Minimalist strategy: Conflict delegation and proxy use on transparent battlefields
In: Comparative strategy, Band 43, Heft 5, S. 524-546
ISSN: 1521-0448
17 Ergebnisse
Sortierung:
In: Comparative strategy, Band 43, Heft 5, S. 524-546
ISSN: 1521-0448
In: Journal of Strategic Security: JSS, Band 17, Heft 2, S. 130-134
ISSN: 1944-0472
In: Small wars & insurgencies, Band 35, Heft 6, S. 984-996
ISSN: 1743-9558
In: Journal of Strategic Security: JSS, Band 17, Heft 1, S. 137-139
ISSN: 1944-0472
In: The RUSI journal: publication of the Royal United Services Institute for Defence and Security Studies, Band 169, Heft 1-2, S. 62-74
ISSN: 1744-0378
In: Journal of Military Studies: JMS, Band 12, Heft 1, S. 1-17
ISSN: 1799-3350
Abstract
Current literature on proxy war tends to miss a set of key factors germane to the study and practice of proxy war. First, proxy wars are distinct from coalitions and alliances because proxy wars, unlike the latter, are rooted in offsetting one's own risk by offloading it to another actor. Next, analysing proxy relationships and risk through agency theory, network theory, and theories of power illuminate five basic models of proxy relationship – coerced, exploited, transactional, cultural and contractual. These models provide a new understanding of how strategic actors can best leverage a proxy. Moreover, these models provide a basic understanding of what specific types of proxies cannot do. For example, coerced and exploited proxies cannot be counted on for complicated work, or long-duration operations. Transactional proxies, given the business agreement between the principal and proxy, can be counted on to go to the razor's edge together. Nonetheless, task completion accelerates dyad divergence, and mission accomplishment usually results in transactional solvency. Cultural and contractual relationships are tight-bonded, facilitate complicated missions, and can operate for long periods of time. As a result, strategic actors looking to invest in proxy strategies are best served when utilising cultural or contractual proxies.
In: Comparative strategy, Band 42, Heft 5, S. 605-620
ISSN: 1521-0448
World Affairs Online
In: Small wars & insurgencies, S. 1-33
ISSN: 1743-9558
In: The RUSI journal: publication of the Royal United Services Institute for Defence and Security Studies, Band 166, Heft 6-7, S. 10-18
ISSN: 1744-0378
In: Journal of Military Studies: JMS, Band 10, Heft 1, S. 60-72
ISSN: 1799-3350
Abstract
As Montenegro sough to the North Atlantic Treaty Organization (NATO) in 2015, an attempted coup erupted within the country in October of that year. The Telegraph's Ben Farmer reported that, 'An officer with Russia's GRU military intelligence service, is accused of running a web of Serbian and Russian nationalists and paramilitaries who plotted to assassinate the Montenegrin prime minister.'
Farmer, B. (2017, February 26). Montenegro to Indict Russian Spy Behind Coup Plot. The Telegraph. Available at: http://www.telegraph.co.uk/news/2017/02/26/montenegro-indict-russian-spy-behind-coup-plot/. [accessed 5 March, 2017].
The failed coup and attempted assassination were conducted by Russian intelligence in support of Russian President Vladimir Putin's vision for a modern Eurasia in which NATO discontinues encroaching on Russia's sphere of influence and in which Russia ascends to regional hegemony.
Knezevic, G. (2017, January 2). Montenegro's NATO-Russia Chess Match. Radio Free Europe/Radio Liberty. Available at: http://www.rferl.org/a/montenegro-nato-russia-chess-match/28210094.html. [accessed 5 March, 2017].
Although unsuccessful, this covert operation—conducted by Russian intelligence working in conjunction with disaffected Russian partisans within Montenegro—to stymie NATO's expansion captures the essence of modern Russian hybrid warfare. Nevertheless, Montenegro is not unique, but instead is one of many recent hybrid conflicts propagated by the Russian government. Speaking on the spectre of Russian operations in Eastern Europe, American general Michael Williamson commented, 'In terms of state-based challenges, Russia's purported annexation of Crimea and invasion of Ukraine demonstrated a sophisticated combination of diplomatic, informational, military, and economic means to achieve objectives below a threshold that the Russian leadership believe would elicit a concerted NATO response.'
Lt. Gen. Michael Williamson, Lt. Gen. H. R. McMaster, Lt. Gen. Joseph Anderson, and Lt. Gen. John Murray, statement to the Subcommittee on AirLand, Committee on Armed Services, United States Senate, on Army Modernization in Review of the Defense Authorization Request for Fiscal Year 2017, Second Session, 114th Congress, 5 April 2016.
Since 2008, Russia's operations throughout Europe, its Near Abroad and Syria signal an evolved approach to the conduct of war. Many terms and phrases have been attributed to Russia's evolved model of war to include Grey Zone conflict and new generation warfare. However, hybrid war or hybrid warfare is quite useful, despite the contention the term generates. The term hybrid warfare is useful because it speaks of the bundling of capabilities, technology and ideas in a coherent, purposeful manner to accomplish tactical, operational and strategic objectives on behalf of policymakers and strategists.
The work starting position is that the Russian hybrid warfare is in fact an applied way of war. Despite many arguments to the contrary, Russia's applied way of war introduces important nuances to the conduct of war. Resultantly, the purpose of this work is to clarify the concept of Russian hybrid warfare and to identify the characteristics that make it worthy of examination.
Two basic methods exist to explain an observable way of war. The first is to paraphrase existing primary source information on the subject. This method requires access to primary source information and the physical ability to read that material. That method is not employed in this work because access to Russian strategic and tactical doctrine is not readily available to the layperson. Furthermore, in many cases doctrine is a preferred way of war-fighting, a narrative and tied to procurement strategies, and thus, not an applied method. Therefore, merely relying on doctrine or policy statements can mislead the researcher about the true character of a given way of war.
That notwithstanding, the second method is to observe the phenomenon in multiple situations over a period of time. In doing so, the observer seeks to identify trends, inconsistencies, rules, relationships, reactions and boundaries that surface and recur therein and then generate an over-arching assessment about that phenomenon's boundaries and inner workings. That is the technique employed here.
In: International economics and economic policy, Band 13, Heft 2, S. 255-281
ISSN: 1612-4812
In: The journal of developing areas, Band 44, Heft 1, S. 287-302
ISSN: 1548-2278
This study examines whether governments in the Caribbean systematically attempt to alter voter preferences through the use of fiscal and monetary policy tools during election periods. It also investigates whether governments reverse their pre-election excesses in the year after a general election. I estimate a variant of the Nordhaus politico-economic model for selected Caribbean countries. The Arellano-Bond dynamic panel estimator is employed to empirically test this model, and the results indicate that there is evidence to suggest that Caribbean governments pursue electorally timed interventions in fiscal and monetary instruments but do not reverse their policies in the aftermath of an election.
In: Marine corps gazette: the Marine Corps Association newsletter, Band 91, Heft 2, S. 15-16
ISSN: 0025-3170
In: Journal of Military Studies: JMS, Band 11, Heft 1, S. 8-22
ISSN: 1799-3350
Abstract
This paper examines the relationship between Western military doctrine, international law, and the impact of sieges in war. This paper examines three case studies – the battles of Mosul (2016–2017), the Second Battle of Donetsk Airport (2014–2015), and Ghouta – to analyze the effect of international law on the conduct of sieges and how that impacts the attacker, the besieged, and the innocent bystanders. In the end, we find that Western military doctrine is inadequate to address siege situations, which in turn can result in mishandling siege situations from an international law standpoint. Additionally, we find that international law, as well as applied law, provides the actors therein sufficient leeway to create the conditions for the siege to continue to be used well into the future.
In: Review of African political economy, Heft 14, S. 3-15
ISSN: 0305-6244
World Affairs Online