scispace - formally typeset
Search or ask a question

Showing papers by "Swedish National Defence College published in 2015"


Journal ArticleDOI
TL;DR: In this article, the authors aim to develop a framework that explains both the failure and success of crisis coordination by exploring the relevant literature, reformulating what coordination is and distilling from research the factors that cause failures and success.
Abstract: In virtually every assessment of responses to large-scale crises and disasters, coordination is identified as a critical failure factor. After the crisis, official committees and political opponents often characterize the early phases of the response as a ‘failure to coordinate.’ Not surprisingly, improved coordination quickly emerges as the prescribed solution. Coordination, then, is apparently both the problem and the solution. But the proposed solutions rarely solve the problem: coordination continues to mar most crises and disasters. In the absence of a shared body of knowledge on coordination, it is hard to formulate a normative framework that allows for systematic assessment of coordination in times of crisis. As coordination is widely perceived as an important function of crisis and disaster management, this absence undermines a fair and balanced assessment of crisis management performance. This paper seeks to address that void. We aim to develop a framework that explains both the failure and success of crisis coordination. We do this by exploring the relevant literature, reformulating what coordination is and distilling from research the factors that cause failure and success.

116 citations


Journal ArticleDOI
TL;DR: In this paper, the Swedish government's management of the financial crisis in 2008 is discussed, where the authors argue that during the worst turbulence, the government was able to successfully frame the event, without being challenged by contrasting frames, as a crisis managed with great competence and in the best interest of ordinary citizens.
Abstract: Crises tend to be crucial political events with the ability to determine the public’s faith in political actors. If well managed, crises provide windows of opportunities for political actors to show action, strengthening credibility and pushing through new policies. This article explores one such instance of successful crisis exploitation: the Swedish government’s management of the financial crisis in 2008. During the worst turbulence, the government was able to successfully frame the event, without being challenged by contrasting frames, as a crisis managed with great competence and in the best interest of ordinary citizens. We explain this phenomenon through journalistic styles and standards. The article concludes by discussing the findings where we propose that issue framing, in combination with descriptive journalism, contributes to portraying political actors as credible crisis managers rather than tactical politicians, with the result being that they appear more trustworthy and competent. Moreover, ...

45 citations


Journal ArticleDOI
TL;DR: In this article, the authors analyzed how the Norwegian news media framed the terrorist attacks in Oslo and the island of Utoya, which killed 77 mainly young people on 22 July 2011.
Abstract: This article analyzes how the Norwegian news media framed the terrorist attacks in Oslo and the island of Utoya, which killed 77 mainly young people on 22 July 2011. Did the news media favour or co ...

42 citations


Journal ArticleDOI
TL;DR: It is argued that the emergence of counter-narratives in the sphere of security depends upon a few key dynamics that might vary with political context such as political culture, the size of the blogosphere, the debate in mainstream media and socialization processes within the military organization.
Abstract: The new media situation gives fuel to increased competition between narratives. In the sphere of security this poses challenges to government strategic narratives. Scholars, drawing on findings fro ...

31 citations


Journal ArticleDOI
TL;DR: In this article, a model was developed describing three main categories of motivational factors: person-related, organizational and activity-related factors, and actual crisis experience was found to influence factors in all three categories.
Abstract: Much of the responsibility for societal safety and crisis preparedness rests with local municipal leaders. These tasks are demanding, and often insufficiently prioritized and supported. The purpose of this study was to identify factors influencing motivation to work with these issues, and to explore relationships among such factors. Two datasets, formed the basis of the analysis. From the qualitative analysis, a model was developed describing three main categories of motivational factors: person-related, organizational and activity-related. Actual crisis experience was found to influence factors in all three categories. Differences regarding motivational forces could be identified among different roles among officials. Self-determination theory is applied to the model, illustrating possible ways to influence motivation for work with preparedness issues.

27 citations


Journal ArticleDOI
TL;DR: In this article, the authors analyzed a staff exercise using Edmondson's team learning model in a military setting and found that team leader coaching is crucial to support all the variables in the model.
Abstract: International operations have become one of the main tasks for the Swedish Armed Forces (SAF). The SAF and Swedish National Defence College organize annual international staff exercises with the purpose of training officers to carry out effective staff work. This study analyzed a staff exercise using Edmondson’s team learning model in a military setting. The model was developed by including group cohesion. As defensive routines are a threat to team learning behavior, the possible presence of these was examined. The results indicate that team leader coaching is crucial to support all the variables in the model. The added variable of group cohesion contributed with insights on how the commander used task solving to create group cohesion. Some examples of defensive routines were also revealed but there seemed to be challenges in identifying such routines in this type of exercise setting.

25 citations


Journal ArticleDOI
TL;DR: In this article, the authors discuss how the factors of authenticity, affectivity, and ethics play a role in the ways in which citizen images engage or disengage the distant audience.
Abstract: Amateur imagery has become an important component of news coverage of distant crisis events, and it plays a decisive role in shaping how audiences respond to crises. In this article, we discuss how the factors of authenticity, affectivity, and ethics play a role in the ways in which citizen images engage or disengage the distant audience. The article is based on 17 focus group interviews in Sweden and Finland that centred on a selection of visual news coverage of the Arab Spring in Syria and Libya – landmark news events in the use of citizen eyewitness images in the Nordic countries. The results indicate that citizen imagery is indeed a potential tool with strongly engaging characteristics, especially in terms of its authenticity and to some degree also its affectivity. However, disengagement may also result, especially due to the interpreted deficiencies in terms of ethics.

22 citations


Proceedings ArticleDOI
26 May 2015
TL;DR: This paper sets out to examine the information-related events of early 2014 with a particular focus on the annexation of Crimea and provides an insight into the Russian world of ideas regarding information and its power applying the concept of information superiority and how it connects cyber and information warfare.
Abstract: The belief in the power of information is deeply ingrained in the minds of the Russian top leadership, which operates under the premise that public opinion can be effectively influenced in order to reach desired outcomes domestically as well as on foreign soil. Ever since the beginning of the Euromaidan demonstrations, Russia has been seeking to promote its own narrative domestically, in Ukraine, and beyond, making use of the unique features of the cyberspace. As the crisis deepened in early spring of 2014, information operations played an important role in facilitating the de facto annexation of the Crimean peninsula to the Russian Federation, as well as throughout the continuation of the crisis. This paper sets out to examine the information-related events of early 2014 with a particular focus on the annexation of Crimea. The aim is twofold. First, it provides an insight into the Russian world of ideas regarding information and its power applying the concept of information superiority and how it connects cyber and information warfare. Second, this paper exemplifies how Russia or pro-Russian entities make use of a wide array of tools and methods - kinetic, cyber, and informational - with the purpose of achieving information superiority. The paper concludes with a discussion regarding the impact of cyber within Russian Information Warfare as experienced in Ukraine.

18 citations


Journal ArticleDOI
TL;DR: In this article, the influence of the military upon politics and society in the twenty-first-century European context with the aim of better understanding the various traits, their interconnections and relation to broader trends in Europe and the West is discussed.
Abstract: During the past decades, the process of militarization that characterized Sweden after the Second World War has been replaced by a process of demilitarization. With the debates following the war in Georgia 2008 and the Russian annexation of Crimea in 2014, this process of demilitarization appears under challenge. This raises questions about the nature of these processes and the problems facing the attempts at turning them around. The article introduces a framework for analysing the influence of the military upon politics and society in the twenty-first-century European context with the aim of better understanding the various traits, their interconnections and relation to broader trends in Europe and the West. The analysis shows that traits of demilitarization are still dominating in Sweden, although some indications of remilitarization can be found.

18 citations


Journal ArticleDOI
TL;DR: In this paper, the design, fabrication, and thermomechanical study of ceramic LC resonators for wireless pressure reading, verified at room temperature, at 500 °C and at 1000 °C for pressures up to 2.5 bar.
Abstract: This paper reports on the design, fabrication, and thermomechanical study of ceramic LC resonators for wireless pressure reading, verified at room temperature, at 500 °C and at 1000 °C for pressures up to 2.5 bar. Five different devices were fabricated from high-temperature co-fired ceramics (HTCC) and characterized. Alumina green tape sheets were screen printed with platinum paste, micromachined, laminated, and fired. The resulting samples were 21 mm × 19 mm with different thicknesses. An embedded communicator part was integrated with either a passive backing part or with a pressure-sensing element, including an 80 µm thick and 6 mm diameter diaphragm. The study includes measuring thermally and mechanically induced resonance frequency shifts, and thermally induced deformations. For the pressure sensor device, contributions from changes in the relative permittivity and from expanding air trapped in the cavity were extracted. The devices exhibited thermomechanical robustness during heating, regardless of the thickness of the backing. The pressure sensitivity decreased with increasing temperature from 15050 ppm bar−1 at room temperature to 2400 ppm bar−1 at 1000 °C, due to the decreasing pressure difference between the external pressure and the air pressure inside the cavity.

17 citations


Journal ArticleDOI
TL;DR: In this article, the authors combine two existing theories that propose different factors to account for variation in outcomes: ministerial resignations as a consequence of cabinet formation and individual positions; or resigned as a result of blame management strategies involving individual actors within the cabinet and beyond.
Abstract: Accountability processes after crisis events sometimes entail harsh criticism from public and political players alike, forcing cabinet ministers to be on top of the political game and sometimes even resign. However, harsh accountability processes are just as likely to leave ministers undamaged. This article combines two existing theories that propose different factors to account for variation in outcomes: ministerial resignations as a consequence of cabinet formation and individual positions; or resignations as a result of blame management strategies involving individual actors within the cabinet and beyond. Ten crisis episodes in Sweden are analysed and compared. The findings suggest that individual political power bases and experience matter to how well blame management strategies can be employed, while the composition of the government gives structural constraints. The dynamic interplay and framing battle between incumbent decision makers, and external arenas and the skill with which individual ministers engage and frame responsibility, play a key role in determining their post-crisis careers.

Posted Content
TL;DR: In the present conflict in Eastern Ukraine, Russia has effectively used the information sphere as an integral tool in its Hybrid War against the people of Ukraine.
Abstract: Future adversaries will increasingly rely on technological means to execute their operations, utilizing cyber capabilities to control or support ‘Hybrid Threats.’ Hybrid Threats are multimodal, low intensity, kinetic as well as non-kinetic threats to international peace and security. Examples of Hybrid Threats include asymmetric conflict scenarios, global terrorism, piracy, transnational organized crime, demographic challenges, resources security, retrenchment from globalization and the proliferation of weapons of mass destruction.Cyber-conflict and cyber-warfare are great examples of the use of new technologies within the scope of Hybrid Threats. Cyber-war refers to a sustained, computer-based cyber-attack by a state (or non-state actor) against the IT infrastructure of a target. The combination of new technology and its availability make cyber-supported or cyber-led Hybrid Threats so potent. Cyber threats strike at the core of modern war fighting by affecting Command and Control abilities, which have become vulnerable to such cyber-attacks.Russia has been one of the most prolific users of cyber capabilities. In 2007, Russia attempted to disrupt Estonia’s Internet infrastructure as retribution for the country’s removal of a WWII Soviet War Memorial from the center of Tallinn. Russia also augmented its conventional military campaign in Georgia with cyber capabilities, which severely hampered the functioning of government and business websites.In the present conflict in Eastern Ukraine, Russia has effectively used the information sphere as an integral tool in its Hybrid War against the people of Ukraine.

Journal ArticleDOI
TL;DR: In this paper, a microscale ceramic high-temperature combustor with a built-in temperature sensor and source of oxygen has been designed, manufactured and characterized, and successful in situ electroplating and...
Abstract: A microscale ceramic high-temperature combustor with a built-in temperature sensor and source of oxygen has been designed, manufactured and characterized. The successful in situ electroplating and ...

Journal ArticleDOI
TL;DR: The definition of the military objective set out in Article 52(2) of Additional Protocol I – ...
Abstract: Cyber warfare and the advent of computer network operations have forced us to look again at the concept of the military objective. The definition set out in Article 52(2) of Additional Protocol I – ...

Journal ArticleDOI
TL;DR: In this article, the authors discuss a new form of war, "hybrid war", with inclusion of aspects of cyber-terrorism and cyber-war against the backdrop of Russia's "Ukrainian Spring" and the continuing threat posed by radical Islamist groups in Africa and the Middle East.
Abstract: This article discusses a new form of war, ‘hybrid war’, with inclusion of aspects of ‘cyber-terrorism’ and ‘cyber-war’ against the backdrop of Russia’s ‘Ukrainian Spring’ and the continuing threat posed by radical Islamist groups in Africa and the Middle East. It also discusses the findings of an on-going hybrid threat project by the Swedish Defence College. This interdisciplinary article predicts that military doctrines, traditional approaches to war and peace and their perceptions will have to change in the future.

Journal ArticleDOI
TL;DR: In this paper, military ocean patrol vessels (OPVs) are used to facilitate the wide range of tasks with small crews, OPVs represent several ship design compromises and are today an increasingly common type of naval ship.

Journal ArticleDOI
TL;DR: In this paper, the authors explore the preconditions and functioning of such a global crisis management health network by proposing a model based on coordination systems and practices of importance to the response.
Abstract: In today’s interconnected world, transboundary crises such as pandemics, ecological and financial crises are becoming both more frequent and more devastating. The transboundary nature of these threats requires actors at various administrative and geographical levels to create joint responses which, at the aggregated level, form the basis of a global crisis management network. However, the forming of such a network is challenged by ambiguity, complexity and uncertainty in terms of responsibility, cooperation and mandates. In order to overcome these deficiencies, the network should develop a delicate mix of organizational robustness and flexibility. The article explores the preconditions and functioning of such a global crisis management health network by proposing a model based on coordination systems and practices of importance to the response. The SARS outbreak in 2003 will be used to illustrate the model. The article ends by exploring the preconditions for global crisis management based on how levels of formalization may impact on the network’s capacity for adaptation and coordination.

Journal ArticleDOI
TL;DR: In this article, the authors identify challenges for ship operators when developing their ship security management and investigate two central aspects in the analysis: understanding the threat and understanding how a security threat affects the crew and operation of the ship.
Abstract: Piracy can lead to risks so high that they, according to the International Maritime Organization, are tolerable only if risk reduction is not practicable or is disproportionate to the benefits achieved. Therefore, there is a need for reducing ship security risks in relation to antagonistic threats such as piracy. The aim of this study is to identify challenges for ship operators when developing their ship security management. Furthermore, this study also investigates two central aspects in the analysis: understanding the threat and understanding how a security threat affects the crew and operation of the ship. It is clear from the analysis that the importance of subjective aspects beyond a ship operators’ direct control is high. This seems to be the fact for all aspects of the risk management process. The situation is also dynamic as the security risk, as well as the risk perception, can change dramatically even though there are no actual operational changes. As a result, the ship security management process is highly iterative and depends on situations on board as well as conditions out of the ship operator’s control. In order to make ship security manageable, the risk management has to put particular focus on methodological understanding, relevant system understanding and well-defined risk acceptance criteria as well as on including all levels of the organization in the risk reduction implementation and on a continuous monitoring.

Journal ArticleDOI
TL;DR: In this paper, the authors used a multiperspective approach to gain a deeper understanding of crisis management at the Swedish government office level in an international crisis by using a multi-view approach.
Abstract: PurposeThe purpose of this paper is to gain a deeper understanding of crisis management at the Swedish Government office level in an international crisis by using a multiperspective approach, and p ...

Journal ArticleDOI
TL;DR: In this paper, individual reaction patterns among professional first responders (emergency treatment, military officers, and police officers) during and after acute situations that involve moral stressors in combination with cumulative stress were analyzed according to a grounded theory approach.
Abstract: The aim was to gain a deeper understanding of individual reaction patterns among professional first responders (emergency treatment, military officers, and police officers) during and after acute situations that involve moral stressors in combination with cumulative stress. Swedish and Norwegian informants within these professional groups were interviewed (n=37). Data were analyzed according to a grounded theory approach. A model was developed according to which long-term effects following such stress exposure depends on the character of the continued everyday living. In particular, the frequency and intensity of perceived daily hassles and uplifts is important. Cognitivebehavioral aspects are discussed to prevent and/or reduce negative long-term reactions.

Journal ArticleDOI
TL;DR: The concept of shadow war has been used by scholars and journalists alike to describe the practices associated with the light footprint framework, although the concept is ambiguous, lacks clear conceptual boundaries and is yet to be defined as mentioned in this paper.
Abstract: The US strategic shift from nation-building to what has been labelled “light footprint” has carried with it a number of changes in the practices used when waging war on terrorism. These activities include covert and clandestine action by special operations and paramilitary forces, and others, operating under a shadowy mandate. It is essential to analyse these changes, due to the nature of the actions taken and the global reach and consequences of US foreign policies. The concept of “global shadow war” has been used by scholars and journalists alike to describe the practices associated with the light footprint framework, although the concept is ambiguous, lacks clear conceptual boundaries and is yet to be defined. This article attempts to resolve the problem of ambiguity through a systematic analysis of how and when the concept is used, in the process establishing its conceptual boundaries and definitional qualities. Using a method for concept analysis developed by Giovanni Sartori, the article pro...

Journal ArticleDOI
TL;DR: In this paper, the authors examined the relationship between demographic variables, traits and beliefs of Swedish soldiers and officers and found that negative safety values and risk propensity decrease with age, while men demonstrated a more sceptical view of safety measures and a higher risk propensity than women.
Abstract: Issues concerning risks in the military have gained increased attention within the Swedish Armed Forces, particularly relating to the new focus on an all voluntary force participating in international missions. Military activities inevitably include an element of calculated risk-taking, while at the same time the unnecessary taking of risks must be minimized. Within the context of the specific mission and situation, a number of factors relating to demographic variables, traits and beliefs may influence individual inclinations towards risk behaviour. The purpose of this study was to examine the relationship between such factors and individual risk propensity. Data were collected from two samples of Swedish soldiers and officers. Examining demographic variables, negative safety values and risk propensity were found to decrease with age, while men demonstrated a more sceptical view of safety measures and a higher risk propensity than women. The trait known as lack of deliberation, reflecting an inability to ...

Journal ArticleDOI
TL;DR: In this paper, a method for manufacturing microscopic Langmuir probes with spherical tips from platinum bond wires for plasma characterization in microplasma sources by fusing is described, and the method is shown to work well in the presence of magnetic fields.
Abstract: This paper reports on a novel method for manufacturing microscopic Langmuir probes with spherical tips from platinum bond wires for plasma characterization in microplasma sources by fusing. Here, t ...

Posted Content
TL;DR: In the present conflict in Eastern Ukraine, Russia has effectively used the information sphere as an integral tool in its Hybrid War against the people of Ukraine.
Abstract: Future adversaries will increasingly rely on technological means to execute their operations, utilizing cyber capabilities to control or support ‘Hybrid Threats.’ Hybrid Threats are multimodal, low intensity, kinetic as well as non-kinetic threats to international peace and security. Examples of Hybrid Threats include asymmetric conflict scenarios, global terrorism, piracy, transnational organized crime, demographic challenges, resources security, retrenchment from globalization and the proliferation of weapons of mass destruction.Cyber-conflict and cyber-warfare are great examples of the use of new technologies within the scope of Hybrid Threats. Cyber-war refers to a sustained, computer-based cyber-attack by a state (or non-state actor) against the IT infrastructure of a target. The combination of new technology and its availability make cyber-supported or cyber-led Hybrid Threats so potent. Cyber threats strike at the core of modern war fighting by affecting Command and Control abilities, which have become vulnerable to such cyber-attacks.Russia has been one of the most prolific users of cyber capabilities. In 2007, Russia attempted to disrupt Estonia’s Internet infrastructure as retribution for the country’s removal of a WWII Soviet War Memorial from the center of Tallinn. Russia also augmented its conventional military campaign in Georgia with cyber capabilities, which severely hampered the functioning of government and business websites.In the present conflict in Eastern Ukraine, Russia has effectively used the information sphere as an integral tool in its Hybrid War against the people of Ukraine.

Journal ArticleDOI
03 Jul 2015
TL;DR: In this article, training exercises may offer an opportunity to develop capabilities among managers in supporting and communicating with citizens in societal crisis management, which is a vital part of societal disaster management.
Abstract: Purpose– Supporting and communicating with citizens is a vital part of societal crisis management. Training exercises may offer an opportunity to develop capabilities among managers in this regard. ...

Journal ArticleDOI
TL;DR: In this article, the authors developed a deeper understanding of how leaders manage their own and others' emotions in professional crisis management organizations during severely demanding episodes, such as a hostage drama that occurred in a small Swedish town.
Abstract: Purpose – The purpose of this paper is to develop a deeper understanding of how leaders manage their own and others’ emotions in professional crisis management organizations during severely demanding episodes. The empirical case is a hostage drama that occurred in a small Swedish town. Although staff at the local prison were situationally prepared and trained in incident exercises, two inmates with knives fled the prison after taking a warden hostage. Design/methodology/approach – A grounded theory approach was used. In all, 14 informants from four Swedish authorities were interviewed on the basis of their involvement in the hostage drama. Findings – According to the analysis, an emergency response leader’s emotion management is framed by an organizationally embedded emotional regime which is summed up in two core themes: focus on the task and do not let emotions interfere; and provide the task force with maximum physical and psychological security. The leader’s emotion management within this framework co...

Journal ArticleDOI
01 Jun 2015
TL;DR: In this article, the authors deal with how Russian warfighting is described and discussed in contemporary Russian military theory, focusing on the period from the 1980s to the present day - 2014.
Abstract: Abstract This article deals with how Russian warfighting is described and discussed in contemporary Russian military theory. The approach has been studies, analyses and interpretations of primarily Russian sources as prominent Russian journals, but also Western analyses and interpretations of contemporary Russian warfighting discussions. Theoretical considerations are limited to the period from the 1980s to the present day - 2014. Mainly Russian experts on military theory (Bogdanov, Chekinov, Gareev, Kiselyov, Kuralenko, Morozov, Slipchenko, Vinogradov, Vladimirov, Vorobyov) have been studied, but also sources from some prominent Western experts on Russian warfare (FitzGerald, Gileotti, Kipp, McDermott).

Journal ArticleDOI
05 May 2015
TL;DR: In this article, the authors investigate the moral aspects of humanitarian intervention and argue that P.F. Strawson's concept of Moral Reactive Attitudes (MRA) contributes to analysing the moral dilemmas and priorities involved.
Abstract: This essay investigates the moral aspects of humanitarian intervention. Humanitarian intervention involves the balancing of at least three sometimes contradictory principles ‐ the autonomy of states, the prohibition of war and the reduction of harm and human suffering ‐ and hence requires not merely a legal and political approach to the matter but renders a moral viewpoint necessary. It is argued that P.F. Strawson’s concept Moral Reactive Attitudes MRA) contributes to analysing the moral dilemmas and priorities involved. First, MRA underlines the moral aspects of international society that are essential for dealing with the moral conflict inherent in international society. Secondly, MRA helps to balance between competing claims of justification and legitimacy in cases of humanitarian intervention.

Book ChapterDOI
01 Jan 2015
TL;DR: One of the strongest typhoon ever recorded, Typhoon Haiyan, hit the Philippines on 6 November 2013, causing massive damage and killing over 4 million people and affecting roughly 14 million lives.
Abstract: On 6 November 2013, one of the strongest typhoons ever recorded struck the Philippine archipelago. The resulting damage was immense. Flying debris, flattened houses, damaged buildings and the loss of basic infrastructures caused copious deaths, displaced over 4 million people and affected roughly 14 million lives (UNOCHA, 2013). Blocked roads and a damaged airport only compounded the hardship felt by the survivors, many of whom were in need of basic necessities such as shelter, fresh water, food and medicine.

Journal Article
TL;DR: In the present conflict in Eastern Ukraine, Russia has effectively used the information sphere as an integral tool in its Hybrid War against the people of Ukraine as mentioned in this paper, which severely hampered the functioning of government and business websites.
Abstract: Future adversaries will increasingly rely on technological means to execute their operations, utilizing cyber capabilities to control or support ‘Hybrid Threats.’ Hybrid Threats are multimodal, low intensity, kinetic as well as non-kinetic threats to international peace and security. Examples of Hybrid Threats include asymmetric conflict scenarios, global terrorism, piracy, transnational organized crime, demographic challenges, resources security, retrenchment from globalization and the proliferation of weapons of mass destruction.Cyber-conflict and cyber-warfare are great examples of the use of new technologies within the scope of Hybrid Threats. Cyber-war refers to a sustained, computer-based cyber-attack by a state (or non-state actor) against the IT infrastructure of a target. The combination of new technology and its availability make cyber-supported or cyber-led Hybrid Threats so potent. Cyber threats strike at the core of modern war fighting by affecting Command and Control abilities, which have become vulnerable to such cyber-attacks.Russia has been one of the most prolific users of cyber capabilities. In 2007, Russia attempted to disrupt Estonia’s Internet infrastructure as retribution for the country’s removal of a WWII Soviet War Memorial from the center of Tallinn. Russia also augmented its conventional military campaign in Georgia with cyber capabilities, which severely hampered the functioning of government and business websites.In the present conflict in Eastern Ukraine, Russia has effectively used the information sphere as an integral tool in its Hybrid War against the people of Ukraine.