Connections
Leadership in the Defense and Security Sector in the 21st Century
This editorial article introduces the reader to the rationale for revisiting the subject of leadership in the defense and security sector, highlights
the challenges of analyzing the topic during the ongoing Russian war in Ukraine, and then presents the content of this special issue of Connections:
The Quarterly Journal. The contributors address diverse topics, such as the elicitation of desired leadership traits on the basis of the curricula of selected courses of the NATO School Oberammergau, the experience of China in introducing Western leadership concepts in the education and training of future military leaders, the experience of Ukraine in leading the enhancement of human resource management in the ministry of defense as part of the capabilities-based planning process, and the dangers for Ukraine in falling into the trap of authoritarian leadership during the current war with Russia. Three additional articles examine the interconnections between leadership in communication, respectively, in Hungary’s law enforcement organizations, the impact on organizational design, and the role of strategic narratives in Taiwan’s soft power and its positioning in the Indo-Pacific region.
How Networks of Social Cooperation Scale into Civilizations
This article analyzes structure and function in the network design of historical regimes of China and Western Europe to build a theory for the development of societies and states from endogenous mechanisms of social change. It shows how their respective network structures evolved independently but share a global property: both are small worlds, meaning that any node in the network can reach any other node by a small number of steps. Probing the variations in network topologies and their role in diffusion and scaling, the author accounts for differences in formal institutions, interpersonal trust, cultural norms, and moral protocols. Network structure as an independent variable moves the discussion of the divergence of East and West beyond the conventional, centralized China versus decentralized Europe debate. It allows us to identify an overlooked driver of structural change in the polity, helping to discern better what sets the development of world civilizations apart.
The Impact of Organizational Design and Leadership on Strategic Communications
Information warfare, including strategic communications, is becoming ever more crucial in defending national interests and competing globally. Therefore, organizations are increasingly employing strategic communications within the information environment to pursue the organization’s mission and goals. Unfortunately, many organizations lack strategic, structural, and environmental alignment, resulting in reduced efficiency and effectiveness of strategic communications. This article explores the current structure of many organizations defending and competing in a turbulent information environment, proposes a different configuration that balances efficiency and effectiveness, outlines the importance of innovation, and emphasizes the strategic role of leadership throughout the organization and change process.
Chains, Continuums, and Virtuous Cycles: Parsing Taiwan’s Strategic Narratives and Soft Power Leadership in the Indo-Pacific
Following the outbreak of the coronavirus pandemic in late 2019, Taiwan’s international profile rose to prominence. Its public diplomatic campaign in distributing then-depleted stocks of facemasks provided a degree of international solidarity in a growing atmosphere of economic nationalism. Its government-led strategy of preventative measures that kept normalcy on the island while large swaths of the world entered restrictive lockdowns also became a model of resilient public health policies and trust in government directives. Capitalizing on these developments, Taiwan’s soft power approach toward its constrained international profile also took on new prominence as it sought to leverage its technological leadership in the context of disrupted, vulnerable global supply chains. This article analyzes Taiwan’s strategic narratives as it invests in conceptualizing an arena of increased great power contestation: the Indo-Pacific. It focuses on how elite narratives have employed several discursive strategies that increasingly aim to redirect and reorient supply chains to meet the (un)certainties of geopolitical ideological positioning.
Hofstede’s Power Distance Matrix: Law Enforcement Leadership Theory and Communication
Hofstede created his theory with its dimensions by working with various private companies. In 2021, the author had the opportunity to do all this for an organization that trains civil service employees. The central question of his research was how to integrate Hofstede’s dimensions concerning managerial communication into an environment based on other cultural and ethical foundations. The quantitative analysis employed a questionnaire consisting of closed and open-ended questions. Staff and students of the Faculty of Law Enforcement, University of Public Service, responded to the questionnaire. The responses were processed using statistical tests suitable for confirming or refuting a hypothesis. The new research findings indicate that it is worth considering how the six dimensions set up by Hofstede could improve law enforcement if incorporated into leadership awareness during leadership training.
Leadership in Developing a Strategy for Military Human Resource Management as Part of Capabilities-Based Defense Planning
The purpose of this article is to examine what attributes of a strategic leader, such as qualities, capabilities, and behaviors, matter for the development and implementation of a strategy for military human resource management examined within the capabilities-based defense planning process. Exploring the strategy algorithm presented here may offer military leaders new insight into the practical application of their specific characteristics in human resource management.
A review of the existing literature reveals little evidence of setting the development of a human resource management strategy in view of strategic leaders’ specific features. Therefore, this article provides a SWOT analysis for each phase of military personnel management as it is incorporated in the defense planning process, oriented toward developing requisite defense capabilities.
Leadership Theories and Defense Reform in the People’s Republic of China
The People’s Republic of China (PRC) is currently a hybrid social system that ideologically has retained the core values of the Marxist doctrine, which, unlike its predecessors, can adapt and innovate in response to changing circumstances. The Chinese Communist Party (CCP) and public administration underwent a series of deep reforms that enabled them to become a facilitator rather than a hindrance to development. The meritocratic leader selection system known as “selection and election,” consistent with the Confucian tradition and adopting some western leadership principles, played a significant role.
The People’s Liberation Army (PLA) is also considering the application of Western leadership principles not typically associated with the military. However, no evidence exists that the PLA systematically seeks to apply these concepts. The PLA is likely to complete defense reform and enhance the combat capabilities of its strategic and new types of forces, establishing a high level of strategic deterrence and complex systems for conducting joint combined operations. Towards that end, PLA applies Western non-military leadership principles and a mission-oriented leadership model, considering Chinese specificity.
Based on indirect Chinese, Russian, American, and Hungarian sources, the article presents contemporary Chinese socialism, analyzes the impact of political, social, economic, and defense reforms and the significance of leadership on China’s development, describes Western and Chinese leadership theories, and outlines China’s development prospects.
On the future of the PRC, the author states that, unlike other communist parties that gained power with foreign help, the CCP is indigenous and has national roots. Therefore, it is unlikely to collapse due to mass discontent. More likely, the Party will continue to transform the country and itself in the coming years and continue its rule. It is conceivable, however, that this transformation will eventually lead to a top-down revolution that will gradually break down the foundations of socialism.
Selective Leadership Expectations in a Multinational Force Context Examined through NATO Training
Military personnel with leadership roles may be expected to require some additional specialist training to be more effective in the NATO context, given its multinational environment. That includes the command of forces not necessarily from their own country. To describe and evaluate such leadership expectations, this article examines NATO training and uncovers the expectations defined by the training. The analysis of five courses offered by the NATO School Oberammergau helps determine these expectations in the specific areas for specific ranks and the value-added of the training and its content. For example, non-commissioned officers with ranks OR-4/OR-5 are expected to lead in interoperability, OR-6/OR-7 in rules of engagement, combating trafficking in human beings and tackling organized crime, and OR-8/OR-9 in international ethics and law of armed conflict. Commissioned officers with ranks OF-4/OF-9 are expected to lead in integrity-building and anti-corruption activities. Between 2015 and 2021, there have been a total of 1 555 trainees on these five courses that, given their ranks, could mean that they would be leading over 85 000 subordinates in deployment.
Future Development of Quantum Computing and Its Relevance to NATO
The first quantum computers are becoming a reality, and scientists working in various areas look forward to taking advantage of their enormous computational potential. At the same time, the high performance of quantum computers imposes serious risks for cybersecurity. We can expect an arms race between rival parties: a defensive side trying to ensure the privacy and dependability of stored and transmitted information and their adversaries. With this article, the authors aim to provide an overview of the status of quantum computer development, project the next steps, and investigate the impact future quantum systems may have on cybersecurity and military operations. We first discuss the basic aspects that differentiate quantum computing from classical computing and find that analogies between both domains are quite limited. The world of quantum computers is remarkably diverse already, and we elaborate that quantum simulators and universal quantum computers have “qubits” in common but still work in fundamentally different ways. Since security experts focus on upcoming trends in quantum computing, we take a look at the latest technologies and at the race for first reaching “quantum supremacy.” Finally, we provide a detailed analysis of the specific risks future quantum computers represent for established cryptosystems and conclude that asymmetric algorithms like the RSA protocol are particularly vulnerable. The dangers of quantum computing for cryptography are obvious, as is the high relevance of the safety of stored and transmitted data to the defense sector. However, we examine the capability spectrum of quantum technologies and discover that breaking asymmetric encryption algorithms is just one facet, and other features like Grover’s quantum algorithm may revolutionize the logistics of the armed forces. Satellite Quantum Key Distribution is another promising concept that may change the communication between military units. To NATO, quantum computing is a double-edged sword: the alliance needs to use the developments to benefit from the potential and be ready to counter the cyber threats. We derive ideas of what NATO should do in order to prepare for the quantum era.
Corruption as a Cybersecurity Threat in the New World Order
The important topic of cybersecurity relative to the fight against corruption in the context of global challenges in the pandemic and post-pandemic world requires further research. The purpose of this article is to identify and analyze current and prospective cybersecurity issues in this context by applying general-scientific and special-legal methods of cognition. Using the dialectical method, theoretical background, and contemporary views on ensuring cybersecurity served to investigate the key current challenges. Formal-legal and comparative methods allowed to recommend measures to enhance cybersecurity in view of the massive digitalization and social transformations. The authors emphasize the need to establish a national cybersecurity policy based on society’s information literacy and culture, combining respect to traditional and historical values with a modern understanding of multicultural communication and well-being.
Social Media – Hate Speech – Hate Crime
This article examines the issue of hate speech on social media from the perspective of the security system of the Czech Republic and its tools designed to provide internal security and the necessary legislative amendments to allow law enforcement agencies to address this issue effectively. In the current approach to cyberspace, social networks are becoming a vehicle for the persistent spreading of hate-based ideologies, and this needs to be prevented.
Disinformation: Policy Responses to Building Citizen Resiliency
Maligned actors use fake social media accounts and automated tools, also called computational propaganda, to launch disinformation operations. While technology companies and researchers continue to advance computational propaganda detection, they also know that eradicating social bots and disinformation is impossible. Since computational propaganda continues to increase, governments need to focus their efforts on developing policies that decrease citizen demand for disinformation. The purpose of this article is to explore disinformation at the intersection between technology and citizen resiliency. First, the current landscape will be explored to understand the impact of disinformation on society and its citizens. Second, the effect of technology on the supply of disinformation will be examined. Third, methods to decrease the demand for disinformation will be considered to increase citizen resiliency.
Cyber Skills Gaps – A Systematic Review of the Academic Literature
This literature review is part of research on the roles of and training for e-skills in modern society, specifically, the role of cyber skills. This article explores how the academic literature discusses cyber skills and identifies e-skills that can be determined as necessary for the functioning of society today. First, the introduction provides an explanation of the overall impact of cyber skills in our modern-day society. Next, the body presents the method used to conduct the review and a concise summary of the findings to answer our research questions. Finally, based on the research findings, the conclusions address the feasibility, impact, strengths, weaknesses, and possible ethical concerns.
Trusting ICT Providers – Can Corporate Cyber Confidence-Building Measures Help?
Trust in cyberspace is essential for increasing security and even more important when nations rely on private companies to develop, construct, maintain and operate their Information and Communication Technology infrastructures. This article proposes a redesigned form of Cyber Confidence-Building Measures to achieve this goal by including the private sector as a peer actor. Nations can use this method to vet their potential suppliers, so they may reduce their risk perception and establish and maintain a trustful relationship with them.
Evolution of Police Roles in Combatting Cybercrime in the Czech Republic, 2015-2020
The article reviews the expanding roles of the Police of the Czech Republic in countering cybercrime. The author emphasizes the importance of conceptual and strategic considerations underlying the emergence of new legislation, the financial support for purchasing new equipment, and the creation of new staff positions for professionals in cybercrime. Furthermore, it is of utmost importance to develop new strategies in line with the threats, challenges, and opportunities in cyberspace. Enhanced cooperation at all levels of the security system can facilitate the creation of strategies and thus make cyberspace a safer place.
Sovereign or Global Internet? Russia and China Press for Cybercrime Treaty
Under the guise of combating cybercrime, two radically different visions of cyberspace compete for attention on the international stage: a free-flowing model of cyberspace that democracies have championed is now challenged by a so-called sovereign model. Counter-democratic initiatives to reframe cyberspace in strictly national terms are underway with the likely result of decreased cooperation and increased risks of conflict and cybercrime.
Countering Crime, Hate Speech, and Disinformation in Cyberspace
Increased connectivity and open access to the Internet provide malicious actors with novel opportunities for intelligence gathering, attacks on vulnerable targets, and shaping mass perceptions and behavior. In the editorial article to this edition of Connections, the issue editors review recent and emerging security-related challenges and responses. The focus is on the increase in cybercrime, corruption, the spread of hate speech, propaganda, and disinformation. In addition, the contributors elaborate on prospective solutions such as strengthening the legal regimes, including international norms, instituting confidence-building measures, and enhancing cyber skills, as well as the challenges for defense posed by the advances in quantum computing.
Governance Challenges of Transformative Technologies
The rise of digital information and exponential technologies are transforming political/geopolitical, social, economic, and security arrangements. The challenges they pose to governance is unprecedented, distorting and used to manipulate public discourse and political outcomes. One of the most profound changes triggered by the unconstrained development of innovative technologies is the emergence of a new economic logic based on pervasive digital surveillance of people’s daily lives and the reselling of that information as predictive information. EU responses to this new environment have been slow and inadequate. Establishing effective controls over the actors and processes harnessing innovative technologies will require not only specialized data governance skills but a deeper understanding of the impact of these technologies, the forging of partnerships across the public-private divide, and the establishment of greater political and social accountability of corporate actors involved in their development and application.
Indonesian Intelligence Reform: Recent Challenges and Opportunities for Encouraging Democratic and Professional Intelligence
This article describes the dynamics of Indonesia’s intelligence reform from combatant intelligence posture during the post-independence revolution of 1945 to the authoritarian state intelligence under the New Order regime after 1965, and to the era of intelligence reform after the 1998 reformation movement. Recently, the challenges for Indonesian intelligence institutions have shifted from the need for legislation and political policies to the need for a democratic intelligence posture and the ability to face emerging security threats. Another challenge is the sectoral rivalry between the military, police, and strategic intelligence services, all of which are oriented towards internal security threats and domestic intelligence operations. Domestic threats form a contested operational domain, a ‘grey’ zones of defense, security, and intelligence threats.
Infogate Influences on Reforms of South Africa’s Intelligence Services
The hypothesis is that intelligence reform and intelligence sector reform result from traumatic catalyst rather than gradual evolution, reactionary rather than proactive, and not soon or quickly. The threat environment, an emergency, a necessity, e.g., democratization, gross failure, and scandals, are causes for reforms. The case is South African intelligence services. South Africa is significant due to diverse and constantly changing operational environments: the Cold War, decolonization of Africa, apartheid, post-Cold war, and post-Apartheid democratization. From the first non-military intelligence agency created in 1968, the Bureau of State Security, it was clear the nature of intelligence was such that the balance between secrecy, transparency, and accountability would always be a fine one to strike. The relationship between the political echelons, e.g., the Prime Minister and the Bureau’s Director, was too close and so allowed misuse of state funds. The uncovering of the abuse of state funds, the Infogate scandal, had an influence on subsequent reforms, including those for democratization to abolish apartheid and introduce a “one-man, one-vote democracy,” achieved in 1994. Reforms through legislation, jurisdictions, restructuring, micro-managing intelligence, merging apartheid and opposition intelligence services, and creating post-apartheid intelligence services are examined in this article. The experience teaches us that errors can be avoided by not making uncoordinated, piecemeal changes; every reform is unique and rarely easy; operationalizing legislative mandates of transformation is more difficult than anticipated. The reform process starts with reflecting the envisaged ideal situation, yet the outcome is not always as expected and thus requires more reforms.