay at the foundation of the acts, which aim at total social transformations. Resentment as such does not aim at a change of some part of reality but at a transformation of the world in its entirety. It is impossible to control terrorism based on resentment by concession and negotiations because it is not interested in them. Resentment terrorism aims at total (uncompromising) changes. It aims also at the destruction of all old order residua (symbols of unattained values) which, on the account of resentment, it feels connected to. Where there is a black and white reality, there is no place for attempts to come to an agreement or any kind of actions based on the idea of compromise. Therefore, it probably occurs more often in terrorism of the revolutionary type, than in single issue terrorism. The latter, contrary to the former one, makes no total, transformational claims because it is focused on carrying out a single issue – on dealing with merely one particular fragment of reality (unless it is allied with a “transformational” ideology). Hence, it must be non-fundamentalist in its essence (i.e. resentment plays, if any, a marginal role in its forming). If the above conception is right, then, there is a high probability that after carrying out that issue (or at least after introducing a number of compromise solutions) the terrorism would be extinguished or at least largely reduced. Such a perspective seems impossible in the case of revolutionary terrorism (wide-ranged, resentment based) that aims at total social transformation. For revolutionary terrorism these issues are only a pretext for the articulation of internal transformational claims stimulated by inferiority instinct. The need behind it (the need to devaluate the world that depreciates the “I”) is indeed unchangeable and always stays current – that is why fulfilling the articulated claims is not able to satisfy it. In the fight against resentment terrorism there are only possible, as it seems, preventive actions, but they should be undertaken much earlier – before resentment enters the phase of re-evaluation of values. At first sight, this state of affairs may lead to a claim that single issue terrorism is easy to resolve by complying with these few demands, which are the cause of the conflict. The reality however seems to contradict that claim, at least in the case of 239 ELŻBIETA POSŁUSZNA environmental protection terrorism and animal rights terrorism. In spite of the progress that has occurred in the area of animals and nature protection (in spite of successive satisfying of the ecological demands, i.e. the single issues the ecological radicals fight for), the violence of the single issue type groups has, thus far, escalated and the number of their followers in on a constant increase. It can bring about many doubts, one of which (the most interesting in this context) must be pertinent to the fact, of whether we deal here with a single issue extremism. It is not so in all of the cases. For instance, not all radical ecological organisations are focused on resolving a single, particular issue. Some of them (e.g. the previously mentioned Earth First!) want revolutionary changes, which aim is to transform the whole society, and not only a part of reality. It is also worth mentioning that many ecological organisations adopt revolutionary slogans and ideologies from other movements (the fight against globalisation or social injustice). More and more often the groups that used to be ideologically homogeneous ally with other, often revolutionary or transformational, groups and form a kind of ideological front based on the common definition of the foe and similar methods of acting (mainly sabotage). Particularly, examples can be seen with ecological (animal rights and pro-environmental) organisations, which do not limit themselves any more to attacking the deforestation companies, ski resorts, high voltage lines or laboratories, where experiments on animals are conducted. More and more often big corporations, private houses, SUVs, and also (that is a relatively new trend) various symbols of capitalism are becoming the target of their attacks. Anti-capitalist ideas occurred in ecological ideology and in the natural environment protection movement already at the countercultural beginning of its strongest wave. However, explicit pronouncing against capitalism and globalisation by the groups that have come into being on account of the latter, had a place not until the late 1990s, when the people professing the ideas of collectivistic anarchism and connected to the alter globalist movement started to gain influence in those groups. Earth liberation, for them, has become closely linked with the abolition of capitalism and social liberation. The path leading to that goal was not slow reforms but a revolutionary spurt proceeded by concentrated attacks on elements of the capitalist system. It does not mean that there should be an equals sign between the old and new ideas. Ecological ideas (pro-environmental or on animal rights) are still treated by those organisations as the priority. However, it is not any more justified to categorise them as “pure single issue extremism.” It should be also noted that from the mid-1980s the majority of secret groups (including terrorist ones) due to safety reasons started to resign from hierarchic and centrally governed structures in favour of looser structures, possibly the least centralised, quite often truly horizontal ones, without clear governance or control centres. Many single issue organisations followed that way as well, giving up stable organisational structures and exchanging them for a network structure – a loose configuration of small, autonomous cells (individuals or small groups) that are not managed by any governing or activity-inspiring decision centre. Sometimes, they have totally resigned from any form of governance and have 240 TYPOLOGICAL ASPECTS OF SINGLE ISSUE TERRORISM introduced so called leaderless resistance. Nowadays, we do not really deal with organisations in the traditional sense of the word but rather with egalitarianorientated groups of activists (which often meet extemporaneously in order to carry out a particular action) or independent individuals, acting alone, and not communicating with other proponents of the cause. It does hinder any classification attempts and the examination of the phenomenon of single issue terrorism. There is no doubt that the transformations of the last twenty years resulting in a significant “organisational blur” and “intermingling of ideas” are the cause for less frequent occurrences of the “pure” type of single issue organisations. We deal, more and more, with a mosaic (or network) of loosely interconnected individuals and groups devoid of clear structure, which operate on the basis of a few ideologies (mutually influencing one another) and often extemporaneously defined goals. It is impossible to precisely establish what the organisational frames of a given terrorist group are, and what its current goals and motivations are. In consequence, it should not be expected that “carrying out the issues” would lead to the “appeasement of the movement” and, in effect, to a decrease of illegal acts. Such a state of affairs makes the examining of those groups an extremely difficult task. Even thinking about them in “essential” categories seems anachronic, at most. It is time to get rid of them in favour of more elastic thinking, which might be somewhat more fluid but in spite of that it reflects the character (not the essence) of the given phenomenon in a better way. A postulate of that kind refers to Wittgensteinian thinking in the sense of “family resemblance” categories – to think in these categories, is to be convinced that the notions do not always refer to the universals. It happens that the scope of the notion is established by a set of designations that do not have any common feature but still are similar. (That type of notions, according to Wittgenstein, resembles a rope woven of many strands, with none of them stretching the whole length of the rope.) In the context of our considerations one should remember that all typologies are, first of all, tools in service of ordering and explaining the examined reality. They mould and simplify at the same time – they are ideal models, which at the same time explain and falsify the reality image by often arbitrary assimilation of various, although in some respects related, phenomena. The researcher’s task is to avoid, if possible, simplifying analyses and to be attentive in regard to the multi-aspect character of the described phenomena, as well as, to “mixed phenomena,” which do not entirely fit into the idealising model. Excessive schematisation (not taking nuances into consideration) of reality leads directly to improper evaluations, on the basis of which we are prone to take actions. Relating the above remarks to the study of single issue terrorism, it should be noted that special attention is needed while employing any kind of abstractions, especially in going “from general to specific” – carrying out intellectual operations on general terms, and then transposing the conclusions drawn from them to a particular phenomena (e.g. the activity of the particular groups). For, it may turn out that the abstractions diverge too much from the empirical reality, and thus they do not only describe it inadequately but represent them falsely. 241 ILONA POLITOWICZ, PIOTR MAKOWSKI, AGATA NIEDZIÓŁKA NDU Scientific Quarterly no 4(89) 2012 Assoc. Prof. Ilona POLITOWICZ, Ph.D. Assoc. Prof. Piotr MAKOWSKI, Ph.D. Uniwersity of Zielona Góra National Defence University SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES Agata NIEDZIÓŁKA, M.A. Uniwersity of Zielona Góra Abstract Due to our accession to the European Space Agency, Poland gains the position of a full member state of ESA, instead of the previous cooperating role. Our membership in ESA should be considered in a much wider context. It should include European space policy (prepared and implemented together by the EU and ESA), as well as our country's methods of extensive communication in the area of product information, and space technology including its applications and benefits. The main aim of this article is to introduce particular problems connected with the improvement of form and methods of communication in the areas of needs and possibilities among space technology’s transfer. Space technologies are here the common good of ESA organisation. Moreover, the article will focus on the general potential directions of solving problems, which concentrate on the development of a communication model’s needs in the context of the communication of new possibilities, technology transfer and space services. Space technology products are worldwide innovations, which stimulate new technology’s development and are conducive to the transfer of them to other fields of economy. They also require new forms of marketing, human resources management and quality control. We can notice the emergence of a new market for space services, which is the driving force of innovative solutions in many economic areas (communication, transport, environment, agriculture, safety) and administration. Poland cannot be only the client of solutions delivered from abroad. Poland has to actively participate in the creation of new technologies, and to establish its own promotion system for that matter. Key words – space, marketing, digital technologies 242 SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES Introduction By being a full member of ESA, our country is taking the challenge of creating better conditions for the development of science and economy. Membership will also help to upgrade the level of safety and access to modern technologies. The accessibility of the newest solutions created for the space industry will certainly improve the innovation of many areas in our lives. This generates plenty of problems, which solutions demand a country’s interference using special institutions, as well as the creation of supporting methods for research and implementation projects. This article has the aim of introducing particular problems connected with the improvement of form and methods of communication in the areas of needs and possibilities among space technology’s transfer. Space technologies are here the common good of ESA organisation. Moreover, the article will focus on the general potential directions of solving problems. This is the equivalent accessibility rule to the described products, generating a new quality of mutual communication. There appears new questions: how to improve the communication methods of new possibilities in the area of technology transfer of space services and how to define target groups, improve signalising needs, as well as how to educate society about new forms and methods of communication. Is there a requirement for putting that form of cooperation with ESA in an institutional pattern of safety or only of defence. It can be assumed that in the process of preparing new, and improving existing, methods and forms of communication, the theory of marketing and innovation implementation will be useful. It should be then modified with the suggestions from the dynamics and innovation researches of space and digital technologies development. The main success in that field can be introduced in the concept of electronic – mobile – marketing. During research examples of very important criteria can be: society level of living or the effectiveness of industry and administration activities on the particular areas, which use innovative and space solutions. Apart from the implementation methods of marketing products, typical for informative society, it can be assumed that the knowledge given to the potential customers and producers can be more effective through youth education in the field of space marketing specialisation. Those effects can be already observed. There are no doubts, that the problems mentioned above, should be solved jointly by theoreticians and practitioners of management and marketing fields. Satellite technology sector. Regional context Created in the last decades of the twentieth century satellite infrastructure fulfils the needs of communication, navigation and Earth observation. It made possible, beside the development of the space technology hardware, development 243 ILONA POLITOWICZ, PIOTR MAKOWSKI, AGATA NIEDZIÓŁKA of a brand new sector of this industry – services. The diagram below illustrates the structure of the space sector. This rising new industry – modern satellite services industry – is becoming a driving force of innovative solutions in many branches of the global economy (i.e. communication, transport, environment, agriculture, security) and administration. Simultaneously, these sectors create market for highly specialised services. Innovative satellite applications become a strong transforming force for new methods of marketing communication and create new marketing systems by increasing the productivity of the new and strong relations with customers in the open space of time. In last 30 years, Poland has been developing its own space section. It already gained huge experience and can prove real achievements among firms from the sectors of technology, information, telecommunication and informatics. These companies are ready to become any stage in the chain of production and satellite services, starting with the production of components, satellite platforms, through downstream segments (data stations, satellite signal receivers etc.), to the services using satellite technologies. The scientific and technology potential of the Polish space sector is proven by the effects of cooperation with ESA as part of the PECS Cooperation Agreement, signed in 2007 for 5 years. Over 135 motions had been put forward in three competitions that had already been offered by PECS. Nowadays, lasting projects are related to observation, navigation and satellite communication, and transfer of technologies. They are contracted by Centrum Badań Kosmicznych PAN, Geosystems Sp. z o.o., Instytut Geodezji i Kartografii, Politechnika Wrocławska, Akademia Marynarki Wojennej, Instytut Lotnictwa, Astri Sp. z o.o., Politechnika Warszawska, Uniwersytet Warmińsko-Mazurski, WASAT Sp. z o.o. Technologies used in creating newer or highly improved goods are based on the practical use of a combination of knowledge and experience. Usually, even the process as such, is unique and new, so it requires creative promotion. Human beings create new solutions and tools when they want to accomplish a task or solve nurturing problem. From that point of view, the main driving force of invention is human curiosity or problems encountered during new tasks and projects. On one side, inventions bring freshness, curiosity and open new possibilities for discovering and creating new services, pushing forward progress and stimulating innovations. On the other side, there are situations in which projects or new activities are forcing the creation of the new tools, techniques or technologies, in some way pulling behind them development and innovations. Both are illustrated on the picture no. 1 below: 244 SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES Source: own work. Picture no 1. Innovation development Technological needs and potential that is hidden in new technologies, both affect one another, stimulate the development of newer and newer technologies and spur innovative solutions for marketing communicators. Looking into consumer needs, we cannot close one's eyes to factors like the growing requirements of the education sector, life style changes (that are more often than before), or consumer preference changes. Marketing specialist should acquire knowledge that not only applies the functioning of modern technologies but also should be prepared to train the sender and recipient, which are potential customers of satellite services or direct users of these services. The process of marketing technics requires the receiver to go into marketing techniques and products' specifications, which consider: – the space services market, – the principles of the products' choice in space services market, – effectiveness of products manufacturing, – spin-off techniques, – prices in the market of space technologies, 245 ILONA POLITOWICZ, PIOTR MAKOWSKI, AGATA NIEDZIÓŁKA – principles of determining prices in non-profit sectors, – cost estimation, – cost designing for a particular manufacturing cycle, – supervision and risk management, – costs of insurance, – distribution and promotion. In the space technology industry, receivers are the most important source of information. Interviews with technology users show the need for development that are very often implied by manufacturing limits and technology imperfections. Projects executed within ecosystems of innovations, widely supported by social campaigns, could be the example of the development of modern technologies. Those arguments confirm the main thesis for the need for specialist trainings. The efforts made by the whole authoring teem on the space marketing specialisation at the Economy Management Faculty of Zielona Góra University, will be shortly born out in practice. The specific character of the national security knowledge, especially defence, allows us to formulate a thesis about the need for education on space marketing at the main polish universities. From invention to innovation in modern technologies These two notions, often used alternatively, play a huge role in technological development. Invention is a new, promising concept, an idea. It may expand and take the features of an innovative solution, that is standing out due to its mature and highly advanced progress, or even implementing of the solution. The world's research indicates that innovations are now the only source of permanent economic growth, and therefore are posing as a strategy foundation for the competitiveness strategies of companies on the international market. The OECD indicates that 2/3 of the total economic growth in Developed Countries should be connected with implementing innovations in their markets. Price domination, so efficiently conducted by the Asian markets, makes the rest of the countries compete on the international markets with innovation only, that means new solutions and technologies. The Innovation Union Scoreboard1 ranks Poland as a moderately innovative country. The goal of the Innovation and the effectiveness strategy of the polish economy is to introduce Poland to the group of the leading countries by 20202. Innovations are crucial to the industry and management policy. As Shumpeter says, innovations cannot be treated as a universal good, but as a complex, destructive force, that is creating new possibilities and challenges for a particular economical system. 1 Innovation index, Global Competitiveness Report. Rising from the 22nd to 15th place , Innovation and effectiveness strategy of polish economy, Ministry of Economy. 2 246 SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES In short perspective, this means a division for winners and losers. In the longer period, innovations become the driving force of economic growth, better quality of life of particular social groups and technological progress.3 This quality of life should be researched with the aim of the creation of effective communication methods, on the bases of the needs and possibilities of space technology transfer. To increase the innovation of economy it is important to back it up with modern services and industry branches with the highest growth potential, as with the hi-tech industry. The base of the success in this case are technological innovations, which at the beginning require expenditure, but at the end they bring calculable profits through the high efficiency of resources involved and the advanced research backup. One of the most innovative sectors is the space sector. It belongs to the group of sectors with the highest level of added value. Statistics shows, that for every €1 invested, ca. € 10 of pay off. The average growth of this sector is constantly increasing. In 2010 it was estimated as 7,7%. The Polish industry structure is dominated by the production of low-manufactured, material-consuming products, which requires a lot of energy and expanded labor structure in the production process. Changing of this situation is possible with the use of the hi-tech industry and communication-related modern solutions and services. Chances for development is given to us by, among others, digital space technologies. Research made for the European Space Agency concerning the Polish economy in relation to the development of the space sector 4, shows that many Polish companies have a great potential of knowledge, experience and organisation culture, allowing the development of informative, telecommunication and electronic technologies. Defining target groups and the scope of information dedicated to them, we can speak about the new technology implementation, firm differentiation etc. Those conditions are created on their situation and market maturity, as well as on the character of its innovations. Innovations can be divided into supportive and destructive. Supportive innovations mean planned evolution or revolution of the existing and developed market, which in most cases applies to big and developed enterprises. Destructive innovations create new markets, often destroying or marginalising older technologies, they are unpredictable, and mostly occur in immature companies, that are in the early stages of growth, and while entering markets are more willing to take a risk and compete. Differences between the basic characteristics of developed companies and start-ups (see picture 2) show that big and mature organisations, with sufficient resources, a variety of experts and a professional management style, are leaders of technologies that are planned and developed on regular basis. 3 „Space and the Processes of Innovation”, ESPI Report, July 2012. “Industry Assessment of Poland for Space Activities”, Bertin Technologies, polish space sector analysis before signing the PECS agreement (Plan for European Cooperating States), 2004 r. 4 247 ILONA POLITOWICZ, PIOTR MAKOWSKI, AGATA NIEDZIÓŁKA Source: “Model of Innovation: Start-Ups and Mature Corporations.” Jerome S Engel., Presentation. Inside Innovation, Conference. University of California, Berkeley. November 2007. Picture no. 2. Model of features of young and mature organisation Small enterprises are willing to take a risk of sudden, interesting and significant inventions, that can be the source of innovations, which in the end can be the way to the top, but with the risk of losing everything. Innovations are essential to the concept stage of every project life cycle. The closer to the end of the project schedule, the more difficult it is to accept any revolutionary changes or solutions. That is mostly because of the high accomplishment cost or high level of risk, that could lead to the project failure. The exception in such a situation can be technological gaps, that have to be filled to run the project, otherwise the project itself would not stand a chance. Taking a risk and bearing the costs related to this new solution is then necessary. Specific target groups of communication can be created form many different criteria. As an example, those are subjects participating in the external and internal 248 SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES national safety assurance (administration, institutions, research and development centres, industry etc.). Such a target group, closed to the general information transfer, and important due to national interests and missions, require separate, institutional forms and methods of communication with ESA. The additional argument for such a solution is the creation of European military forces. The implementation of the concept of European combat groups, allows us to think that they will be the first users of space technology. Needs of unifications require organised international work. The process of modern technologies development In the process of the working out and improving of the new technologies, companies are creating their own methods of management, using schemes and patterns. The model of Technology Readiness Levels, created by NASA, is an example of such a pattern. It looks as like this: Picture no. 3. Technology Readiness Levels – TRL in space sector, NASA 249 ILONA POLITOWICZ, PIOTR MAKOWSKI, AGATA NIEDZIÓŁKA If we interpret this model for the other segments of the market, in many companies it could look as follows: Picture no. 4. Technology maturity model, Source: own work on the bases of Technology Readiness Levels NASA The presented model is also based on the methodology of project management, which creates unique solutions and products. We can observe the clear outlining of the stages of planning, analyses, projecting of the solution, testing and implementations. 250 SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES Source: own work. Picture no. 5. The process of need management and project starting The need, that is the main driving force to creating these new solutions, has an influence on decisions about investment in research, new ideas, converting the scheme into the real, working devices or technology. In this way, companies are able to accomplish their strategic goals and effectively compete on the market. Unfortunately, it's extremely rare for scientific findings and discoveries to be directly implemented or used in the economy. Satellite techniques are not the exception here. In this case however, the results of scientific research and experiments are most often the effect of planned development, strategies and goals, and they go through a long process from the idea, through testing and experiments, to the final implementation and testing during the space mission. The information flow between the parties creating and using innovative solutions is very important. It should be optimised according to arising needs. EISC distinguished 4 different models of cooperation for innovative projects: 1. Closed inside – closed outside. This term means focused, geographically separated work of a multitask team of young professionals in a hermetic environment. Results of scientific research are protected and kept in secret. 2. Closed inside – open outside. That means work in a specialised team, most often in government institutions, institutes, universities, that gather scholars and other scientific workers. The results are introduced to the public. 3. Open inside – closed outside. This type can be described as one that is using knowledge, experience and ideas rising in the macro – environment of the company, to achieve solutions to problems and issues in the project. Mostly it is crowd-sourcing. Using crowd-sourcing 251 ILONA POLITOWICZ, PIOTR MAKOWSKI, AGATA NIEDZIÓŁKA platforms can cut costs, diversify the list of possible solutions, and multiply the intellectual property of the company. 4. Open inside – open outside. This model is based on open cooperation and taking the role of the macroenvironment of the company in creating brand new solutions, also allowing for the free and unlimited use of the results of the research in the future. This last scheme of partnership creates innovative solutions in a large part based on solutions that are open for general use, or simply called “open source” solutions. The market of space technologies, in general, prefers a partnership with companies5. Cooperating, these institutions use their resources in the most efficient way, and more often are successful in the process of technology creation. According to the Ministry of Economy, only half of Polish companies benefit from research and development agencies in the process of creating solutions, technologies and management theory. The Internet, including communication platforms and information exchange markets etc., is the main source of information about possible cooperation with external experts for around 30% of enterprises. The other 20% of companies draw information about partnerships with scientist from the press and media. Yet an economy based on knowledge needs cooperation skills and information transfer between companies, scientific centres and customers. Such actions support a better distribution of resources, responsible leadership, and help create knowledge and information. Innovations arise and spread as a result of partnership and cooperation between organisations. This model determines the innovation of the whole economy and affects it's development. Implementation of innovative solutions Innovative solutions can contribute to the global challenges concerning climate changes, security, the ageing of societies or curing new diseases. Innovations can be implemented in many areas of social and economic life, even those seen as traditional and not innovative, such as agriculture. Space and digital technologies are nowadays strategic services, with high economic and social value. There are a lot of innovations that developed as a result of preparations for space missions. Some examples of these inventions in various areas are: • Medicine: blood dialyzer, CT scanner, telemedicine, new methods of manufacturing drugs. • Sport and recreation: better sports shoes, breathable materials such as Goretex, Velcro. 5 252 „Space and the Processes of Innovation”, ESPI Report, July 2012. Picture no. 7. Space technologies in our daily (socio – economic) life Source: Program for space technology development and using satellite systems in Poland., Ministry of Economy, 2012. SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES 253 ILONA POLITOWICZ, PIOTR MAKOWSKI, AGATA NIEDZIÓŁKA • Food manufacturing: products suitable for long term food storage, instant soups, nutritious products for infants. • Safety: new isolating materials e.g. polymer used in fire suits, innovative products that enable water treatment (including blood dialyzer), toxic gas sensors (including smoke, chemicals and pollution), communication in case of natural disasters, meteorology. • Agriculture: monitoring of ground quality, precise valuation of the crop, precise determination of the need for fertilising. • Technique and industry: battery powered tools (cordless drills, vacuum cleaners, screwdrivers), winter tires, composite materials in brake pads, carbonhardened blades, metalized foil, oil free bearings, telecommunication, satellite communication, digital television, internet television, GPS, Galileo, new tools for digital photography processing, digital photography. Most of the technologies mentioned above, are already rooted in our everyday lives and we can be unaware that the genesis for all these inventions were space missions. As a consequence of the growing role of the space sector in the world economy, in the late 1990s the process of shaping space marketing policy began in the European Union. This policy is supposed to encourage the growth of innovations and economic progress, and to function as a simplifying tool for EU sector policy execution in many areas like: • the development and use for space solutions that serve EU policies and the needs of European enterprises and citizens, including the natural environment, balanced development and global climate changes, • the fulfilment of European needs in security and defence areas regarding cosmic space, • building a strong and competitive space industry, that supports innovations, economic growth, and expansion, as well as gives balanced, reasonably priced services at a high level, • supporting a society based on knowledge, by pulling significant investments in researches connected with cosmic space, and also ensuring Europe plays a significant role in the international ventures of exploration, • Providing unlimited access to new and innovative technologies, systems and potential for ensuring the independence of European space applications. The main pillar of this policy is the construction and exploration of the GMES and Galileo systems. It also means development in four areas of priorities: 1. research in climate changes, 2. innovations and accomplishment of Europe 2020 Strategy, 3. security, 4. and exploration of cosmic space. To successfully compete on the market, the majority of business lines are creating brand new solutions, technologies and innovating ideas and secure them until they are published. They are developing new projects in privacy, dominating 254 SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES over competing parties during the implementation of research results and introducing products to the market. The space technologies sector is based on quite different rules. One can say: “Space shares technologies”. Governments are greatly involved in the development of this sphere and the wide globalization of its products and services. The majority of these technologies, except those related to security and defence, are transferred in a very short time to the open market in order to be developed and adapted for the use of customers on the whole Earth. E-m-marketing / space marketing / info-editing in e-media The modern information technologies market is driving at the ready-made product. Not only partial services and products are crucial and most desirable now, but complex approaches that combine the knowledge and solutions of the different fields and technologies. Due to the development of new technologies, marketing is changing. Today the marketing of digital and satellite technologies is a result of many cultural, social and technological changes. It uses social media, mobile solutions, complex digital multimedia devices and natural user's interface. This process has changed and still is creating new ways and places for content distribution to particular users, customers or business partners. Digital marketing became one of the most important ways of communicating with clients. Despite the need of fast and continuous reaction and adaptation, it is now more and more popular. The most important is to invest in innovative solutions, and to be in real contact with customers and partners, to personalise news up to the style and needs of clients and integrate all communication forms with the specific target. This new model generates challenges and costs as well. Investments in new technologies and innovative solutions require suitable expenditure. The methods of deepening partnership and an integrated approach to the information directed to customers are also challenging. Perfect solutions of digital communication should meet the fundamental needs of: – providing uninterrupted contact with the customer, also on demand, – including every target group, – defining target groups in a proper way, and directing our information more precisely, – directing our information through many channels, – being available in every convenient form (computer, mobile phone, iPad, interactive television etc.), – increasing demand on our services and product, – increasing efficiency of our marketing strategies, – allowing for the full valuation of our strategies efficiency and achieved goals, – a long-term lifecycle with the opportunity for development and further adaptation. 255 ILONA POLITOWICZ, PIOTR MAKOWSKI, AGATA NIEDZIÓŁKA Nowadays, in the time of economic crisis, recipients are looking for free-ofcharge content and information on the Internet. Development of content accessibility by the use of mobile sources and the lower cost of obtaining it, is the factor that inspires customers to gain knowledge this way and choosing this type of communication. We are approaching the phenomenon of the commercialisation of the internet content. Recipients are willing to pay for digital information more often. This channel is becoming profitable and widens our knowledge about the efficiency of marketing actions. Digital technologies allow for marketing management integration. They improve contact with the customer due to personalisation and higher interactivity, allowing for the interesting graphic exposition of the brand, and give more possibilities of marketing analyses. New technologies exert on companies a need for innovations requiring flexibility and adaptation. This integrated marketing management, is a combination of all accessible and usable methods, tools and resources used in marketing communication, in order to gain a more powerful impact on customers and deepen the customer's awareness about our brand. Nowadays, not only the commercial content, but also information is an element of the imagery and communication with the customer. Space marketing tools use effectively the Internet, digital advertisements or social media. The adaptability and interactive character of these tools make communication with the client easier compared to using traditional methods. Besides, mechanisms of website analysis, system of managing the relationship with the customer (CMR) and planning the resources of the company (ERP), allow the gaining of valuable information about a client's behaviour and the efficiency of running marketing campaigns. The biggest advantages of digital marketing are: • the possibility of communication with the customer by the use of various media, brands and places, • the suitable and efficient directing of the marketing transmission; • widening the circle of the recipients of our information; • a significant growth of sale, including indirect services - more expensive and luxurious; • an efficient method for the initiation of new technologies and tools; • cost cutting; • the shortening of the time needed for new products and services to be put on the market; • the growing customer activity; • better flexibility; • the enrichment of graphic content of our transmission. Development of the new technologies and innovative solutions increasing the mobility of the communication between producers and customers. That is why the 256 SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES concept of e-m-marketing6, that is: electronic-mobile-marketing, is considered more often. Space technologies, world digitization, development of broadband and highspeed Internet, direct us to the use of artificial intelligence, semantic intelligence and 3D graphics. Usage of space technology affects the changes of directions and possibilities of marketing communication. Most of the tools and services that require integration of the facts and deduction, are based on human intelligence and activity using a particular product in a particular moment. We are, however, closer to the moment, when our computer, phone or other device armed with a suitable application, will be able to answer complex questions, choosing for us interesting elements in the jungle of data. Just imagine, that going for holidays we command our car autopilot to pick the road with the most interesting, historical places with beautiful viewpoints. And this way, we can have a pleasurable journey to our destination. Or when we are looking for a new TV set, we can type into the searcher “find the cheaper model of the TV with such and such parameters”. Nowadays we need to use our knowledge to make such a search successful and satisfying. In a short time our computer will analyse information gathered on the internet databases for us and will show the best options for buying our desired TV. Successful and efficient marketing in the circumstances of the progress of virtualization and mobility, involves using new technologies, including satellite ones. As Kotler says: “The Internet will create new winners and bury the laggards”. The catalog of communication tools is getting wider, and what is most important, the majority of them are being built with the possibility of the efficient measurement of their use, which was not common till now. Enterprises are investing into information systems, that play key roles in cost cutting and gaining advantage over companies. They are organising their activities around the customer7 and to strengthen the impact on the recipient, they are integrating marketing communication. Contents, forms and media, gathered from various sources, are integrated in one place.8 So that is how a complete database, that enables the even more efficient planning of marketing activities and allowing the designing of new products, perfectly fitted to the users' needs, is being created. The Internet, along with electronic and mobile marketing, is the foundation of competition and innovation of organisation. This marketing manages a client's attention, engages him in using the particular product, makes our customer communicate to us strategic and important information about the process of sale. 6 „E-marketing” Liliana Nowak, from the monograph „Marketing – zagadnienia współczesne”, under scientific redaction of prof. dr. hab. Henryka Mruka, Forum Naukowe, Poznań 2008. 7 „Marketing”, Philip Kotler, 11th edition, Rebis, 2005. 8 „Komunikacja marketingowa – kierunki zmian” (Marketing communication – changes ‘ directions) Henryk Mruk, from the monograph „Marketing – zagadnienia współczesne” (Marketing – modern definition), under scientific redaction of prof. dr. hab. Henryka Mruka, Forum Naukowe, Poznań 2008. 257 ILONA POLITOWICZ, PIOTR MAKOWSKI, AGATA NIEDZIÓŁKA Nowadays, it is efficiency that counts the most, not only a new, different, broadcast. In the EU, the meaning of communication policy, that is the basic tool in the development of an innovative and competitive economy, is growing all the time.9 The use of the satellite techniques, and services based upon them, is oriented towards fulfilling the needs for fast and correct information for European citizens, and also as a tool that is enabling the better realisation of many policy sectors in the EU. This is why in the 2014-2020 period, the EU is planning to spend a total of €15,475 billion for space activities (3 times more than in the current financial perspective), Poland's contribution is valued at around €495 billion. Summarising, the most important goal of all processes and actions is the change of invention and ideas into innovations. It really does not matter if they will be done by planned and systematic actions, or if they will be done by taking risk and staking on a brand new solution, not proven on any grounds. Communication of the new solutions to the selected markets and potential recipients is crucial. It can highly increase the possibility of success. Nowadays, innovations should now be seen as a tool that is soothing the results of the current economic breakdown, and as solutions to the problems we are facing. Standard resources of growth are not that profitable anymore, so we should focus on problem solving and social challenges. The main goal of Polish strategy is a highly competitive economy (innovative and efficient) based on knowledge and cooperation.10. The most important element of companies' innovative activities and modern trades, is the necessity of creating an efficient system promoting relationship support, cooperation and communication between scientificresearching sectors, and companies and customers. To rise up, it needs deepened research on the effectiveness of communication methods and forms. It confirms the need for highly specialised education for human resources, to cope with the challenge of new forms and methods of space marketing. In the case of national safety, there is a need to work on the institutional forms of cooperation with ESA. Bibliography An economic analysis of the sector and the role of Policy, The Space Economy in the UK: Department for Business, Innovation and Skills, February 2010. Klaus Schwab, The Global Competitiveness Report. 2011-2012, World Economic Forum, Geneva 2011. Henryk Mruk, Komunikacja marketingowa – kierunki zmian, red. Nauk Henryk Mruk Marketing – zagadnienia współczesne, , Wyd. Forum Naukowe, Poznań 2008 r. 9 Due to the British statistics, the average productivity for one employee of the space sector stands for 142 thousand pounds per year, what means 4 times more than average in the country of U.K. (“The Space Economy in the UK: An economic analysis of the sector and the role of policy”, Department for Business, Innovation and Skills, February 2010). 10 Innovation and effectiveness strategy of polish economy, Ministry of Economy. 258 SPACE MARKETING – INNOVATIVE IDEAS PRODUCE CREATIVE TECHNOLOGIES Industry Assessment of Poland for Space Activities, Bertin Technologies, 2004 r. Jerome S Engel., Model of Innovation: Start-Ups and Mature Corporations.” Presentation. Inside Innovation, Conference. University of California, Berkeley. November 2007. Liliana Nowak, E-marketing, red nauk. Henryk Mruk, Marketing – zagadnienia współczesne, Wyd. Forum Naukowe, Poznań 2008 r Philip Kotler, Marketing, wydanie 11, Wyd. Rebis, 2005 r. Program działań na rzecz rozwoju technologii kosmicznych i wykorzystywania systemów satelitarnych w Polsce, Ministerstwo Gospodarki, 2012 r. Space and the Processes of Innovation”, ESPI Report, July 2012. .Strategia Innowacyjności i Efektywności Gospodarki Polsk na lata 2011-2020, Dynamiczna Polska, Ministerstwo Gospodarki, 2012. 259 NDU Scientific Quarterly no 4(89) 2012 MARCIN KRUPA A BEHAVIORAL MODEL DETERMINING THE IMPACT OF USA MILITARY ACTIVITY ON THE GLOBAL NUMBER OF WARS Marcin KRUPA, M.A. Uniwersytet Ekonomiczny w Krakowie Abstract The purpose of this article is to examine the relationship occurring between U.S. foreign policy, understood in terms of the military, with global processes, which is defined in terms of polemology (the phenomenon of war). The distinguishing feature of the research process is its methodology, which by its structure refers to the number of ideas positivist philosophy of science. This appeal reflected an attempt to clarify the research process, which is implemented using mathematical tools, which are used at the level of abstraction. The same methodology is an important factor distinguishing this research process, giving it the status of originality. The results of the research process as carried out the results, which show the correlation that exists between the processes marked. Key words – War, USA, Foreign Policy, Globalization, Methodology. Introduction The following scientific article has the nature of the original research process, which through its methodological structure refers to the behavioral tradition; its aim is, as the title suggests, to find a precise answer to the following question: how U.S. foreign policy affects the global number of wars? The article consists of three sections: the first defines behavioral research, and the tradition of this type of research process against the background of the historical development of the scientific discipline of international relations as a whole; the second determines the object of the study; the last, third, chapter describes the course of the research process realized and presents its results. Behaviourism in the history of international relations theory The organised research process of international relations emerged only after World War I, earlier this issue was dealt with in a loose way by thinkers of all types, especially philosophers, lawyers and practitioners of the public life. The 260 A BEHAVIORAL MODEL DETERMINING THE IMPACT OF USA MILITARY… need for an organised research process was triggered by wars getting out of control, becoming more and more destructive in nature. The scientific development of the independent scientific discipline called International Relations takes place on the basis of the so-called "great debates", the final result of which are paradigms, the construction of which are determined by the victorious theories. The first debate took place during the 1930s and 1940s; the second began in the fifties and lasted until the early seventies; the third began in the eighties; when it comes to the last, fourth, there is a significant dispute in this respect as to whether it is an extension of the third debate. The first school of international relations was established before World War I and based its theoretical structure on the scientific dimension of liberal thought. In a nutshell: international liberalism assumes that people are good by nature, so the source of war is not to be found in human nature, but in bad organisation of the system or in educational shortcomings. Thus, the phenomenon of war can be eliminated through efficient international organisations, the aim of which are to improve cooperation, not only between countries, but also between other state entities; therefore the entire system of international relations was to be based on the eurocentric culture, liberal-democratic principles and Christian morals.1 In practice, the liberal assumptions were not effective. In 1939, a famous work of the British historian Edward Carr: The Twenty Years Crisis was published, in which the author stressed the assumptions of the liberal school and questions them, and the validity of his argument was borne out by history with great precision.2 Since that time, the liberal school of that time has been referred to as idealist or utopian. The conservative thinking called classical realism began to be heard again. In 1948, a famous work was published entitled Politics Among Nations by Hans Joachim Morgenthau, in which all the principles of realism were codified and modified giving rise to neoclassical realism, which became the most important theory in the history of international relations (some scientists proclaim that only the work of Morgenthau brought International Relations into existence as an independent scientific discipline). Realism refers to human nature in a pessimistic way, focusing mainly on forcible and state centric elements, stating that the best and natural tool to ensure peace is the balance of powers.3 Morgenthau’s theory was exceptional in many respects; one of the distinctive elements of the neoclassical realism theory was the following statement: "Political 1 A. Gałganek, Geneza stosunków międzynarodowych i ich teoria, [w:] W. Malendowski, Cz. Mojsiewicz (red.), Stosunki międzynarodowe, Wydawnictwo Alta2, Wrocław 2000, p. 16-17. R. Jackson, G. Sorensen, Wprowadzenie do teorii stosunków międzynarodowych: Teorie i kierunki badawcze, Wydawnictwo Uniwersytetu Jagiellońskiego, Kraków 2006, p. 36-42. S. Burchill, R. Devetak, A. Linklater, M. Paterson, Ch. Reus-Smit, J. True, Teorie Stosunków Międzynarodowych, Książka i Wiedza, Warszawa 2006, p. 50-79. 2 E. Carr, The Twenty Years Crisis 1919-1939, Perennial, New York 2001, passim. 3 R. Jackson, G. Sorensen, op. cit., p. 42-46. 261 MARCIN KRUPA realism believes that politics, like society, is governed by objective laws (…)”.4 This statement is related to the earlier war philosophy studies realised by Quincy Wight, Pitrim Sorokin, Lewis Fre Richardson which state that social phenomena are causal, and thus repeatable, so that it is possible to recognise the objective laws and on the basis of them to ensure greater control over the course of social processes and in an identical manner to make their predictions. Thus, the work of Morgenthau, consolidating the position of realism, heralded the beginning of a new debate in which traditionalists versus behaviourists competed with each other. Researchers connected with the traditional approach in international relations draw attention to the differences separating the humanities and social sciences from exact sciences, stating that these differences require a different research methodology based on normative elements. However, the representatives of behaviourism not recognising these differences, proclaim the need to eliminate the normative element from social science, which they believe is the source of the lack of scientific progress. Thereby, traditionalism propagates the need to implement studies of a perceptual and intuitive deduction type based on the inference characteristic for philosophy combined with a free interpretation of historical processes.5 Whereas, behaviourism, which is associated with positivism and scientism, states that knowledge, even on the human and social basis, should be gained through rigorous and quantitative and inductive analysis methods based on mathematical mechanisms of empirical data processes; data should be acquired through taskonomization and quantification of history, on this basis bold hypotheses should be made and subject them to constant verification in order to develop precise definitions, of which the ultimate goal is to find universal laws governing the behaviour of states.6 Ultimately, the debate finished as suddenly as it began and ended without a conclusion, but in a sense, relatively and not unanimously behaviourism can be regarded as the winner of the debate; why? Because, since the seventies, most of the research carried out on the basis of international relations includes behavioural elements, or possibly refers to the results of this type of research. It is worth mentioning here that International Relations is an Anglo-Saxon science, and Polish research relating to international issues is scarce, and those of a behavioural methodology structure type are almost none, thereby, one of the purposes of this article is to fill this gap. The most important researchers conducting international issue research using behavioural methodology elements include: Marton Kaplan, David Easton, Stanley 4 H. J. Morgenthau, Polityka między narodami: Walka o potęgę i pokój, Difin, Warszawa 2010, s. 20. R. Jackson, G. Sorensen, op. cit., ss. 46, 54-58, 248-252, 269-282. H. Bull, International Theory: the Case for a Clasical Approach [w:] K. Knorr, J. Rosenau (red.), Contending Approaches to international Politics, Princeton University Press, Princeton 1969, p. 20-38. A. Gałganek, Geneza stosunków międzynarodowych i ich teoria, [w:] op. cit., p. 21. R. Zenderowski, op. cit., p. 56-59. 6 R. Jackson, G. Sorensen, op. cit., p. 47-49, 61-63, 243-248, 250, 253-260, 264-269, 279-282. J. E. Dougherty, R. L. Pfaltzgraff, Contending Theories of International Relations, Lippincott, New York 1971, p. 36-37. R. Zenderowski, op. cit., p. 56-59. 5 262 A BEHAVIORAL MODEL DETERMINING THE IMPACT OF USA MILITARY… H. Hoffman, Karl Deutsch, David J. Singer, Dawid E. Spiro, George Modelsky, Richard Rosencrance, John W. Burton, Kenneth Waltz, Rudolf Rummel, Melvin Small, Jack Levy, Roger Burrows, Brian Spector, Jonathan Wilkenfeld, and John Galtung. The third debate, which should be mentioned in a few words at the end of this section, finished without any conclusion; however, the research parties involved in it gave a synchronised answer on the whole structure of international issue. Nowadays, in order to better understand international relations in terms of safety, competition and war a theory of neorealism and structural realism is being used; to better understand the relationships emerging in communities, especially in the European Union, or, alternatively, the process of globalisation and peace, a number of liberal theories with neoliberalism at the forefront are used; whereas, to better understand disproportions in world development the theories of dependency are used, of which Marxism is the main foundation; moreover, for better understanding of processes ideological and cultural in character, the constructivist theories are used. The subject of the research The research process, which will be carried out below, is based on several stages. In the first stage the variables will be distinguished, the analysis of which is able to give an answer to the research question put in the introduction of the article. The variables will be distinguished basing on the realisation processes of quantification and taskonomization of data. The obtained data in the second stage, transformed to chart form showing the course of the cycle, will be juxtaposed. Already at the beginning it should be noted that the obtained data can be analyzed In several dozen ways using a number of methods of mathematical induction, but at this point these methods will not be used; the knowledge taken from the charts will be acquired freely with the help of methods closer to a traditional school. In the third stage, the acquired knowledge will be abstractly interpreted and expressed in the graphical and mathematical form. What variables are we dealing with? The first two variables are the variables of the global number of wars, and the third variable is a variable that specifies the level of the U.S. military activity. Two variables are the variables of the Correlates of War project, which have been modified from the point of view of the research question. The first variable is: "the number of new wars." The course of this variable is shown by a graph in Figure 1: 263 MARCIN KRUPA The source: Own work, made on the basis of statistical data taken from The New COW War Data 1816 – 2007, Correlates of War, <http://www.correlatesofwar.org/> (29.09.2011). Extra - State War, Correlates of War, <http://www.correlatesofwar.org/> (29.09.2011). Fig. 1. The number of “new wars” in the years 1962 – 2007. The graph is a measurement that shows precisely the number of newly created wars. The second variable is: „the number of wars being waged”. The shape of this variable shows a graph in Figure 2: The source: Own work, made on the basis of statistical data taken from: The New COW War Data 1816 – 2007, <Correlates of War, http://www.correlatesofwar.org/> (29.09.2011). Extra - State War, Correlates of War, <http://www.correlatesofwar.org/> (29.09.2011). Fig. 2. The number of „Wars being waged” in the years 1962 – 2007 264 A BEHAVIORAL MODEL DETERMINING THE IMPACT OF USA MILITARY… The graph shows the general number of wars in progress. The graphs’ differences can be presented using the following example. The VietnameseCambodian War lasted three years, i.e. 1977-1979. In case of variation: "the number of new wars" the Vietnamese-Cambodian war is recorded in the statistics only once, it takes place in 1977. However, in case of variation: "the number of wars being waged" the Vietnamese-Cambodian war is recorded in the statistics three times each year from 1977 to 1979. The last variable is: The source: Own work made on the basis of quantification of the U.S. history. Fig. 3. The military activity of the USA in the years 1962 – 2007 The chart above (Fig. 3) was developed as follows: The U.S. military activity (WUS) was divided into several types, and for each of them, basing on relative, yet logical thinking, a specific value was assigned. The individualisation takes place in a definitively distinct way as opposed to in the case of Correlates of War project and is presented as follows: CW – cold war = 1 LW – limited war = 1 FCW – full-scale war = 2 CC – „Cuban crisis” = 1 D – detente (times of positive trends in the U.S.A. - Soviet Union relations) = - 0,5 A – accumulation of the arms race under President Ronald Reagan = 0,5 265 MARCIN KRUPA The general formula in the arithmetic form is as follows: Formula 1: However, the general stochastic formula in the functional form can be presented as follows: Formula 2: Commenting on the above formulas some facts are noteworthy: The cold war (CW) was characterised by tension variation, which has been presented as a constant numerical base (1), as well as a number of variables distinguishing specific time periods, such as: the cuban crisis (CC = 1), detente times (D = - 0.5) and the accumulation of the arms race (A = 0.5), which determine the evolution or the fluctuation of the phenomenon. As for the first variable: the cuban crisis was the event which constituted the essential accumulation of the cold war tension, therefore it became essential to assign values (1) to the event, so that in combination with the cold war value, the sum of the cold war in the period of the year 1962 is (2). Another variable: detente, determines the times of reduction of the cold war tension. Some historians state that this process began in 1963, right after the cuban crisis had finished, however it is possible also to divide this period into specific time sequences (certainly the years 1972- 1973 are the most stable times in the discussed period). For the purposes of this study, it is assumed that the time of detente was not until 1969, when the U.S.A. under the leadership of Richard Nixon joined the talks with the Soviet Union on the limitation of strategic arms: Strategic Arms Limitation Treaty (SALT I), the treaty was signed in 1972. The detente period certainly ends in the last month of 1979 when the Soviet Union intervened in Afghanistan. In case of the last variable, namely in the accumulation of arms issue, since 1962 the process took place only at a time when US foreign policy was managed by the administration of Ronald Reagan. This value can also be assigned to the events of the announcement of the Truman Doctrine (1947), until the death of Joseph Stalin and the end of the Korean War (1953), however, this period is not the subject of this scientific research (the variable CC is equivalent to the variable A, yet, it takes a higher value due to the historical status of the event). A few words in terms of the remaining variables: Limited war (LW), is a war in which the U.S.A. in a direct way used their armed forces at a relatively low level, which is not included in a definition of war in the Correlates of War project (the wars not included in this definition are classified as conflicts). These wars are the interventions of small range. This category includes interventions in the following countries: Dominican Republic 1965, Grenada 1983, Lebanon 1985,7 Panama 7 Taking Lebanon into account is mainly due to heavy casualties (241) incurred by the U.S. in this mission, which was the result of a terrorist attack. 266 A BEHAVIORAL MODEL DETERMINING THE IMPACT OF USA MILITARY… 1989, Somalia 1993, Haiti 1994, Bosnia i Herzegovina 1995, Iraq 1998, Sudan 1998, Yugoslavia 1999. All the cases mentioned above have an assigned value (1).8 The last group of variables is a full-scale war (FSW). In the years 1962-2007, there have been three such wars, one of them currently continues in Afghanistan (estimated time of completion of the mission is 2014), and the second was concluded less than two years ago (2010 is the official date of completion of military operation in Iraq). Apart from them, the United States since 1962 on such a large military and political scale were only involved in the Vietnam war (19651973). Wars of this type, with regard to the involvement scale, has been assigned the number 2. The last issue that should be raised is the one of American involvement in Vietnam in the years 1962-1964. In this period of time, in Vietnam, the U.S.A. were engaged with two kinds of battle groups, the military advisers were the first and the units of special forces so-called "green berets" were the second battle group. Moreover, with the help of citizens of other Asian countries, with the CIA’s money, the U.S.A. conducted subversive warfare on limited scale in the North Vietnam, which is why this period of time is considered as a period of limited war (LW). The analysis Fig. 4. Comparison of variables relating to the U.S. military activities (WUS), new wars (WR) and ongoing wars (WT). The yellow line on the graph determines the level of five wars; the black lines that are undersigned, identify major historical events on the timeline 8 For greater precision and clarification it should be noted that the U.S. intervention in Somalia began in the late 1992 and finished in early 1994. In this case, the widening and statistical formulation of intervention in Somalia in the years 1992-1994, when the essence of the operation was completed in 1993. 267 MARCIN KRUPA The above chart compares all of the variables in order to analyse them. What strikes the eye in the first place, is the fact that during the war in Vietnam the number of new wars (NW) was no more than five and begins to increase only after the U.S. withdrawal from the country. At this point, the number of ongoing wars (WT) is also stable, the two variables begin to increase rapidly only when the U.S. Army withdraws Vietnam completely; so that in 1968, when the U.S. was most militarily involved, the number of new wars was 2, and those ongoing 13; however, in 1975, when the U.S.A. suffered a clear defeat in its Vietnam policy, the number of new wars was 8, and ongoing 19! Another fact worth mentioning is the so-called period of "little cold war", i.e. the ultimate end of detente between the blocs in the Cold War relations and the strengthening of mutual competition which started with the Soviet intervention in Afghanistan. The period of accumulation of new Cold War struggles fell between the years 1980-1985, after which it began to diminish, and finally, what is not evident in length of the black line, but is demonstrated by the first black vertical line, led to the defeat of the USSR. Before the start of a new race of arms, in 1978, the number of new wars was 9, and those ongoing 21; in 1985, in the moment of accumulation, the number of new wars was 1, and ongoing18! Another fact worth mentioning is the existence of two vertical black lines determining the changes in the international system, which automatically transformed from a bipolar to unipolar world. The transformations taking place in the structure of the international system manifest themselves in the form of a significant increase in the number of wars: in 1989 the number of new wars is 9, and those ongoing as many as 24! In 1991, the situation is even worse, the number of wars which began in this year is 11, and those ongoing is close to the magic number of 27! At this point, a positive effect of the U.S. involvement in Iraq is very apparent - or, alternatively, it is possible to construct a hypothesis stating that the unipolar system is more stable – after which the number of wars falls at a very fast pace. In 1995, the number of new wars was 2, and the ongoing a year later only 15. The final element worth attention is the increased, and unnoticed so far, very high level of U.S. military activity, which was initiated by terrorist attacks on the main buildings of world finance taking place on 11 September, 2001. In the same time, the Americans intervened in Afghanistan, and less than two years later in Iraq. In the last year of the research period (2007) the number of wars fell to its lowest level in history, with only one outbreak of a new war, and only two taking place. There is still one last noteworthy fact: in 1973, when the U.S.A. withdrew from Vietnam, systematically the number of ongoing wars was growing, which could be interpreted In the form of two hypotheses: the first one - the wars underwent extension due to an increase of participation in them of powers (balancing of military capabilities, unwillingness to compromise) - this hypothesis can be confirmed on the basis of detailed studies of political science; the second one - an increase in the number of wars was the result of the decrease of U.S. military involvement, which will be confirmed by two facts: the first one, that the 268 A BEHAVIORAL MODEL DETERMINING THE IMPACT OF USA MILITARY… war in the Persian Gulf, after the end of which after five years the number of wars decreased by nearly 50%; the second one is the fact that Americans in the research period of 1962-2007 were involved at a very high level only twice, during the Vietnam War and during the currently still ongoing global war on terrorism, and in those periods the level of the number of ongoing wars is very low. Thus, one can put the following research hypothesis: At a time when the United States conduct an offensive foreign policy (they are more active militarily), the number of wars in the global sense decreases; however, if the United States conduct a defensive foreign policy (military activity level decreases), the number of wars in the global sense increases.9 Thereby, the induction phase of the research was completed, the aim of which was to gather relevant knowledge. The second phase will consist in the deductive attempt to arrange the acquired knowledge. It is possible to present the principle of the remarked processes in the following mathematical-graphical way: Formula 3: Fig. 5. The above graphic-mathematical model is a reflection of the hypothesis course summarising the course of the inductive research process. The n1 value corresponds to the equilibrium. The U.S. military activity (WUS) is a dominant variable, which determines the course of the process, when this variable increases, the global number of wars (GW) decreases (n2), and vice versa (n3) 9 The above hypothesis is even more apparent when from the global number of wars one will subtract the war with the participation of the U.S.A. (GW – WUS). 269 MARCIN KRUPA The above process is far more complex, because the level of U.S. military activity is not determined by the usual "will", but as Morgenthau would state, it is determined by the objective laws. Thus, the above model should include another variable, which is the self-shaping stability of the international system structure, which affects the global number of wars and the level of U.S. military involvement, which is accurately presented by the models below. Formula 4: Fig. 6. The above graphic-mathematical model constitutes an a-priori element, which enforces the need to incorporate elements that go beyond the scope of bilateral relations occurring between the level of U.S. military activity (WUS), and the level of the global number of wars (GW). An additional element is necessary to take into account the spontaneously emerging international system instability level (PNSM). In the model, it is assumed that the level of U.S. military activity is rigid and thus the level of the international instability has a tendency to rise spontaneously, which is proportionally related to the increase in the global number of wars 270 A BEHAVIORAL MODEL DETERMINING THE IMPACT OF USA MILITARY… Formula 5: Fig. 7. This model is a continuation of the above (Fig. 6), except that it assumes a-priori that the U.S. military activity (WUS) is flexible and reacts in direct proportion to changes in the level of international stability (PNSM). Therefore, an increase in the international instability (R2) automatically forces an increase of American interventionism, and vice versa. This means that WUS is no longer a variable determining the course of systemic processes, however still plays an important role, which is clearly shown in details of drawings below 271 MARCIN KRUPA Formula 6: Fig. 8. The chart above is a continuation of the model contained in Figure 6, assuming an additional change in the level of rigidity of the U.S. commitment to restore equilibrium 272 A BEHAVIORAL MODEL DETERMINING THE IMPACT OF USA MILITARY… Formula 7: Fig. 9. The chart above is a continuation of the model contained in Figure 6, taking into account the additional increase in U.S. military involvement in order to restore the equilibrium level 273 MARCIN KRUPA Formula 8: Fig. 10. The drawing along with the above formula summarises the structure of the whole model, showing in general terms what level of U.S. military involvement (WUS) is necessary in order to maintain the number of wars (GW) on the level of equilibrium, with the changing circumstances of the international system stability (PNSM) Conclusion The empirical analysis presented in the introduction of the third section of this scientific paper highlighted three facts: 1) An increase in U.S. military activity precedes a reduction in the number of global wars. 2) A decline in U.S. military activity precedes an increase in the global number of wars. 3) The gradual collapse of the Soviet Union happens steadily along with the increase in the proportion of the global number of wars. On the basis of the observed regularity a formalisation of the acquired knowledge was made. Figure 5 presents the first two points of the research 274 A BEHAVIORAL MODEL DETERMINING THE IMPACT OF USA MILITARY… conclusions, and the other figures take into account the elements of the naturally emerging international system stability (Fig. 6, 7, 8, 9, 10). The same general model, which has been formed on the basis of the basic tendencies observed, gradually takes the form of a model presenting the multifactoriality of mutually overlapping processes interacting with each other in a constant process of dynamic interaction. The inductive research sphere can be expanded in a meaningful way using a number of methods of arithmetic mathematics (statistics, econometrics, calculus of probability [probabilistic analysis], etc.); the deductive research sphere can also be expanded using a number of methods of formal mathematics (algebra, logic, geometry, differential calculus, etc.). Many elements of the research process outlined above require the use of detailed political sciences analysis. To synchronise and expand, the whole research process is able to bring into existence a new quality of international relations theories (there are many behavioural theories of international relations, such as "the field theory" or "the systems theory"). Referring the results of this research process to individual conclusions coming from a number of currently existing theories, at this stage of the study one should be somewhat careful; although it is possible to argue that the presented statistics challenge the neo-realism thesis that the bipolar system was far more stable,10 it is simply on the contrary, since 1991 there has been a continuous decline in the global number of wars (the arithmetic mean: 1962 – 1991 WT = 16,5 / 1992 – 2007 WT = 15,1; 1962 – 1991 WR = 4,2 / 1992 – 2007 WR = 3,9). The theoretical construction of conclusions coming from the conducted research process is as follows: If the United States increase their level of military activity and thus begin to conduct a more active foreign policy, it causes the reduction of the global number of wars; whereas, if the U.S.A. reduce their level of military activity and thus their foreign policy becomes more regressive, the global number of war begins to rise (model fig. 5). Referring to the theory of neo-classical realism, which says that the United States conduct a particular foreign policy, the above statistics can not distinguish whether the increase in the level of international instability causes an increased U.S. military activity, this element would have to undergo some detailed political science analysis; in terms of modelling, it is evenly assumed that an increase of international instability contributes to the autonomic growth of U.S. military activity (Fig. 7,9), and apathy is also assumed in this respect (Fig. 6,8). The overall conclusion of the model is such that U.S. military activity reduces the level of instability in the structure of the international system, but there are circumstances in which there may occur an increase of U.S. military activity and global instability of the system (an assumption that with the increase of instability of the international system there has been an increase of the level of 10 K. Waltz, Theory of International Politics, Addison-Wesley Publishing Company, Mass 1979, p. 161-193, 195, 204. 275 MARCIN KRUPA threats to the U.S. priority interests at the point of which the country responds with military means), for to restore the previous state of equilibrium in such a situation (ie, the pre-growth state) the U.S.A. must increase the level of its military activity above the level already state during the period of equilibrium. In a Real dimension the course of these processes may be present as follows: if the attack of Saddam Hussein’s Iraqi troops on Kuwait in 1990 resulted from the collapse of the weakening position of the USSR (Iraq was an ally of the Soviet Union, and the Soviet Union had instruments of influence on the behaviour of its allies), then the level of system stability was restored by the decisive U.S. military response. The analysis of political science have no direct connections that would link those events with the weakening position of the Soviet Union, so this example has only a theoretical dimension, however, this example shows great possibilities of behavioural analysis that can help in noticing numerous regularities, schemes and tendencies in international relations, which a humanistic historical analysis is not able to make. Therefore, in order to increase the scientific progress on the ground of international relations, it is worth combining the traditional and behavioural research methods. 276 FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS NDU Scientific Quarterly no 4(89) 2012 EXPERIENCE FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS Anna MILER, Ph.D. Akademia Marynarki Wojennej Abstract Civil-Military Cooperation was a new experience for NATO militaries. It functioned as a part of a peace mission for allied military forces in Bosnia and Herzegovina. CIMIC is operated as part of the international military powers under the command of NATO, as well as among civil international and non-governmental organisations and miscellaneous military powers who are part of the conflict. The main goal and responsibility of CIMIC was placing statements for common cooperation in order to expand and sustain full cooperation between civil population and institutions. It was also responsible for creating suitable cooperation conditions between civil and army institutions on each level. It was achieved through assistance of civil representatives of humanitarian organisation in the area of a mission. A wide range of tasks was realised by around 350 highly skilled, civil and military staff members. Thanks to their work CIMIC was established. In order to form a positive image of soldiers CIMIC created Civil-Military Cooperation units, that were responsible for law advisory and support within humanitarian and economic projects. The efficiency of CIMIC in Bosnia and Herzegovina appeared to be very good, this was confirmed by the army which reported a stable situation. Good results of CIMIC are shown also by a successfully cooperation with international organisations, that were represented by a well qualified personnel, as well as good relations with local governments and the wider population. Key words – Civil-Military Cooperation – CIMIC, Bosnia and Herzegovina, Implementation Force – IFOR, Stabilisation Force – SFOR, CIMIC House When military force face problems concerning the political, social, moral or legal, economic and humanitarian aspects of operations the army must count on civil help. Circumstances force military forces and the civilian sides to start 277 ANNA MILER cooperation. Such a situation took place in the peace operation in BosniaHerzegovina led under the supervision of NATO. It was possible to notice negative effects of the civil war in former Yugoslavia directly after the truce; above all by the infringement of the structure of civilian authorities, the fall of the economy, ethnic riot, many homeless and refugees, as well as a common breaking of human rights. It has involved many civilian international and non-governmental organisations bringing humanitarian aid and help in the political and social reconstruction of the economic infrastructure. In Bosnia-Herzegovina the experience of three ethnic groups complicated the structure of the cooperation (Muslims, Serbs, Croats). However, Civil-Military Cooperation is a tool, which appropriately used, might in certain situations help with achieving military success without using military forces. CIMIC is based on two groups of principles, seen from the side: 1. Military action including: precedence of military purposes of the mission, direct commanding (the commander is answering for directing and carrying out CIMIC action) and responsibility of the commander for the civil effects of military action, economics of using own human resources and material. 2. Civil-military relations among which we point out: civil benefits, common objectives, consenting to working on the part of civilian organisations, humanisation of taken action, their transparency and understanding cooperating with civilian organisations1. In order to understand well the usage of the Civil-Military Cooperation involved in the operation in Bosnia-Herzegovina we should present the definition which evolved and changed over several decades. The project of NATO CIMIC doctrine (AJP-9), which came into effect in 2003, defines CIMIC in the following manner: the coordination and the cooperation of the commander of NATO with the civilian population, international and local authorities and organisations and international, domestic and non-governmental agencies, led as support for the completion of the allotted task2. On the other hand in the North Atlantic Treaty Organisation the Civil-Military Cooperation is defined as a set of means and arrangements supporting cooperation between commanders of military forces and local military and civil authorities (regional and local) and local people in areas where NATO forces can be found or are planned to be deployed3. The CIMIC abbreviation which means Civil-Military Cooperation is not only recognisable in the military environment, but also amongst civilians, and defines 1 S. Olszewski, Współpraca cywilno-wojskowa, w Bośni i Hercegowinie, Wojsko i Wychowanie, nr 5, Warszawa 2002, s. 109-110. 2 Doktryna Współpracy cywilno-wojskowej (CIMIC) NATO AJP-9 [w: Zbiór Dokumentów Normatywnych NATO w Zakresie CIMIC], Dowództwo Wojsk Lotniczych i Obrony Powietrznej, Warszawa 2003, s. 45. 3 M. Wojciszko, Uwarunkowania organizacyjno-prawne związane z kierowaniem obronnością państwa w ramach Współpracy cywilno-wojskowej, Wiedza Obronna, nr 3, Warszawa 2007, s. 38. 278 FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS the new speciality in the army. Understanding CIMIC as a function, rather than as a specific type of military is very important. The widely understood cooperation with international and non-governmental organisations, as well as civilian authorities means that it has a long tradition. It has been in its current form from the 1990s. The schemata of CIMIC is illustrated in figure 1.1. CIVIL-MILITARY COOPERATION CIVIL STREFA COOPERATION WSPÓŁPRACY ZONE MILITARY COMPETENCE Źródło: J. Gołębiewski, Współpraca cywilno-wojskowa, Myśl Wojskowa, nr 5, Warszawa 2005 Fig. 1.1. Schematic illustrate of Civil-Military Cooperation The concept of Civil-Military Cooperation which was approved by NATO, was built on the basis of experience of the assembled company in the result of actions of American individuals to civil cases, in addition the functioning of French, British and Dutch units considerably elaborated this concept and improved it.4. Establishing and keeping the full cooperation of the civilian population and acting institutions in the area where operations are conducted is a crucial objective of Civil-Military Cooperation. The cooperation is aimed at ensuring conditions for taking back the greatest moral, financial and tactical benefits possible, both for civilians as well as servicemen5. In the stated time it is possible to divide CIMIC action into two kinds of purposes: short and long-term. Freeing the local infrastructure from military-civil conflicts and sustaining cooperation among armies of NATO can be a short-term purpose, with the civilian population, as well as organisations and institutions. Checking needs as part of basic services and the humanitarian aid for civilians. Creating and keeping conditions which are a base, is a long-term objective of durable solutions and agreements of cooperation in contingencies. 4 S. Olszewski, Współpraca …, s. 109. W. Wójtowicz, Współpraca cywilno-wojskowa w operacji pokojowej w Bośni, MON, Warszawa 1998, s. 16-17. 5 279 ANNA MILER Civil-Military Cooperation in institutionalised way was used for the first time in Bosnia-Herzegovina by armies of NATO. In this area CIMIC mattered greatly in operations conducted through IFOR – Implementation Force of NATO and SFOR – Stabilisation Force of NATO, being an integral element of activity on all rungs of commanding, as well as with subject of planning and training. Civil-Military Cooperation conducted during the IFOR operation required cooperation between political and military activity. Help and assistance given to commanders of NATO is a base for CIMIC operation. The effectiveness of those kinds of undertakings was ensured by arranging the factor dealing with CIMIC on individual rungs in the command structure. On the central level J-9 and appropriately into the G-5 hole and S-5. CIMIC supports the activity of remaining organisational units through: – coordinating official announcements having a primary importance for public affairs; – supporting the information campaign; – providing consultation for the legal chapter in matters of legal aspects of agreements, memoranda or investigating complaints; – coordinating preparations of expert analyses and studies for the purposes of commands in political issues and the Civil-Military Cooperation; – transmitting data for making plans for the next stages of the operation; – ensuring contacts between the local government; – providing important information from a point of view of security and protection6. The Civil-Military Cooperation during the peace enforcement/keeping operation in Bosnia-Herzegovina was established in 14th of December 1995 in the Paris Agreements on military aspects of establishing the peace on areas of BosniaHerzegovina (Dayton Peace Agreement). This agreement contains the plan of international intervention by others in the conflict in Bosnia-Herzegovina. It divides operations in this country into two sections: – military, carried out by a coalition of states under the direction of USA, exploiting the NATO structure (IFOR/SFOR); – civil carried out by OBWE7. In the mandate of the mission they determined: a legal bases of activity, the objective of the mission, the duration, tasks and contractors8. The document from Dayton became a main aspect of undertaking activity in this area in view of military forces as well as civilian international organisations. The civil part of the 6 W. Sąsiadek, Doświadczenia w zakresie CIMIC na przykładzie Bośni i Hercegowiny [w: Współpraca cywilno-wojskowa, materiały z konferencji naukowej zorganizowanej w Departamencie Społeczno – Wychowawczym MON w dniu 23 marca 1999], MON, Warszawa 1999, s. 15. 7 L. Bagiński, C. Marcinkowski, Współpraca cywilno-wojskowa w operacjach pokojowych, AON, Warszawa 2000, s. 45. 8 Współpraca cywilno-wojskowa Polska – NATO, cz. 1 – studium analityczne, red. M. Drost, AON, Warszawa 1999, s. 76 280 FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS agreement governed the cooperation among military forces, the civilian community of parties to the conflict and the relation with the international community. The Implementation Force – IFOR acted by virtue of the UN Security Council Resolution No. 1031, 15th of December 1995 based, on the provisions included in decisions of chapter VII of the charter of the United Nations. On the 16th of December NATO started, along with multinational forces (IFOR), the operation under the code name "Joint Endeavour". Further to this, the Stabilisation Force – SFOR was a multinational force mandated by UN Security Council Resolution No. 1088 on the 12th of December 1996. Both IFOR and SFOR forces were authorised to apply the military aspects of the Dayton peace agreement. SFOR Forces, as well as IFOR, acted according to chapter VII of the United Nations Charter. IFOR forces were organised on the basic of NATO’s command structure. It was a practical test of the organisation concept and made use of the Combined Joint Task Force (CJTF) structure. These forces consisted of separate naval and air forces components as well as a land forces component. The Land forces component included three multinational divisions and the Rapid Reaction Force brigade along with fighting support and force protection units. Individual Member States were assigned to make-up these forces, partner states participating in the program also included states from the NATO Partnership for Peace, as well as other states from outside this program. The whole of IFOR amounted to about 60 thousand soldiers9. On the other hand, SFOR forces, allotted to the purpose of the execution of tasks, made up about 30 thousand soldiers, which constituted about half of IFOR forces. On this basis the Dayton agreement was guaranteed by parties to the conflict, but enforced by the action of IFOR forces. The numerical strength of SFOR was lower and it concentrated on implementing decisions put in force in the annexe to the Dayton peace agreement through: – stabilisation of the agreement between parties to the conflict and the creation of an environment for safety, in which national and the local government and international organisations were able to perform their tasks without obstacles; – providing support for other organisations (as part of the Civil-Military Cooperation, considering the criterion of the reduction in forces in the area of the operation)10. In the IFOR combined joint task force, according to principles of conducting the operation of supporting the peace, a unified chain of command was introduced, as well as planning and organising action according to procedures NATO. The General military forces were in the hands of the Supreme Allied Commander in 9 F. Gągor, K. Paszkowski, Międzynarodowe operacje pokojowe w Doktrynie Obronnej RP, MON, Warszawa 1998, s. 163. 10 Zgrupowania taktyczne wojsk lądowych w operacjach wsparcia pokoju, red. A. Bujak, AON, Warszawa 2004, s. 60-61. 281 ANNA MILER Europe (SACEUR): General George Joulvan. Admiral Leighton Smith was appointed to the position of the first IFOR commander (COMIFOR). The commander-in-chief of allied powers in South Europe (CINCSOUTH), and MSC AFSOUTH became a parent command for the command of multiethnic connected powers. In July 1996 to the COMIFOR position admiral Joseph Lopez was appointed, however, in November, when the command of IFOR forces was subordinated to the Allied ground forces of Centre LANDCENT Europe Gen William Crouch became a commander, who was replaced in July 1997 by Gen Eric K. Shinseki11. For Forces of the Alliance a realisation of the civilian side of the plan, consisting of implementing the peace process in Bosnia-Herzegovina, was a new experience. IFOR forces enabled the strong support of civil tasks in the area of restrictions, which was an effect of the mandate and the available resources. During the execution of tasks IFOR forces closely cooperated with: – Office of the High Representative (OHR); – International Police Task Force (IPTF); – International Committee of the Red Cross (ICRC); – World Health Organisation (WHO); – World Food Programme (WFP); – United Nations High Commissioner for Refugees (UNHCR); – European Community Monitor Mission (ECMM); – Organisation for Security and Co-operation in Europe (OSCE); – International Criminal Tribunal for the former Yugoslavia (ICTY); – and many other organisations, including over 400 non-governmental organisations12. Tasks of IFOR forces consisted of protecting these organisation by providing: – temporary accommodation; – medical evacuation; – repair and evacuation of equipment; – transport services; – information about the safety state; – consultation and many other logistic services13. As part of the Civil-Military Cooperation a wide range of tasks were carried out by 350 persons of the civilian and military staff. Amongst all the things carried out by IFOR forces in the command on the tactical and operating level there ranked among them: – the command of multinational connected powers; – the command of individual components; – the command of individuals included in their composition. 11 Tamże, s. 57-58. J. Knetki, B. Panek, J. Trembecki, Operacje wsparcia pokoju w teorii i praktyce sztuki operacyjnej „Pokój”, AON, Warszawa 2002, s. 129. 13 Tamże, s. 130. 12 282 FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS The Group consisted of qualified staff in different fields, among others teachers, lawyers, specialists from public transport, economists, farming specialists, and engineers. They were a CIMIC part of a team which provided the consultation, as well as the technical support and the coordination of tasks undertaken by a lot of working parties and the committee, as well as nongovernmental organisations and civil and local authorities with the IFOR build-up. Multilateral education of the civilian CIMIC staff and them experience, as well as the acquaintance of organisational structures of armies affects work in the area of reconstruction, repatriation and the extension of democracy in the area of action. The commander of NATO and IFOR has set duties for CIMIC, but one of the main tasks in the beginning of the operation was keeping a wide spectrum of forces concerned with clarifying assumptions of the organisation. Preventive work associated with de-mining the area was also an important task. Being afraid of mines, parties to the conflict communicated to CIMIC units descriptions of locations where there were unfired rounds, explosives, mine traps, minefields, wire-wound entanglements which can expose to danger the civilian population staying in this area as well as NATO forces. IFOR forces were established in order to provide assistance to parties of the conflict while implementing a peace agreement. According to this document, in the IFOR military task were: – guaranteeing the continued following of the cease-fire agreement; – guaranteeing the withdrawal of fighting armies from the agreed area of separation to their appropriate territories and making a division of fighting armies; – creating conditions for the safe, efficient and fast withdrawal of armies of the UN which weren't subordinated to the NATO operation14. as well as: – ensuring the defence and the freedom of movement for IFOR branches in the mandated area; – supervising the borders and separation zones between parties of the conflict; – creating airspace control above Bosnia-Herzegovina and of migration of branches of servicemen in principal areas of communications trails; – appointing a joint military committee to work as the main IFOR representatives in contacts with the sides of the peace treaty15. According to the peace treaty they entrusted the Implementation Forces also with setting up the protective conditions for the functioning of humanitarian organisations and of the realisation of non-military aspects of the peace treaty: 14 Umiędzynarodowiony konflikt wewnętrzny, red. J. Pawłowski, A. Ciupiński, AON, Warszawa 2001, s. 69. 15 P. Piątkowski, Operacja IFOR „Wspólny wysiłek” w Bośni i Hercegowinie, MON, Warszawa 1996, s. 9. 283 ANNA MILER – to provide assistance to ensure safety in order to accomplish non – military aspects of a peace treaty, including conducting free and democratic elections in Bosnia-Herzegovina; – support the United Nations High Commissioner for Refugees and other international institutions, also in performing their humanitarian missions by providing them with freedom of movement; – to give help with supervision and the law enforcement, for free movement of the civilian population, refugees and migrants; – to supervise clearing the area of mines in Bosnia-Herzegovina16. In view of various projects and after just enough progress in the peace process they created, Coordination Centre for Civil-Military Cooperation, which tasks were based on: – monitoring civilians’ humanitarian needs; – establishing and keeping in touch with the civilian, military local government and local and international police (IPTF); – checking the compliance of political-military and social events with regards to the spirit of the “Dayton Agreement”; – of coordinating, government and non-governmental meetings of international organisations17. The effectiveness of CIMIC undertakings was guaranteed thanks to the inclusion of all of the operational commands dealing with the coordination of activities connected with the military specificity, into a structure of everyone concerned with actions of a civil meaning. The performed tasks of with organisational units included: – ensuring permanent contact among the local government and civilian organisations in the realisation of concluded agreements; – passing an information for security and protection to the interested parties; – coordination of public announcements in issues having a primary importance for public affairs; – supporting the information campaign and creating a positive image of the armed forces being involved in a mission; – ensuring the technical help in investigating legal aspects of agreements, memoranda, and complaints; – coordination of preparations of expert opinions, analyses and studies for needs of the command in the Civil-Military Cooperation and political areas; – participation in the data preparation for making plans for next stages of the peace support operation18. 16 Tamże, s. 9. A. Jóźwiak, C. Marcinkowski, Wybrane problemy współczesnych operacji pokojowych, AON, Warszawa 2002, s. 91. 18 Tamże, s. 93-94. 17 284 FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS In order to provide the ability to execute tasks which were a consequence of Civil-Military Cooperation, SFOR developed operational procedures which in detail showed the duties and obligations of all participants of the peace process. They were: – keeping impartiality in every situation and every place; – a prohibition of having weapons and ammunition; – a prohibition of having hidden filming and tracking; – right to use emblems of the Red Cross and the Red Crescent; – right to use the protection of SFOR; – possibility of getting arrested by SFOR for everyone who is committing an offence, crime or is preventing forces from performing their tasks19. The knowledge of procedures is a condition of the effective action of civil employees. What is very important, form safety point of view and the possibility of completing tasks as part of CIMIC is having and carrying a weapon. Depriving the civilian staff of humanitarian and non-governmental organisations of the right to carry weapon in the area of Bosnia was very advantageous. In such situation it isn't possible to treat them with hostility, because they are perceived as unarmed people. The usage of military forces in a peace support operation needed the wide cooperation of military authorities and civilian communities, that were building the quota of peacekeeping forces including representatives of the local authority. It was also important that SFOR had the right to stop everyone who was preventing peacekeeping forces from accomplishing their mission20. The Stabilisation Forces of NATO was based on the same principles of using force (ROE)21 as IFOR. Its essential responsibility was strengthening peace and safety. Its detailed tasks were: – stopping and preventing a renewing of hostilities shares by parties to the conflict; – continuing the achieved results of IFOR forces, and creating the climate in which the continuation of the peace process would be possible; – providing support for civilian organisations, in the framework of CivilMilitary Cooperation22. Civil-Military Cooperation is carried out by the military and civilian staff performing their tasks in established full-time structures which are found at the operational and tactical level23. In this aspect coordinated arrangement of the staff is important, above all volunteers: representatives of various organisations that can 19 C. Marcinkowski, L. Bagiński, CIMIC w wybranych misjach humanitarnych i pokojowych, Przegląd Wojsk Lądowych, nr 1, Warszawa 2001, s. 91. 20 W. Wójtowicz, Współpraca cywilno-wojskowa na przykładzie operacji pokojowej w Bośni [w: Współpraca cywilno-wojskowa – konferencja], AON, Warszawa 1999, s. 14. 21 Rules of Engagement, 22 Operacje wsparcia pokoju w teorii współczesnej sztuki operacyjnej „Wsparcie pokoju”, red. W. Kaczmarek, AON, Warszawa 2002, s. 23 W. Sąsiadek, Doświadczenia w zakresie CIMIC …, s. 12. 285 ANNA MILER be useful in excluding many incompatibilities of arrangements which may occur in the initial period of a mission, as well as, prevent the doubling of manpower tasks. Forming conditions for effective action for completely unarmed people can be a significant element affecting their successes. It has a great impact on the effectiveness of the staff involved in a cooperation. They also have cultural differences in civil-military relations, from which most noticeable are: – fundamental values are a base of motivation for bringing help to (…); – the organisational structure of military forces and non-governmental organisations is naturally different, in addition the structure of the second one is always unique (…); – as a consequence of structural differences the decision making and the execution of tasks are also burdened (…)24. At the beginning, especially on the central rank, Americans were CIMIC employees, representatives of other states constituted 45%. As a result of trainings conducted by SHAPE NATO was able to send more staff into the specific area of action. With the purpose of accomplishing the trainings, they have set up a group of international instructors who started training candidates (officers) to positions in the CIMIC structure in Bosnia. Trainings that were carried out were based in facilities at a Training Centre belonging to the 7 the Army of USA in Germany. 25 Obtaining the approval of local authorities to arrange the group of people to become representatives was the next important factor for the organisation. It was about helping the local community. The approval to start operations in the area of operations is essential regardless of the mandate of international forces. One should obtain permission for each individual or, in case of its lack, to show the readiness for action as a member of an official operating organisation. In the middle of 1997 a need to specify areas of common functioning of the civilian and military division arose. CIMIC worked accurately to fulfil the needs of the army, performing mainly objectives of military powers which fulfilled important tasks of the support and the peacekeeping mission. Orders given by the Supreme Commander of Allied Forces in Europe – SACEUR – for the purposes of the operation in Bosnia-Herzegovina presented areas of functioning of the armed forces. Tasks were performed with respect to the coordination of efforts of civilian and military forces, functioning in the common space of a peacekeeping mission. In this way they achieved the function of widely protecting CIMIC in conflict, which is described in the 1.2 picture. 24 25 286 W. Wójtowicz, Współpraca cywilno-wojskowa …, s. 9-10. W. Sąsiadek, Doświadczenia w zakresie CIMIC …, s. 16. FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS Civilian Population Join Force CIMIC Non-Governmental Organisation Politicians Military Subbranch Civil Defence International Organisation State Administration Territorial Defence Źródło: Międzynarodowe operacje pokojowe, red. D. Kozerawski, AON, Warszawa 2003 Fig. 1.2. Areas of Civil-Military Cooperation within the framework of a peacekeeping mission This is why the fundamental meaning for peacekeeping in the area of conflict is: – establishing and sustaining good relations with civilians, institutions and organisations in order to demonstrate legal aspects of mission, supporting the freedom of movement, minimising threats to the staff of the mission; – coordinating, helping and supporting, and also providing technical assistance in restoring democratic government institutions, in the reconstruction of the necessary infrastructure, the judicial system and activity of police. Also providing populations with agencies, organisations and international institutions of employment and the essential economic activity; – assisting the high representative and other international institutions, agencies and organisations in creating essential conditions to enable civilian authorities to continue the implementation of the agreement after the reassignment of SFOR from the mission26. 26 W. Wójtowicz, Współpraca cywilno-wojskowa na przykładzie operacji pokojowej w Bośni [w: Współpraca cywilno-wojskowa – konferencja], AON, Warszawa 1999, s. 29-30. 287 ANNA MILER There was a possibility of specifying three phases in the preparation process in such a system of cooperation: – preparatory – where as part of preparing the contingent of forces, potential undertakings of the cooperation are being planned. They effect the preliminary training, they acquaint the staff with the premises of the mission, also they are seek specialists from determined fields; – implementation of the mission – establishing contact, the starting point and the development of cooperation, coordination of undertakings, keeping in touch, the transmission of information; – transitional – ensuring conditions for the gradual withdrawal of stabilisation forces and handing over to the local community the full liability for completing the peace process27. The military power presented by SFOR forced parties of the conflict to find peaceful solutions. At the same time it showed the need for mutual cooperation, also the local Civil-Military Cooperation. Moreover, it created conditions for the gradual withdrawal of international military forces from the area of conflict and the handing over to the local authorities the responsibility for peacekeeping28. An advantage of being bart of an international funded operation was that the Civil-Military Cooperation units in Bosnia-Herzegovina were able to use so-called CIMIC House (houses of the Civil-Military Cooperation) and information-press service. The duty of both structural and organisational factors was highlighted while creating the positive image of the mission, soldiers of SFOR and the meaning of the political-military transformations which were occurring. The idea of creating the CIMIC House appeared in the second half of 1997 as an element of changes to the mission. SFOR was changed from a military to a more civil focus, also there was a wider opening for the cooperation with the local government and the population. The first CIMIC House was opened on 1st of April 1998 in Doboju in Nordic-Polish zone of the brigade. Their main duties were: – creating positive image of SFOR soldiers; – being seen as an information centre working in two directions; – supporting the economic assistance in drawing up the proposal for plans of humanitarian projects; – running the bank of ‘to do’ matters; – support and legal consulting for the local government29. At the end of year 1998, 12 organisations were operating in BosniaHerzegovina, 14 international organisations, 14 governmental organisations, 136 international non-governmental organisations and 284 national non-governmental 27 Tamże, s. 30. W. Wójtowicz, Współpraca cywilno-wojskowa …, s. 8. 29 C. Marcinkowski, L. Bagiński, CIMIC w…, s. 92. 28 288 FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS organisations. General efforts of the mentioned organisations and groups were focused on the following parts of action: – supporting the legal law and order; – synchronisation of civil-military effort; – infrastructure and economics; – the matter of the return of refugees; – introducing democracy in the life; – public safety30. The role of international organisations within CIMIC duties in BosniaHerzegovina rested on 1B Annexe of the peace agreement, Agreement from Vienna and Agreement from Florence, are files placed in the document of SFOR Standard Operational Procedures. SOP SFOR established cooperation with key institutions responsible for the safety in Europe and with many humanitarian organisations. International organisations in possession of forces and means, funds for appointed action, are a principal ally of military forces in peace support operations. They establish one of the most important components of the CIMIC cooperation. One of the most important institutions involved in Bosnia is OSCE31. Its main role is to supervise elections. Also an important matter was the establishing of the OHR bureau – Office of the High Representative. The high representative was appointed by the UN Security Council at the request of signatories to the agreement, in order to supervise the applying of the civil dimensions of the agreement, as well as coordinating the functioning of all organisations and agencies participating in this process. Also in the process of CIMIC cooperation are civilian international governmental organisations. According to ROE rules, members of international organisations are regarded by SFOR as persons with a special status. It means that soldiers of SFOR can use force, in critical situation they can use power. Examples of these organisations are: OHR, OSCE, ECMM, ICRC, WHO, WFP, ICTY, UNHCR, UNICEF, UNDP, the UNESCO. As far as non-governmental organisations operating in Bosnia are concerned, there are mainly organisations of volunteers which directly are not being financed by the government. Their functioning is based mainly on carrying out the humanitarian actions. Common task of NGO's and SFOR is to help suffering people, to improve people’s standard of living, as well as supporting efforts towards the reconstruction and development of the country. Members of nongovernmental organisations cannot carry any weapon. All private and nongovernmental voluntary organisations have their bank account, steering cell and in some situations their own department. The development of conflict in Bosnia showed the possibility of using NGOs, in a position of total independence in the initial period, before NATO and other 30 31 S. Olszewski, Współpraca cywilno-wojskowa …, s. 110. The Organization for Security and Co-operation in Europe 289 ANNA MILER European countries sent IFOR forces in December 1995. Deployed to military forces and civil representatives of participating countries, non-governmental organisations were able to achieve higher levels of functioning than in previous conflicts. NGOs have limited logistics possibilities and therefore are willing to help, but only in one assignment. In other situations they must join international organisations as just one of many members. Some of them are financed by independent international institutions functioning in the country, other organisations are functioning directly, or by the use of different organisations. The majority of NGOs carrying out their projects, as a result of the invitation of local partners, are dependent in their actions on foreign help. Agencies and organisations responsible for bringing civil aspects of the agreement into effect claim that NGO's are the only option until now, and only with them they can sustain working. Preparing local organisations and their employees for autonomous functioning is an important aim for foreign institutions. Civil international organisations and international organisation can form a proper basis and ensure favourable terms for achieving peace. Despite that, without the help of people living there SFOR, CIMIC and NGO wouldn't have been able to ensure peace in Bosnia-Herzegovina. A commitment of political leaders is necessary, leaders, who were responsible for actions taken to stabilise the peace. Agreements of different types were very often broken by people who earlier signed them. The IFOR mission, and later the SFOR mission the fulfilled assigned tasks. They formed appropriate conditions deciding on the success of administration, political and economic reconstruction of Bosnia-Herzegovina. IFOR forces (operation “Joint Endeavour”) have created and strengthened the peace. However, SFOR forces (operation “Joint Guard”) were supposed to ensure the stability of the peace processes. The NATO operation in Bosnia-Herzegovina under the code name Joint Endeavour was the first land operation implemented by multinational forces connected with the function of supporting the peace. From this moment, the Alliance collected great experience in operations of this type. As evidence we can observe NATO leading the next operations in former Yugoslavia. On the 20th of December 1996 IFOR completed its assignments and achieved its objective. Military forces were divided and transferred to the designated place, hostility was stopped. At the beginning of the operation it was already known that the civil unit would have more tasks to do. However, military forces could only create appropriate conditions for the performance – of building the peace, by creating conditions of the peaceful existence of parties. A particular situation and formed aim of operations led the mission to the intentional effect, of reducing the presence of the army. The Ministers of Foreign Affairs and members of NATO stated that military forces should be reduced in the area in order to lead to 290 FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS stabilization. For that purpose they reorganised the Implementation Force – IFOR into the Stabilisation Force – SFOR. Conducted examinations are showing that creating CIMIC in the future cannot be based only on experience. Every conflict has a different dimension. Agreements do not apply on the same principles, although they have shared objectives, which are to lead to implementation of peace agreements. We need flexible structures and arrangements within CIMIC which can be changed depending on the needs of peace operation. Focusing on the effective cooperation of CIMIC can influence the economical and social improvement of the standard of living among local communities. It can stimulate the return of refugees and migrants in order to a rebuild better Bosnia. CIMIC can, and is making many Bosnians more happy and better prosperous32. Experience gathered on several dozen missions shows regularities determining CIMIC activity. They include: – a distinct specifying of essential objectives of the mission, as well as a clear division of tasks for the military and civilian organisations which are facilitating cooperation; – the real military force presented by the military component imposes peaceful solutions upon parties to the conflict and at the same time points out explicitly the need for mutual cooperation; – the military component supports institutions, organisations and international agencies and the local government in the civil realisation of the agreement; – the military component creates conditions for the gradual withdrawal of international military forces from the area of conflict and the handing over to local authorities of the responsibility for peacekeeping; – the civilian staff puts the peace arrangements into practice – authority, volunteers, representatives of various civilian organisations – they are arranged in a coordinated way, that prevents duplicating some undertakings, especially humanitarian; – the structure of civilian humanitarian organisations is unique and it gives them the elasticity of action, but the lack of specifically assigned organisational dependence creates determined problems in the coordination of the cooperation; – necessary approval of local authorities to arrange groups of people representing civilian organisations, ready to bring help to the local population; – successfully performing tasks, along with civilian organisations supporting the military forces that are involved in a specific mission, creating a positive image of the military component along with helping others in their action33. Effects of CIMIC activity are the most visible in the middle management level of command, that is at the level of the brigade. In this way we are watching practical actions with which the Civil-Military Cooperation must usually struggle. 32 33 W. Wójtowicz, Współpraca cywilno-wojskowa …, s. 34. C. Marcinkowski, L. Bagiński, Wybrane elementy …, s. 208-209. 291 ANNA MILER However, we should observe the difference in functioning of elements of CIMIC organisation in individual divisions. They are very big and are give the possibility of general conclusions. E.g. in the Multinational Division 'North' apart from battle groups, brigades and other individuals, also an American CIMIC battalion operated. Its functioning, especially in the area of carrying out humanitarian help, was based on detailed guidelines of the Department of Defence in USA. Picturing all tasks run by the Civil-Military Cooperation would need an extensive review, therefore describing the most important stages of action is significant. An important aspect aspiring to the success is the issue of the return of refugees to their homes from times before the armed conflict. It is a relevant problem for stabilising the situation, not only in Bosnia-Herzegovina, but also in the entire area of the Balkans. Next to the refugees, that are outside the country, internal refugees also appear. They are people, who being in their own country, aren't able to go back to their houses for various reasons. The importance of this problem meant, that the entire activity of the Civil-Military Cooperation was subordinated to matters connected with the return of refugees. The next element is a unit responsible for introducing democracy. It was focused on supporting permanent contacts with the organisations responsible for the monitoring of law. Contacts concerned the cooperation with OSCE and UNBIH mainly (with Mission of the UN in Bosnia-Herzegovina) to which the International Police Force belongs. The next element was a team coordinating projects which were responsible for the process of the selection and supervision of projects in the area of reconstruction of the infrastructure. It is carried out with funds from the American Agency of International Development and the European Union, but also with countries which were involved in the mission. Its main aims were: repair of schools, doctor's surgeries, repair of bridges and roads and power lines. A team dealing with exploring the area is the last element of the mission. The aim of this team consisted of the accumulation of information about all kinds of political problems, socioeconomic issues and infrastructure and political parties and politicians. Information about this unit is very important for a proper CIMIC operation. CIMIC also carried out the plan for the evacuation of persons having so-called special status. It was reasonable for ensuring the safety of all representatives of international organisations and UN departments UN in danger. CIMIC success is based on the unity of the cooperation of staff units: operating, reconnaissance and logistic, but also its based on cooperation with legal units and psychological operations. Cooperation with the press unit can also give positive effects on the part of promoting CIMIC achievements, as well as obtaining necessary information. 292 FUNCTION AND RESPONSIBILITIES OF CIMIC IN OPERATIONS ON BALKANS Experience shows, that commanders of the alliance need CIMIC. The CivilMilitary Cooperation became a main part of planning, training and actions of NATO. For the proper functioning of multinational teams, there are special trainings and courses prepared. It is necessary that CIMIC is an important part of future NATO peace operations of NATO. Above all, it is important to carry out all kinds of different analyses and plans that are significant in this sector. Bibliography Bagiński L., Marcinkowski C., Współpraca cywilno-wojskowa w operacjach pokojowych, AON, Warszawa 2000. Bagiński L., Marcinkowski C., CIMIC w wybranych misjach humanitarnych i pokojowych, Przegląd Wojsk Lądowych, nr 1, Warszawa 2001. Bujak A. red., Zgrupowania taktyczne wojsk lądowych w operacjach wsparcia pokoju, AON, Warszawa 2004. Cieślarczyk M., Szafran H., CIMIC – cywilno-wojskowa płaszczyzna współpracy sojuszniczej, Zeszyty Naukowe AON, nr 3, Warszawa 2006. Doktryna Współpracy cywilno-wojskowej (CIMIC) NATO AJP-9 [w: Zbiór Dokumentów Normatywnych NATO w Zakresie CIMIC], Dowództwo Wojsk Lotniczych i Obrony Powietrznej, Warszawa 2003. Drost M. red., Współpraca cywilno-wojskowa Polska – NATO, cz. 1 – studium analityczne, AON, Warszawa 1999. Gągor F., Paszkowski K., Międzynarodowe operacje pokojowe w Doktrynie Obronnej RP, MON, Warszawa 1998. Gołębiewski J., Współpraca cywilno-wojskowa, Myśl Wojskowa, nr 5, Warszawa 2005. Jóźwiak A., Marcinkowski C., Wybrane problemy współczesnych operacji pokojowych, AON, Warszawa 2002. Kaczmarek W. red., Operacje wsparcia pokoju w teorii współczesnej sztuki operacyjnej „Wsparcie pokoju”, AON, Warszawa 2002. Knetki J., Panek B., Trembecki J., Operacje wsparcia pokoju w teorii i praktyce sztuki operacyjnej „Pokój”, AON, Warszawa 2002. Kozerawski D. red., Międzynarodowe operacje pokojowe, AON, Warszawa 2003. Olszewski S., Współpraca cywilno-wojskowa w Bośni i Hercegowinie, Wojsko i Wychowanie, nr 5, Warszawa 2002. Pawłowski J., Ciupiński A. red., Umiędzynarodowiony konflikt wewnętrzny, AON, Warszawa 2001. Piątkowski P., Operacja IFOR „Wspólny wysiłek” w Bośni i Hercegowinie, MON, Warszawa 1996. Sąsiadek W., Doświadczenia w zakresie CIMIC na przykładzie Bośni i Hercegowiny [w: Współpraca cywilno-wojskowa, materiały z konferencji naukowej zorganizowanej w Departamencie Społeczno – Wychowawczym MON w dniu 23 marca 1999], MON, Warszawa 1999. 293 ANNA MILER Wojciszko M., Uwarunkowania organizacyjno-prawne związane z kierowaniem obronnością państwa w ramach Współpracy cywilno-wojskowej, Wiedza Obronna, nr 3, Warszawa 2007. Wójtowicz W., Współpraca cywilno-wojskowa w operacji pokojowej w Bośni, MON, Warszawa 1998. Wójtowicz W., Współpraca cywilno-wojskowa na przykładzie operacji pokojowej w Bośni [w:] Współpraca cywilno-wojskowa – konferencja], AON, Warszawa 1999. 294 COMMENTS, REVIEWS AND REPORTS NDU Scientific Quarterly no 4(89) 2012 COMMENTS, REVIEWS AND REPORTS Review of the book: Bartosz Bolechów, Terroryzm, aktorzy, statyści, widzowie, PWN, Warsaw 2010, pp. 399 Aneta NOWAKOWSKA-KRYSTMAN, Ph.D. National Defence University When analyzing bookshops’ offers, it is difficult to find publications dealing with the problem of terrorism. Those which are on offer include translations of foreign authors. (A good example is W. Dietl, K. Hirschmann, R. Tophoven, Terroryzm, PWN.) Polish publications in this field, generally speaking, do not play a significant role. In the search for materials concerning research into terrorism one can encounter different attitudes to the topic. Some of them look at the problem from the perspective of the psychology of terrorism. A good example of such a book is „Terroryzm aktorzy, statyści, widzowie” (Terrorism actors, extras, audience*) by Bartosz Bolechów published by PWN publishing house. Such attitude required from the author to make the assumption that terrorism is a fear evoking method of repeated acts of violence, which is politically motivated, used against non-fighting targets where, unlike in the case of other forms of political violence, the direct target of the attack is not the key target. (translation of quotation p. 9) The author wants to say that the victims are intermediaries between the terrorists and audience, on the stipulation that the audience can also be the target of an attack. Because of such an attitude to the topic Bolechów divides the book into two parts. Thus, the structure of the book is as follows: part one: Terroryści i terroryzm (Terrorists and terrorism*) includes 11 chapters, where on over 180 pages the author deliberates on the psychological genesis of terrorists and terrorism; part two: Audytoria, ofiary, decydenci (Audience, victims, ruling bodies*), consists of 8 chapters where on over 150 pages the author presents psychological aspects connected with the beneficiaries of terrorism. The first part is preceded by an extensive Wprowadzenie (Introduction*), where the author describes among other things: research problems, goals , methods and the structure of the book. It finishes with Zakończenie (The ending). Moreover, it includes the 295 ANETA NOWAKOWSKA-KRYSTMAN following: index of abbreviations (Wykaz skrótów), index of names (Indeks nazwisk), subject index (Indeks rzeczowy) and bibliography (Bibliografia). Let us now move to a short presentation of the subject matter of the first chapter. Chapter 1 Psychopatologia, racjonalność i problem „osobowości terrorystycznej” (Psychopathology, rational thinking and the issue of the terrorist personality*) provides explanation for terrorist behaviour. It shows biological theories which were first introduced in the initial wave of terrorism (pp. 25 – 31). The recapitulation of the achievements in this field is expressed in the following words: among terrorists there is no trace of an overrepresentation of people with psychopathic features – it refers both to psychiatric illnesses as well as personality disorders (translation of quotation p. 31). Moreover, Bolechów presents terrorists as rational players (pp 32 – 38). The theory finds its best place in the description of a personality typology called – political strategist (p. 43). Since they govern organisations, it seems that the latter ones should be analyzed from this point of view. The argument, which is against this theory, saying that not everyone chooses terrorist activities as rational ones, seems to be groundless. For not everyone opts for work in a big corporation, or starts their own business activity. Thus, in accordance with the author’s suggestion, rationalism of the choice of way of life is an individual case. The two remaining types of personality mentioned by B.B. are: radical theorist and aggressive activist. In chapter 2 Teorie psychodynamiczne (Psychodynamic theories*) the author explains psychodynamic reasons for terrorism, including e.g. malicious personality mutation* „złośliwe mutacje osobowości” (p. 48), narcissism (p. 51), paranoia (p. 55), identity crisis (p. 56), aggression and frustration (p. 61). According to BB the usefulness of the provided theories seems to be limited unless one applies stricter criteria and research methods, such as: clearly structured interviews, quantitative methods, sample methods (p. 64). Chapter 3 Czynniki społeczne i kulturowe (Social and cultural factors*), as the title indicates, focuses on the influence of factors on terrorism with reference to an individual as well as to a group. Moreover, it seems that group, organisational and social psychology, with particular emphasis on the issue of group identity provides a more constructive basis to understand terrorist psychology and behaviour (translation of quotation p. 97). It is worth paying particular attention to the subchapter concerning the memetics of terrorism, where particular waves of terrorism are described through the perspective of memes. Chapter 4 Geneza, radykalizacja i eskalacja (Genesis, radicalisation and escalation*) shows that the reasons for terrorism are differentiated and comprehensively connected with one another…starting with the social conditions, through the process of group formation, up to the achievement and maintenance of the group’s operational ability (translation of quotation pp. 103-104). It seems that the reasons for terrorism quoted from different experts in the subject field should be grouped, e.g. with the use of methods of strategic analysis. Then the chapter would become more interdisciplinary. Chapter 5 Neutralizacja psychospołecznych 296 COMMENTS, REVIEWS AND REPORTS inhibitorów agresji (Neutralisation of psychosocial aggression inhibitors*) describes psychological processes which can be used to deactivate moral standards. This chapter does not finish with a conclusion, as in the case of most chapters in the first part. (It also includes chapters 10 and 11). Chapter 6 Dynamika grupy terrorystycznej (Dynamics of a terrorist group*) focuses on terrorism as a group activity and therefore the product of an internal group’s dynamics (translation of quotation p. 126) and it is not only about an attempt to convince an individual to certify an untruth but to change the perception of truth (translation of quotation p. 129). Chapter 7 Psychospołeczny model procesualny (Psychosocial processual model*) is dedicated to the explanation of J. Horgan’s theory which integrates psychological and social perspectives in a dynamic way by overlapping the aspects of terrorism and the following stages: entering a group, being in the group and leaving the group. The subsequent statement deserves particular attention: terrorism is rather a thing that the members of an extremist group do along with many different things (translation of quotation p. 142). Chapter 8 Psychologia terroryzmu religijnego (Psychology of religious terrorism*) describes the theories of e.g. K. Armstrong, A.A. Dol, J.S. Piven, D.J. Feeney which explain the phenomenon of religious terrorism making their critical review at the same time. Chapter 9 Psychologiczne aspekty terroryzmu samobójczego (Psychological aspects of suicide terrorism*) provides explanation of different aspects of terrorist attacks where the death of the terrorist is a must and not the side effect of a given attack (translation of quotation p. 171). One of the explanations why this type of weapon is so widespread is its effectiveness and efficiency. Chapter 10 Psychologia superterroryzmu (Psychology of super-terrorism*) refers to the possibility of using weapons of mass destruction in terrorist attacks. The author, by reference to different theories, calms down the readers by explaining that in spite of strong strategic, political and tactical reasons for using weapon of mass destruction, along with the technological possibilities, it is common to have psychological aversion to deploying them (translation of quotation p. 196), thus there is hope that this kind of weapon will not be used. In chapter 11 Rola kobiet – terroryzm w kontekście płci społecznej (The role of women – terrorism in the context of social gender*) the author conducts an analysis of the participation of women in acts of terrorism through the perspective of terrorism waves. Moreover, he talks about the necessity to provide different explanations of the engagement of women in terrorism than is done in case of men. Part two starts with chapter 1 Terroryzm jako proces komunikacji i wpływu społecznego (Terrorism as a process of communication and social influence*) which presents a kind of symbiosis of present terrorism and mass media. For terrorism is a theatre … terrorist attacks are often well calculated and planned in order to draw the attention of electronic media and press (p. 212) and terrorist campaigns can be examined by using the analogy of advertising campaigns (p. 218 translation of quotations). Chapter 2 Psychologiczne aspekty sytuacji 297 ANETA NOWAKOWSKA-KRYSTMAN zakładniczych (Psychological aspects of hostage situations*) presents three types of terrorist activities where hostages are taken i.e. kidnapping: taking over means of transport together with passengers and crew, barricade situation. The latter one is broadly described here. This chapter as well as the next one does not include a part entitled Conclusions. In chapter 3 Ofiary terroryzmu (Victims of terrorism*) the author tackles such topics as e.g. 1) victimization which stems from: the wish to draw attention, symbolic aspects and instrumental character; 2) category of victims e.g. direct victims, family and relatives of the direct victims, negotiators. Chapter 4 Strach, lęk i percepcja ryzyka (Dread, fear and risk perception*) presents critical elements of terrorist strategy where rational dread and irrational fear exert influence on the perception of risk (p.252). Chapter 5 Trauma i zaburzenia posttraumatyczne jako skutek działań terrorystycznych (Psychological trauma and post-traumatic disorders as the result of terrorist activities*) presents numerically: the traits of traumatic situations, possible reaction to the situations, and categorisations of post-traumatic disorders. The author compares terrorism to other occurrences and proves that in many aspects there is an analogy with natural disasters and catastrophes caused by man (p. 277). However, we should be a little bit critical as far as their implementation in research on the results of terrorist incidences is concerned. Chapter 6 Psychologiczne konsekwencje działań terrorystycznych w wybranych grupach szczególnych (Psychological consequences of terrorist activities in the chosen special groups*) touches on the reaction of the following groups to incidents and terrorist campaigns: 1) children, 2) the elderly, 3) members of intervention groups, in order to build an effective, comprehensive system of minimisation of psychological effects of terrorist activities, which was broadly described (p. 29) in chapter 7 Minimalizowanie psychologicznych skutków działań terrorystycznych (Minimisation of psychological effects of terrorist activities*). The author puts here emphasis on education, information, communication, and discussion in the neutralisation of the negative psychological influence exerted by terrorists. Chapter 8 Elementy psychologii antyterroryzmu (The elements of antiterrorism psychology*) draws particular attention to the fact that terrorism is first of all a psychological weapon (translation of quotation p. 336). The author in the ending writes that psychosocial analysis of terrorism mechanisms leads to the noticing of numerous paradoxes and research problems (p.355) and it should be said that BB managed to illustrate it clearly in his book. An unquestionable plus of this publication is the fact that the presented theories and models are exposed to critical assessment. It is difficult to indicate the recipients of the book. It can be anyone who wants to understand why there are terrorist attacks in the world. Thus, it can become the basis of society’s education, as we all should realise the complicated psychosocial aspects connected with the problem of terrorism. This book can also be recommended as an introduction to the comprehension of the problem for those who are beginning their research into terrorism (p. 18). The author writes that this 298 COMMENTS, REVIEWS AND REPORTS is an interdisciplinary attitude to the problem, and I partly agree with him. As an economist, theorist and practitioner of management I lack here the continuation of the presented attitudes’ implementation in the problem of terrorism. Such curiosity was awoken in me by chapter 1 of part I. Moreover, the structure of the book is not well balanced, i.e. we can find here chapters with 5 as well as 32 pages. Some of them lack conclusions (chapter 7 and 19). In spite of the structural shortcomings, as well as the fact that my scientific hunger has not been satisfied, the book can be (and even has to be) recommended to everyone, and in particular students of not only psychology but also security and defence. * free interpretation of the translator 299 Publishing terms in “NDU Scientific Quarterly” The Scientific Quarterly’s editorial office should receive an electronic version of the work saved in MS Word or Adobe InDesign, together with its printout. The article’s volume cannot exceed 1 author’s sheet (which is approx. 22 pages or 40 000 characters including spaces, or 3000 cm2 of illustrated surface (mathematical, physcal and chemical formulas, logical dependencies, diagrams, schemes etc.) The article should contain, among others: – title without abbreviations (unless commonly used ones) ; – academic degree or title, military or professional rank, name and surname of author(s), name of institution represented by him; – summary consisting in independent text briefly describing problems raised in the article; – keywords (max. 5), while first one is connected to name of scientific discipline containing the work; – main text together with drawings, photographs, tables; – graphics material in separate file (in Corel, Microsoft PowerPoint, Adobe Illustrator program); – list of literature referred to. Furthermore, in non-English articles: – title and keywords in English; – summary in English. The computer printout (editorial typescript) should be: – made on A4 size paper, single-sided; – made with 12-pt. font; – with 1,5 line spacing; – with margins: left – 3,5 cm, right – 1 cm. Structure of article 1. Title. 2. Title in English. 3. Author, co-authors. 4. e-mail to authors, phone number. 5. Summary – short characteristics of article (subject, aim, raised problem), main conclusions and scientific achievements. Approx. 700–1500 characters (including spaces), both in article language and in English. Summary cannot supersede introduction to article. 6. Keywords – max. 5 words and expressions, both in article language and in English. 7. Article (including introduction and conclusions) – introduction contains aim(s), problem(s), hypothesis, methods and, where possible, it evaluates sources; scientific achievements described in the article are summarised in conclusions. 8. Annotations: a) Coherent publication (book) – Author/authors: – Title, – Edition marking, – Volume number and its title (in description of single volume), – Place of edition and editor, – Year of edition, – Number of volumes (in multi-volume publication), – ISBN, – Page; b) Article (chapter) in coherent publication (book) – Author/authors of article: – Article’s title, – Author/authors of primary document, – Primary document’s title, – Edition marking, – Place of edition and editor, – Year of edition, – Localisation within primary document, volume and page markings; c) Article in serial publication (e.g. in periodical) – Author/authors of article; – Article’s title, – Title of serial publication, – Edition, – Localisation within primary document (year, marking of journal and page). 9. Bibliography – sources and literature, listed alphabetically. We recommend the authors to maintain writing discipline, holding on to the main subject. Too detailed or too technical texts may not be published. If necessary, please consult the text with chief editor. The required volume of texts applies to texts together with annotations. Bibliography, summary and other related information are not taken into account during character counting. Chapters should not be numbered; the text should have 3 levels at most. Please avoid bold and coloured text. Italics or parentheses should be used only for citing. Charts, tables and other pictures should be attached as separate, easily identifiable files. The authors should also place them in text or give unequivocal hints regarding position in which they should be found. All graphical elements should be created in such a way that reducing them or printing them in black and white do not limit their readability. If the picture was taken from another source, such a source should be cited. Selected types of scientific articles A scientific article is first of all a description of results of own or team’s scientific research. It should feature precise and logical scientific reasoning, concise and communicative language. Most often, in a scientific article we recognize several principal parts, including: – title – concise, containing “keywords” for content presented in article; – introduction – containing synthetic description of current state of knowledge on the given subject and setting the aim and problem dealt with in the work, as well as adopted research hypothesis (setting hypothesis in certain problem situations is not necessary); characteristics of research subject, used methods and research techniques; – main part – describing and explaining the results of research done. The results should be presented in a concise and comprehensive way. – conclusions – containing summary of research results and reflection on verification of research hypothesis, level of meeting the goal(s) and solving problem(s) raised in the article; – literature (annotations, references) – prepared according to requirements defined in given scientific discipline and containing full bibliography related to considered subject. It is recommended to refer to reviewed publications only; – summary – it should be of informational character and contain, in a condensed form, the description of research character, main results and principal conclusions. Review article – is a critical analysis of materials that are already published (of other authors) from given knowledge domain, used to formulate own theses and conclusions. It should present new ideas resulting from analysed literature. The article contains such parts as: title, introduction, description and explanation of analyses’ results, their summary, conclusions as well as literature and synopsis. Remarks The editor’s house does not return unsolicited materials and does not inform about reasons for negative qualification to print. The editor’s house reserves the right to make abridgements, to change titles, subtitles and to make stylistic corrections.