Miroslav Mitrović

DOI Number
First page
Last page


Contemporary global security environment could be labeled as complex, dynamic, multidimensional and ‘’beyond limits’’ of conventional understanding of Warfare. Diversity of threat forms and its interactions and non-conventionality contribute that most of the actual security crises and conflicts are marked as Hybrid security endangering, or Hybrid Warfare. Globalised tehnology introduce new ‘’battlefild’’ in global digital arena. Massive application of information and communication technology has brought about new risks and threats represented by physical and software related dangers to critical information infrastructure and cyberspace that are of relevance to the nation and its security. In same hand, wolnurability and inportance of Cyber space tends to provoke necessity for ultimate resilaince copabilities against ataks and informational warfare. Hybrid form and asimetrical nature of endangerment of Cyber space which is crutial for national defence copabilites, rised analiticial approach to the political, security and organizational forms as well as clasification of threats in cyber space which were elaborated in this paper. Authors’ contribute to the understunding of threats in Cyber secyrity arena, trough analyses of China PLA approach to the subject. In addition, unique contribution is given with analyses of Cyber-Information Warfare during 1999 NATO aggression to the Federal Republic of Yugoslavia.


hybrid warfare, cyber security, informational security, cyber-informational operation.

Full Text:



Arquilla, J., Ronfeldt, D., (1995). Networks and Netwars-Comparative Strategy, Volume 12, Santa Monica, CA: Rand.

Barić S., (2010). „Vojne strategije i asimetrično ratovanje” [Military strategy and asimetric warfare], Nаtional Security and the Future, 4 (11), Zagreb.

Berzins, J., (October 11, 2016). Russia’s New Generation Warfare, http//www.thepotomacfoundation.org/The New Generation of Russian WarfareThe Potomac Foundation.htm

Bruzdzinski, J., (2004). Demystifying Shashoujian: China's “Assassin's Mace”, Civil-Military Change in China-Elites, Institutes, and Ideas after the 16th Party Congress, Strategic Studies Institute, U.S. Army War College.

Chekinov S.G., Bogdanov S.A., (2013). “The Nature and Content of a New-Generation War, Voyennamysl, No.4, October 2013. Retrieved from, http://www.eastviewpress.com/Files/MT_FROM%20THE%20CURRENT%20ISSUE_No. 4_2013.pdf

DOD- Department of Defense of US Government, (2007). Irregular Warfare (IW)-Joint Operating Concept (JOC), 2007, Washington, DC.

FMI- Federal Ministry of Interior (2011). Cyber Security Strategy for Germany. Retrieved from, http://www.cio.bund.de/.../css_engl_download.pdf?.

GAO-General Accounting Office (1998). Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety. Retrieved from, www.gao.gov/archive/1998/ai98155.pdf‎.

Gerasimov, V., (2013). “The Value of Science in Foresight: New Challenges Require Rethinking on the Forms and Methods of Warfare,” Voroshilov General Staff Academy conference, reprinted in Military Industrial Kurier, (27 Feb. 2013). Retrieved from, http://vpknews. ru/sites/default/files/pdf/VPK_08_476.pdf .

Harmon, A., (April 1, 1999) : “Serbs’ Revenge: NATO Web Site Zapped“, New York Times.

Hart, L., (1954). "The Strategy of Indirect Approach", National War College Internet Archive.

Hathaway A., Crootof, R., (2012). ‘’Тhe law of cyber attack’’. California Law Review, Retrieved from, http://www.californialawreview.org/assets/pdfs/100-4/02-Hathaway.pdf.

Hoffman, F., (2007). Conflict in the 21st Century: The Rise of Hybrid Wars. Institute for Policy Studies Arlington, VA: Potomac.

Hollis, D., (2007). ‘’Why States Need an International Law for Information Operations’’, 11 Lewis & Clark L. Rev. 1023-1042. Retrieved from, http://www law.lclark.edu/live/files/9551-lcb114art7hollispdf‎.

Hubbard, Z., (1999). “Information Warfare in Kosovo“, Journal of Electronic Defense, November 1999, Vol. 22, No. 11.

Janczewski, L., Colarik, A., (2008). Cyber Warfare and Cyber Terrorism, Information Science Reference.

JCS-US Army Joint Chiefs of Staff (1998). Joint Pub 3-13: Joint Doctrine for Information Operations.

Larsen, A., (2000). Serbian Information Operations During Operation Allied Force, Air Command and Staff College, Air University, Maxwell Air Force Base, Alabama.

Liang, Q., Xiaosui, W., (1999). Unlimited Warfare. Bejing.

McCulloh, T., Johnson, R., (2016). Hybrid Warfare. JSOU, Tampa.

Miljković, М., (2012). „Ocene SAD o sposobnosti Narodno-oslobodilačke armije Kine (NOAK) za izvođenje sajber špijunaže” [US evaulation of capabilities of Chinese People’s Liberation Army (PLA) for implementation of Cyber espionage actions]. Vojno delo, Belgrad, Summer/2012.

Mitrović, M., (2017 a). "Hybrid warfare and asymmetric security threats".Vojno delo No 5/2017, Belgrade.

Mitrović, M., (2017 b). ‘’Hybrid Security Threats and Contemporary approach to National Security’’, Thematic Conference Proceedings of International Significance, International Conference ‘’Archibald Reiss Days’’, Academy of Criminal and Police Studies, Belgrade, Vol 1. p. 337-345.

Mitrović, M., (2017 c). ‘’Economic and energy aspects of a hybrid endangering of national security'', Vojno delo, No 6/2017: Belgrade.

Mitrović, M., (2018d). ‘’Public Diplomacy in paradigm of Hybrid conflict concept’’, Vojno delo No 2/2018.

Mulvenon, J., (1998). The PLA and Information Warfare- Mulverton, The People’s Liberation Army in the Information Age, RAND, Santa Monica.

Petrović, L., (2012). „Informaciona bezbednost – pravni, ekonomski i tehnički aspekt” [Information security-law, economu and technical aspects], Informaciona bezbednost 2012 – naučno-stručni skup, Beograd.

Reisdorff, N., (2003). Winning the hundred battles-China and asymmetric warfare. US Army Command and General Staff College, Forth Leavenworth.

Renz, B., Smith, H., (2016). Russia and Hybrid Warfare–Going beyond the Label. Finnish Prime Minister’s Office, Government’s analysis.

Retrieved from,

Sinkovski, S., (2005). „Informaciona bezbednost – komponenta nacionalne bezbednosti” [Information security-component of national security]. Vojno delo, 2/2005, Belgrad.

Thomas L.T., (1996). “Russian Views on Information-based Warfare“, Airpower Journal-Special Edition.

UK OCS-UK Office of Cyber Security (2009). Cyber Security Strategy of the United Kingdom. Retrieved from, http://www.official-documents.gov.uk/document/cm76/7642/7642.pdf.

UKG-United Kingdom Govermant (November 2011). Cyber Security Strategy, Protecting and promoting the UK in a digital world. Retrieved from, https://www.gov.uk/government/.../uk-cyber-security-strategy-final.pdf‎.

Watson, J., (2017). “Sun Tzu's Art of War - Chapter 3: Attack by Stratagem”. Retrieved from http://suntzusaid.com/book/3.

Zaitsev, A., (2014). Partisan Warfare: The modern army should know how to fight without front lines, MIC Media in English Translation, 3 September 2014. Retrieved from, http://www.vpk-news.ru/articles/21649.

DOI: https://doi.org/10.22190/TEME1804359M


  • There are currently no refbacks.

© University of Niš, Serbia
Creative Commons licence CC BY-NC-ND
Print ISSN: 0353-7919
Online ISSN: 1820-7804