Skip to main content

The Promise, Practice and Challenges of Non-Kinetic Instruments of Power

  • Chapter
  • First Online:
Netherlands Annual Review of Military Studies 2017

Part of the book series: NL ARMS ((NLARMS))

Abstract

‘The realm of strategy’, to quote Lawrence Freedman, ‘is one of bargaining and persuasion as well as threats and pressure, psychological as well as physical effects, and words as well as deeds. This is why strategy is the central political art. It is about getting more out of a situation than the starting balance of power would suggest. It is the art of creating power.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 64.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Freedman 2013, p. xii.

  2. 2.

    In addition to Chap. 6 in this volume by Francesco Giumelli, see for a recent excellent overview Biersteker et al. 2016.

  3. 3.

    Zarate 2013.

  4. 4.

    US Army 2013, p. 1-1.

  5. 5.

    Osinga 2006.

  6. 6.

    Campen 1992.

  7. 7.

    Arquilla and Ronfeldt 1993, 1997.

  8. 8.

    Gray 1997.

  9. 9.

    Gray 1997, pp. 38–40.

  10. 10.

    Ignatieff 2000.

  11. 11.

    Nye 2011, p. 19.

  12. 12.

    McMaster 2009, pp. xi–xii.

  13. 13.

    North Atlantic Treaty Organisation 2009.

  14. 14.

    Armistead 2004, p. 13. Similarly see Arquilla and Ronfeldt 1997; Castells 2000; Toffler 1995; Mann 2012.

  15. 15.

    Diamond 2016; Polyakova et al. 2016; Giles 2016; Munich Security Conference Report 2017; Meister and Puglierin 2015; Naja 2015, p. 2; Ambrosio 2016; Harding 2014; NATO Parliamentary Assembly 2015; Foster and Holehouse 2016.

  16. 16.

    Betz 2008.

  17. 17.

    Brooking and Singer 2016.

  18. 18.

    McCauley 2015.

  19. 19.

    Freedman 2006.

  20. 20.

    Phares 2007; Juergensmeyer 2003, pp. 148–163.

  21. 21.

    Among the abundance of studies on this, see for instance Farwell 2014; Ingram 2015.

  22. 22.

    Galula 2005, pp. 14–15.

  23. 23.

    Galula 2005, pp. 14–15.

  24. 24.

    Kurth Cronin 2006.

  25. 25.

    Kaufman 2006; Jackson and Dexter 2014.

  26. 26.

    Friis 2015.

  27. 27.

    Klausen 2015.

  28. 28.

    Kirshner 1997; Brooks 2002.

  29. 29.

    Byman and Waxman 1999, 2000; Posen 2000.

  30. 30.

    For an argument to at least make the effort, see Long and Wilner 2014.

  31. 31.

    Wilner 2011, 2013; Adamsky 2017; Rid 2012.

  32. 32.

    For an extensive reconstruction of these activities, see Osnos et al. 2017.

  33. 33.

    See for instance National Cyber Security Centre 2016.

  34. 34.

    Rid 2011; Libicki 2009.

  35. 35.

    Lamb and Munsing 2011; Gomez 2011.

  36. 36.

    See Paris and Sisk 2009.

  37. 37.

    See de Coning and Friis 2011.

  38. 38.

    Ringsmose and Børgesen 2011; Dimitriu 2011.

  39. 39.

    This draws from an excellent wide-ranging overview of models and theories by Darnton 2008, pp. 5–9; as well as Larson et al. 2009, pp. 11–17.

  40. 40.

    Payne 2011, p. 402.

  41. 41.

    This is a brief summary of a series of Expectancy Value related models that add the impact of the social environment to economic models of behaviour. See Darnton 2008, pp. 11–26.

  42. 42.

    Payne 2011, pp. 404–405.

  43. 43.

    Levy 1997. See also his treatment of decision making theories in Levy and Thompson 2010, Chapters 3–7.

  44. 44.

    See Levy and Thompson 2010, pp. 133–150. See also Jervis et al. 1985.

  45. 45.

    Larson et al. 2009, p. xix. See also Tatham and Giles 2015.

  46. 46.

    Farwell and Arakelian 2016, p. 74.

  47. 47.

    US Army 2013.

  48. 48.

    See also Helmus et al. 2007.

  49. 49.

    Braddock and Horgan 2016, p. 400.

  50. 50.

    Jackson 2016.

  51. 51.

    Larson et al. 2009, p. xx.

References

  • Adamsky D (2017) From Israel with Deterrence: Strategic Culture, Intra-war Coercion and Brute Force. Security Studies 26(1):157–184

    Google Scholar 

  • Ambrosio T (2016) The rhetoric of irredentism: The Russian Federation’s perception management campaign and the annexation of Crimea. Small Wars & Insurgencies 27(3):467–490

    Google Scholar 

  • Armistead L (2004) Information Operations, Warfare and the Hard Reality of Soft Power. Brassey’s, Washington DC

    Google Scholar 

  • Arquilla J, Ronfeldt D (1993) Cyberwar is coming! Comparative Strategy 12(2):141–165

    Google Scholar 

  • Arquilla J, Ronfeldt D (eds) (1997) In Athena’s Camp - Preparing for Conflict in the Information Age. RAND, Santa Monica

    Google Scholar 

  • Betz D (2008) The virtual dimension of contemporary insurgency and counterinsurgency. Small Wars and Insurgencies 19(4):513–543

    Google Scholar 

  • Biersteker T, Eckert S, Tourinho M (2016) Targeted Sanctions - The Impact and Effectiveness of United Nations Action. Cambridge University Press, Cambridge

    Google Scholar 

  • Braddock K, Horgan J (2016) Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism. Studies in Conflict & Terrorism 39(5):381–404

    Google Scholar 

  • Brooking ET, Singer PW (2016) War Goes Viral, How social media is being weaponized across the world. The Atlantic (Nov 2016) http://www.theatlantic.com/magazine/archive/2016/11/war-goes-viral/501125/ Accessed 1 March 2017

  • Brooks R (2002) Sanctions and Regime Type: What Works, and When? Security Studies 11(4):1–50

    Google Scholar 

  • Byman D, Waxman M (1999) Defeating US Coercion. Survival 41(2):107–120

    Google Scholar 

  • Byman D, Waxman M (2000) Kosovo and the Great Air Power Debate. International Security 24(4):5–38

    Google Scholar 

  • Campen AD (ed) (1992) The First Information War: The Story of Communications, Computers and Intelligence Systems. AFCEA International Press, Fairfax, VA

    Google Scholar 

  • Castells M (2000) The Rise of the Network Society - The Information Age: Economy, Society and Culture. Volume 1, 2nd edn. Blackwell, Malden

    Google Scholar 

  • Cronin AK (2006) Cyber-mobilization: The New Levee en Masse. Parameters 36(2):77–87

    Google Scholar 

  • Darnton A (2008) GSR Behaviour Change Knowledge Review. University of Westminster, http://www.gsr.gov.uk. Accessed 23 July 2008

  • de Coning C, Friis K (2011) Coherence and Coordination - The Limits of the Comprehensive Approach. Journal of International Peacekeeping 15: 243–272

    Google Scholar 

  • Diamond L (2016) Russia and the Threat to Liberal Democracy. The Atlantic (9 Dec 2016) http://www.theatlantic.com/international/archive/2016/12/russia-liberal-democracy/510011/ Accessed 1 March 2017

  • Dimitriu GR (2011) Winning the story war: Strategic communication and the conflict in Afghanistan. Public Relations Review 38:195–207

    Google Scholar 

  • Farwell JP (2014) The Media Strategy of ISIS. Survival 56(6):49–55

    Google Scholar 

  • Farwell JP, Arakelian DJ (2016) Using Information in Contemporary War. Parameters 46(3):71–86

    Google Scholar 

  • Foster P, Holehouse M (2016) Russia accused of clandestine funding of European parties as US conducts major review of Vladimir Putin’s strategy. The Telegraph (16 January 2016)

    Google Scholar 

  • Freedman L (2006) The Transformation of Strategic Affairs. Adelphi Paper no. 379 (March). IISS, Oxford University Press, Oxford

    Google Scholar 

  • Freedman L (2013) Strategy - A History. Oxford University Press, Oxford

    Google Scholar 

  • Friis SM (2015) Beyond anything we have ever seen: beheading videos and the visibility of violence in the war against ISIS. International Affairs 91(4):725–746

    Google Scholar 

  • Galula D (2005) Counterinsurgency Warfare: Theory and Practice. Praeger, New York

    Google Scholar 

  • Giles K (2016) Russia’s ‘New’ Tools for Confronting the West; Continuity and Innovation in Moscow’s Exercise of Power. Chatham House, RIIA, London

    Google Scholar 

  • Gomez J (2011) The Targeting Process: D3A and F3EAD. Small Wars Journal, 16 July 2011

    Google Scholar 

  • Gray CH (1997) Postmodern War, the New Politics of Conflict. Routledge, London

    Google Scholar 

  • Harding L (2014) We Should Beware Russia’s Links with Europe’s Right. The Guardian (8 December 2014)

    Google Scholar 

  • Helmus T, Paul C, Glenn R (2007) Enlisting Madison Avenue, the marketing approach to earning popular support in theaters of operation. RAND, Santa Monica

    Google Scholar 

  • Ignatieff M (2000) Virtual War: Kosovo and Beyond. Penguin, London

    Google Scholar 

  • Ingram HJ (2015) The strategic logic of Islamic State information operations. Australian Journal of International Affairs. 69(6):729–752

    Google Scholar 

  • Jackson CF (2016) Information Is Not a Weapons System. Journal of Strategic Studies 39(5–6):820–846

    Google Scholar 

  • Jackson R, Dexter H (2014) The Social Construction of Organized Political Violence: An Analytical Framework. Civil Wars 16(1):1–23

    Google Scholar 

  • Jervis R, Lebow RN, Stein JG (eds) (1985) Psychology of Deterrence. Johns Hopkins University Press, Baltimore

    Google Scholar 

  • Juergensmeyer M (2003) Terror in the Name of God. 3rd edn. University of California Press, Berkeley

    Google Scholar 

  • Kaufman S (2006) Symbolic Politics or Rational Choice? Testing Theories of Extreme Ethnic Violence. International Security 30(4):45–86

    Google Scholar 

  • Kirshner J (1997) The Microfoundations of Economic Sanctions. Security Studies 6(3):32–64

    Google Scholar 

  • Klausen J (2015) Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1):1–22

    Google Scholar 

  • Lamb C, Munsing E (2011) Secret Weapon: High Value Target Teams as an Organizational Innovation. NDU Press, Washington DC

    Google Scholar 

  • Larson EV, Darilek RE et al (2009) Foundations of Effective Influence Operations: A Framework for Enhancing Army Capabilities. RAND, Santa Monica

    Google Scholar 

  • Levy J (1997) Prospect theory, rational choice, and international relations. International Studies Quarterly 41(March):87–112

    Google Scholar 

  • Levy J, Thompson W (2010) Causes of War. Wiley-Blackwell, Oxford

    Google Scholar 

  • Libicki M (2009) Cyberdeterrence and cyberwar. RAND, Santa Monica

    Google Scholar 

  • Long JM, Wilner AS (2014) Delegitimizing al-Qaida: Defeating an ‘Army Whose Men Love Death’. International Security 39(1):126–164

    Google Scholar 

  • Mann M (2012) The Sources of Social Power: Volume 4, Globalizations, 1945-2011. Cambridge University Press, Cambridge

    Google Scholar 

  • McCauley T (2015) The war of ideas on the Internet: An asymmetric conflict in which the strong become weak. Dynamics of Asymmetric Conflict 8(1):79–90

    Google Scholar 

  • McMaster HR (2009) Foreword. In: David GJ, McKeldin TR (eds) Ideas as Weapons: Influence and Perception in Modern Warfare. Potomac Books, Washington DC

    Google Scholar 

  • Meister S, Puglierin J (2015) Perception and Exploitation: Russia’s Non-Military Influence in Europe. DGAP kompakt Nr.10 (October 2015) http://www.dgap.org/en/article/getFullPDF/27185 Accessed 1 March 2017

  • Munich Security Conference Report 2017, Post-Truth, Post-West, Post-Order? (February 2017)

    Google Scholar 

  • Naja B (2015) Understanding propaganda and disinformation. At a glance, European Parliamentary Research Service (13 November 2015) http://www.epthinktank.eu/2015/12/01/russia-manipulation-of-information-and-the-eus-response/ Accessed 1 March 2017

  • NATO (2009) Allied joint doctrine for counterinsurgency (COIN) AJP 3.4.4 (Ratification Draft 1) Brussels

    Google Scholar 

  • NATO Parliamentary Assembly (2015) Annual report. The battle for the hearts and minds: countering propaganda attacks against the Euro-Atlantic Community. http://www.nato-pa.int/default.asp?SHORTCUT=4012 Accessed 7 March 2017

  • National Cyber Security Centre (2016) Cyber Security Assessment Netherlands 2016. Ministry of Security and Justice, The Hague (The Netherlands) http://www.ncsc.nl/english/current-topics/Cyber+Security+Assessment+Netherlands/cyber-security-assessment-netherlands-2016.html Accessed 10 March 2017

  • Nye J (2011) The Future of Power. Public Affairs Books, New York

    Google Scholar 

  • Osinga F (2006) Science, strategy and war, the strategic theory of John Boyd. Routledge, Abingdon

    Google Scholar 

  • Osnos E, Remnick D, Yaffa J (2017) Trump, Putin, and the New Cold War. The New Yorker (7 March 2017)

    Google Scholar 

  • Paris R, Sisk T (2009) The Dilemmas of Statebuilding. Routledge, Abingdon

    Google Scholar 

  • Payne KB (2011) Understanding Deterrence. Comparative Strategy 30(5):393–427

    Google Scholar 

  • Phares W (2007) The War of Ideas, Jihadism against Democracy. Palgrave McMillan, New York

    Google Scholar 

  • Polyakova A et al (2016) The Kremlin’s Trojan Horses. Atlantic Council, Washington DC (November) http://www.atlanticcouncil.org/publications/reports/kremlin-trojan-horses Accessed 1 March 2017

  • Posen B (2000) Serbia’s Political Military-Strategy. International Security 24(4):39–84

    Google Scholar 

  • Rid T (2011) Cyber War Will Not Take Place. Journal of Strategic Studies 35(1):5–32

    Google Scholar 

  • Rid T (2012) Deterrence beyond the State: The Israeli Experience. Contemporary Security Policy 33(1):124–147

    Google Scholar 

  • Ringsmose J, Børgesen BK (2011) Shaping public attitudes towards the deployment of military power: NATO, Afghanistan and the use of strategic narratives. European Security 20(4):505–528

    Google Scholar 

  • Tatham S, Giles K (2015) Training Humans for the Human Domain. US Army War College Press, Carlisle, PA

    Google Scholar 

  • Toffler A (1995) War and Anti-War. Warner Books, New York

    Google Scholar 

  • US Army (2013) Field Manual FM 3-13 Inform and Influence Activities. Headquarters Department of the Army, Washington DC (January)

    Google Scholar 

  • Wilner AS (2011) Deterring the Undeterrable: Coercion, Denial, and Delegitimization in Counterterrorism. Journal of Strategic Studies 34(1):3–37

    Google Scholar 

  • Wilner A (2013) Fencing in Warfare: Threats, Punishment, and Intra-war Deterrence in Counterterrorism. Security Studies 22(4):740–772

    Google Scholar 

  • Zarate J (2013) Treasury’s War - The Unleashing of a New Era of Financial Warfare. Public Affairs, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Frans P. B. Osinga .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 T.M.C. Asser Press and the authors

About this chapter

Cite this chapter

Osinga, F.P.B. (2017). The Promise, Practice and Challenges of Non-Kinetic Instruments of Power. In: Ducheine, P., Osinga, F. (eds) Netherlands Annual Review of Military Studies 2017. NL ARMS. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-189-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-94-6265-189-0_1

  • Published:

  • Publisher Name: T.M.C. Asser Press, The Hague

  • Print ISBN: 978-94-6265-188-3

  • Online ISBN: 978-94-6265-189-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics