Operational control over non-state proxies
Journal Title: Security and Defence Quarterly - Year 2020, Vol 31, Issue 4
Abstract
The intention of this paper is to clarify how state patrons control non-state proxy forces fighting on their behalf. In order to address the subject matter thoroughly, specific attention was paid to a number of questions including a) the criteria determining patronproxy relations, b) factors influencing the selection process of proxy forces, and c) principles governing the maximisation of potential benefits of using proxies, whilst simultaneously reducing risks and associated costs. The author applied a neo-realistic research paradigm to his work. Patron-proxy relations were presented in the context of the principal-agent theory, as well as through detailed analysis of ongoing scenarios involving Iran and Hezbollah, Russia and the Donbass separatists, Pakistan and Kashmiri militias, the US and Syrian rebels. The essence of war by proxy is to influence the strategic result of an armed conflict without direct, full-scale, military intervention. The use of non-state proxy, external actors is aimed at maximising their political goals and strategic interests whilst maintaining “plausible deniability”. By supporting non-state proxies, indirectly or by providing limited direct assistance, sponsors operate below the threshold of war. Empirical analysis of proxy war cases proves that such models may both guarantee “strategic victory” or become a “double-edged sword”. One of the key challenges for external powers engaged in war by proxy is to avoid unintended consequences (blowback). The author argues that elements such as ideology, ethnicity or religion do not necessarily ensure control over proxies, whilst the range of common goals and interests, and the level of the proxy’s dependency, are crucial.
Authors and Affiliations
Filip Bryjka
U.S. Grand Strategy Towards Russia 2001-2017
U.S. foreign policy towards Russia is of the utmost importance for the national security of the countries on the NATO eastern flank. Grand strategies are among the analytical concepts for classification and analysis of U...
Non-military determinants of the Russian Federation policy
This study analyses various non-military factors in shaping the security policy of the Russian Federation. This work undertakes to establish their substance, content and scope, and to draw the conditions and trends in th...
Foreword to the Special Issue ‘Proxy forces in modern warfare’: Practitioner’s perspective on the use of proxy forces
This article is foreword to the Special Issue ‘Proxy forces in modern warfare’: Practitioner’s perspective on the use of proxy forces.
Defence diplomatic relations between Poland and China and how they can be improved
The main purpose of the article is to examine diplomatic relations between China (official name: the People’s Republic of China) and Poland with a special focus on defence. It also gives an overall assessment of the rela...
Modelling computer networks for further security research
Computer networks are usually modelled from one aspect, e.g., the physical layer of the network, although this does not allow the researcher to understand all usage of that device. We aim to develop a model which leverag...