This is an outdated version published on 03.03.2023. Read the most recent version.

HYBRID WARFARE IN THE BALTIC SEA. OUTLINE OF THE PROBLEM FOR THE SECURITY OF THE REPUBLIC OF POLAND

Authors

DOI:

https://doi.org/10.34739/dsd.2022.02.04

Keywords:

The Baltic Sea, Hybrid Threats, Hybrid Warfare, information activities, international dispute, national interests

Abstract

The aim of this article is present possible scenarios in the Baltic Sea as a result of hybrid activities. At present in the literature of the subject Hybrid Threats - the Russian Federation especially in the aspect of the annexation of Crimea, reinforce the belief in the effectiveness of such actions. Most often it is presented that these are hidden actions, ambiguous, and thus causing difficulties in interpretation as to the act of the aggressor. Therefore, governments face the challenge of maintaining the current status quo and jointly try to develop effective tools to counteract such threats. It needs to be emphasized that the determination of states in achieving their national goals causes them to use tools from the political, economic and information fields as a cheaper alternative to military instruments. In addition, it should be emphasized that in the aspect of the Baltic Sea, excessive exploitation of living and non-living resources causes its continuous degradation. Therefore, in order to maintain international order in this basin, states and international organizations issue various types of laws and regulations to protect their interests and prevent further degradation of the natural environment. Due to their imperfection, they are subject to constant verification and updating, and in extreme cases may constitute an international dispute.

Downloads

Download data is not yet available.

Published

03.03.2023

Versions

How to Cite

Keplin, J. (2023). HYBRID WARFARE IN THE BALTIC SEA. OUTLINE OF THE PROBLEM FOR THE SECURITY OF THE REPUBLIC OF POLAND. De Securitate Et Defensione. Security and Defense Journal, 8(2). https://czasopisma.uws.edu.pl/desecuritate/article/view/3251