ArticlePDF Available

What is (not) asymmetric conflict? From conceptual stretching to conceptual structuring

Authors:

Abstract and Figures

In the second half of the 1990s, the label “asymmetric” conflict rose to prominence among scholars and strategists, as a term for capturing the rising challenge that violent non-state actors posed to the liberal world order. However, the concept soon became a catch-phrase for a range of disparate phenomena, and other buzzwords arose to describe the threats of concern to decision-makers. Conceptual confusion beset the field. This article dissects the notion of asymmetric conflicts, and distinguishes between asymmetries involving differences in (1) status, (2) capabilities, or (3) strategies between belligerents. It argues that “asymmetric” conflicts can take numerous forms depending on the combination of differences present, and offers a blue-print for keeping track of the meaning of this concept in the hope of bringing greater precision to future debates.
Content may be subject to copyright.
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.com/action/journalInformation?journalCode=rdac20
Dynamics of Asymmetric Conflict
Pathways toward terrorism and genocide
ISSN: 1746-7586 (Print) 1746-7594 (Online) Journal homepage: https://www.tandfonline.com/loi/rdac20
What is (not) asymmetric conflict? From
conceptual stretching to conceptual structuring
Christofer Berglund & Emil Aslan Souleimanov
To cite this article: Christofer Berglund & Emil Aslan Souleimanov (2019): What is (not)
asymmetric conflict? From conceptual stretching to conceptual structuring, Dynamics of
Asymmetric Conflict, DOI: 10.1080/17467586.2019.1680855
To link to this article: https://doi.org/10.1080/17467586.2019.1680855
© 2019 The Author(s). Published by Informa
UK Limited, trading as Taylor & Francis
Group.
Published online: 04 Nov 2019.
Submit your article to this journal
View related articles
View Crossmark data
What is (not) asymmetric conict? From conceptual stretching
to conceptual structuring
Christofer Berglund
a
and Emil Aslan Souleimanov
b
a
Department of Global Political Studies, Malmö University, Malmö, Sweden;
b
Institute of Political Studies,
Charles University, Jinonice, Praha, Czechia
ABSTRACT
In the second half of the 1990s, the label asymmetricconict rose
to prominence among scholars and strategists, as a term for captur-
ing the rising challenge that violent non-state actors posed to the
liberal world order. However, the concept soon became a catch-
phrase for a range of disparate phenomena, and other buzzwords
arose to describe the threats of concern to decision-makers.
Conceptual confusion beset the eld. This article dissects the notion
of asymmetric conicts, and distinguishes between asymmetries
involving dierences in (1) status, (2) capabilities, or (3) strategies
between belligerents. It argues that asymmetricconicts can take
numerous forms depending on the combination of dierences
present, and oers a blue-print for keeping track of the meaning
of this concept in the hope of bringing greater precision to future
debates.
ARTICLE HISTORY
Received 15 May 2019
Accepted 10 October 2019
KEYWORDS
Asymmetric conict;
non-state actor;
insurgencies; terrorism;
concept structure
Introduction
As the Cold War drew to a close in the late-1980s, clashes involving direct battles between
centralised state armies became a more distant prospect, and irregular conicts emerged
as the main challenge to the liberal world order (OECD, 2012, p. 18). Scholars and
government-aliated strategists in the West scrambled to nd labels for describing the
threat emanating from violent non-state actors, often possessing weak capabilities, but
organised in a decentralised fashion and adept at adapting their strategies to make the
most of their position as an underdog. Some identied this turn of events as fourth-
generation warfare(Lind, Schmitt, & Wilson, 1989), others considered them emblematic
of low-intensity conicts(Dixon, 1989), small wars(Olson, 1990), protracted social
conicts(Azar, 1990), or new wars(Kaldor, 1999). Still others preferred to call them
asymmetric conicts(Mitchell, 1991). Use of the latter concept peaked in the late-1990s,
when asymmetricwarfare could refer to terror attacks, rebel bombings, computer
viruses, nuclear proliferation and everything in-between, as long as antagonists failed to
ght fair(Wilson, 1998)ordeviated from the norm(Grange, 2000).
Intellectuals engaged in this debate often presented asymmetric warfare as a recent
phenomenon, dierent from the traditional conicts of the past, when frontlines had
been transparent (see, for instance, Kaldor, 1999, pp. 1430). Others applied the term to
CONTACT Christofer Berglund christofer.berglund@mau.se
DYNAMICS OF ASYMMETRIC CONFLICT
https://doi.org/10.1080/17467586.2019.1680855
© 2019 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License
(http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any med-
ium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way.
regular wars between states possessing unequal power resources(Paul, 1994, p. 3).
However, since antagonists never have equal capabilities at their disposal, prudent
strategists have since time immemorial aspired to leverage their own strengths and
to exploit their opponents weaknesses (Blank, 2003, p. 4). Labelling wars as asymmetric,
Smith (2008, p. 6) concludes, is to me something of a euphemism to avoid acknowl-
edging that my opponent is not playing to my strengths and I am not winning. Crane
(2013, p. 5) reaches the same conclusion, but expresses it in less diplomatic terms: [t]here
are [just] two approaches to waging war, asymmetric and stupid. Every competent
belligerent looks for an edge over its adversaries. Scholars thus dispute whether asym-
metry is an unprecedented feature specic to modern warfare or a commonsensical
occurrence present in conicts between unequal belligerents since the dawn of time.
As the term could take on numerous and often outright incongruent meanings, it no
longer helped structure strategic thinking on the challenges facing decision-makers. In
the outset of the 2000s, the notion of asymmetric conictsalmost disappeared from the
U.S. national security strategies, eclipsed by the attention dedicated to counterterrorism
operations and counterinsurgencies (COIN operations) after the 9/11 attacks in 2001 and
the U.S.-led invasion of Iraq in 2003 (Bualoe, 2006, pp. 36; Kilcullen, 2005). Nonetheless,
in the latter half of the 2000s, the term made a comeback, both in the U.S. national
security strategies and among academics (Arrequin-Toft, 2005). Despite the presence of
a large range of other buzzwords competing for attention, asymmetric conictserves as
a convenient umbrella term for describing warfare between belligerents where legal
status dierences, power imbalances, or contrasting strategies are glaring.
But what do these asymmetries entail? And which of them should be considered as the
dening characteristic(s) of asymmetric conict? Since stable concepts are essential
building blocks that enable researchers to accumulate knowledge, rather than speaking
past one another, there is an urgent need to tackle these questions. We undertake this
conceptual investigation in ve steps. We rst introduce the logic of concept structures
(Goertz, 2006). Next, we operationalise conicts where belligerents have dierent legal
status; where one actor has much greater capabilities than the other; and where the
parties pursue contrasting strategies. The last section catalogues the possible patterns of
interaction between these three asymmetries. We refrain from proposing a denite
denition of asymmetricconicts and from mapping out its empirical extension, and
instead stop at the conclusion that scholars and strategists alike should be more mindful
of the shifting meanings attached to this contested concept if it is to remain a useful
building block in their intellectual endeavours.
Detecting concept structures
As the notion of asymmetric conicts caught on in the 1990s, it soon ran into the travelling
problem. That is, as scholars and strategists designated an ever growing number of
episodes as asymmetricconicts, the meaning of the term became diluted. In his seminal
article, Sartori (1970) argues that a concept denoting a larger number of cases must obtain
a looser connotation, since it must be associated with fewer attributes if it is to travel
further. This stance became conventional wisdom among social scientists until Collier and
Mahon (1993) revisited his claims. Sartori had assumed that concepts are dened by an
intersecting set of attributes, but his critics demonstrate that some concepts are dened by
2C.BERGLUNDANDE.A.SOULEIMANOV
the presence of one or another attribute from a longer list of associated traits. Goertz (2006,
pp. 150) explains the dierence between these concept structures.
For Sartori and those using classic concepts, to dene a concept is to give the
conditions necessary and sucient for something to t into that category(Goertz,
2006, p. 7). According to this logic, a set of attributes must be present for something to
constitute an asymmetric conict. If one trait from this set is missing, then the situation
falls short of the denitional requirements. For Collier and Mahon (1993, p. 847) and those
using family resemblance concepts, there may be no single attribute that category
members all share. According to this logic, no feature might be present in all asymmetric
conicts, but certain commonalities bind them together. If one trait is missing, then the
presence of some other substitutable attribute is enough for the situation to meet the
denitional requirements. As a result, concepts associated with more attributes could, in
fact, travelfurther.
Even though concept structures can dier along these lines, most scholars are content
with listing the features associated with asymmetric conicts. However, without stating
what traits are necessary, sucient, or substitutable, and explaining whether inclusion
into this concept is a dichotomous matter of being either in or out, or a question of
continuous degree, readers are left guessing at the latent concept structure. This problem
is common in the literature in asymmetric conicts, and explains much of the confusion in
debates on the topic.
Nonetheless, asymmetric warfare is often understood as conicts involving belliger-
ents who dier either in terms of their legal status, power capabilities, or strategies (see,
for instance, the denitions oered in Bualoe, 2006, p. 17; Gross, 2010, p. 13; Metz &
Johnson, 2001, p. 5).
1
In practice, this implies warfare between a state actor and a non-
state actor; warfare between an actor possessing strong capabilities and an actor with
scarce resources; or warfare between actors pursuing dierent strategic campaign plans
in the confrontation. When all these features are present, it is easy to recognize an
asymmetric conict. But is it enough for two, or just one, of these attributes to be
present for a conict to be included into this class of conicts? Is one dimension perhaps
more fundamental than the others? Intellectuals disagree with one another over these
important questions. The connotations associated with asymmetric conicts are repre-
sented in Figure 1.
If we start from a classic concept structure, then only conicts featuring all three
attributes (in the central intersection in Figure 1) are asymmetric. Those missing one
trait fail to meet the denition. However, if we start from a family resemblance concept
structure, then the label can be extended to a much wider range of conicts, since these
can be more or less asymmetricas long as at least one of the three characteristics are
present. Of course, some scholars see certain traits as more important that others, and
thus position themselves in-between these poles. Regardless, Figure 1 enables us to trace
the confusion aicting debates on asymmetricconicts, and sketch out the contours of
this contested concept in the subsequent sections.
Dierences in legal status
Asymmetricconicts are associated with confrontations between belligerents with
dierent legal status (Gross, 2010, p. 13; Mack, 1975; Stepanova, 2008, p. 19). In the
DYNAMICS OF ASYMMETRIC CONFLICT 3
modern Westphalian international order, the principal dividing line runs between state
actors and non-state actors. State actors are recognized as sovereign inside their territorial
jurisdiction and possess centralized armed forces whereas non-state actors lack interna-
tional recognition and operate under a more diuse chain of command. State-led coun-
terinsurgencies and counterterrorism operations are hence both asymmetric
confrontations, albeit of somewhat dierent strands (Amidror, 2010; Sloan, 1998). State-
led eorts to supress separatists also ought to fall under this label, even though the non-
state actor in this situation aspires for recognition as a state actor dierent from, but
equal to, the state from which it seeks independence (Stepanova, 2008, pp. 2853). If
confrontations between state actors and non-state actors are asymmetric, then
Colombias struggle against FARC guerrillas, the U.S. ght against Al-Qaeda terrorists,
and Croatias war on separatists in the Republic of Serbian Krajina should all t the label.
Metz and Johnson (2001, p. 11) assume that states have the moral high ground in such
conicts, and see non-state challengers as dark knights. Gross (2010, p. 14) takes a similar
stance, describing states as the building blocks of the international order and the only
legitimate purveyor of armed force. State actors thus possess a moral advantage when
ghting terrorists, but the tables are turned in wars of national liberation, when
separatists can appeal to the principle of self-determination (Gross, 2010, p. 14). In
conicts with guerrillas, states often retain the moral upper hand, unless using their
repower against opponents for dubious ends, as the U.S. did in Vietnam, when conduct-
ing aerial bombardment of civilian localities using napalm (Mack, 1975, p. 186).
Winter (2011, p. 488) has investigated the discourse on asymmetricconicts and
concludes that the concept, in particular among government-aliated strategists, is used
to distinguish between civilized and uncivilized warfare, an idiom that converts [. . .]
dierences between state and non-state actors into moral and civilizational hierarchies,
in eect enabling states to be portrayed as victims of non-state actors.Some states have,
in fact, sought to change international laws governing the conduct of warfare to lessen
the protections aorded to non-state combatants (Pfanner, 2005; Schmitt, 2007; von
Heinegg, 2011).
2
Whether this is an attempt from state actors to transfer their moral
Different
legal status
Different
strategies
Different
capabilities
Figure 1. Attributes associated with belligerents participating in asymmetricconicts.
4C.BERGLUNDANDE.A.SOULEIMANOV
advantage into the legal domain or an appropriate response to non-state actors, who
themselves have grown ever more adroit in outing the laws of war, is a matter of
interpretation.
However, this pressing normative debate should be decoupled from the denition of
asymmetric conict. Scholars are disputing the ethical implications that stem from the
legal status of the belligerents, rather than the claim that conicts between state actors
and non-state actors are asymmetric.Dierences in legal status are, on the other hand,
often linked to dierences in capabilities and dierences in strategies, to which we turn
next.
Dierences in capabilities
Conicts between actors possessing dierent capabilities are also seen as asymmetric
(Bualoe, 2006, p. 17; Metz & Johnson, 2001, p. 10; Paul, 1994, p. 3). Capabilities rst and
foremost refer to armaments, but also to technological, economic, demographic, and
other structural resources that can be converted for power projection on the battleeld
and its domains.
3
Material imbalances of this kind are, of course, present in almost all
conicts. Rational actors go to war when they feel they have the upper hand, as Gross
(2010, pp. 1314) observes, but in asymmetric conicts the dierence in capabilities is
glaringor outright monopolistic(see also Stepanova, 2008, pp. 1718). The weaker
actor lacks sophisticated armaments, such as aircraft carriers, long-range missiles, radars,
or networked command and control systems, and cannot muster the manpower, eco-
nomic resources, technological competence, or other structural assets required to con-
front the stronger actor on equal terms.
Dierences in capabilities often reect dierences in legal status. State actors are more
powerful than non-state actors, as a rule of thumb. States can gather manpower through
conscription, nance its armed forces through taxation, and produce or at least purchase
advanced armaments on the international market. Unless the non-state actor controls
a specic territorial domain in which the draft is enforced, soldiers have to be attracted
either through ideological appeals or with the lure of cash. Moreover, their economic
resources can seldom compete with the coers of the state. Even non-state actors skilled
at amassing funds from extortion, organized crime, or smuggling face diculties in
procuring high-tech armaments, unless another state steps in as their patron. As
a result, states often wield armed forces capable across all domains of warfare whereas
non-state actors make do with rearms and improvised explosive devices, as in the case of
the Israel-Palestinian conict.
However, confrontations between actors possessing dierent capabilities need not
involve actors of dierent legal status. According to Paul (1994, p. 3), conicts in which
two states with unequal power resources confront each other on the battleeldare also
asymmetric. He points to the 1982 British-Argentine war over the Falklands as an
example. Pfanner (2005, p. 152) lists the 199091 Gulf War between the U.S.-led coalition,
equipped with state of the art precision-guided munitions, and Iraq as another case in
point. On the other hand, some non-state actors are so successful in accumulating
capabilities that their decit on the battleeld no longer seems glaring. Consider the
Republic of Transdniestria, an unrecognized de facto state with ample access to Russian
munitions and thousands of men in arms, who have fended oMoldovasclaims over this
DYNAMICS OF ASYMMETRIC CONFLICT 5
jurisdiction for almost three decades (Blakkisrud & Kolsto, 2011; King, 2001). Thus, asym-
metricconicts can entail either dierences in legal status, dierences in capabilities, or
dierences in both aspects.
Dierences in strategies
It gets more complicated, however, because belligerents pursuing dierent strategies
towards one another are also considered as participants in asymmetricconicts
(Arreguin-Toft, 2001,2005; Cassidy, 2003,p.7,2008). In these confrontations, actors aspire
to maximize ones own advantages [or] exploit an opponents weaknesses(Metz &
Johnson, 2001, p. 5). To be sure, belligerents have done this ever since Sun Tzu (1910/
2000) complied his insights into The Art of Warover two millennia ago (Bualoe, 2006,
pp. 78),
4
but in asymmetricconicts the parties use dierent tactical tools to pursue
altogether dierent campaign plans. In short: one actor pursues direct strategies targeting
their opponentsghting capabilities whereas the other actor opts for indirect strategies
targeting their opponentsghting willingness (Bartholomees, 2008, p. 34).
Dierences in strategies often reect both dierences in legal status and in capabilities.
In the classical case, a strong state actor, whose raison détat is to defend its territorial
borders, uses a centralized chain of command to plan for pitched battles on established
frontlines but instead confronts a weak non-state actor using decentralized command
structures to plan for hit-and-run operations. The armed forces of a state, consisting of
tens of thousands of soldiers or more, are reliant on an intricate web of support functions,
which in turn presume hierarchical control. State actors thus prefer direct, concentrated,
or Clausewitzianbattles, in which their overwhelming repower can be applied. In order
to avoid confronting a stronger state actor on its terms, weaker non-state actors favour
indirect, dispersed, or Fabian-Maoistbattles consisting of hit-and-run attacks (Cassidy,
2003,p.7,2008). Since holding terrain leaves them vulnerable to retaliation, insurgents
scatter to sustain their scarce resources. These tactics are often successful when rebels
operate in familiar terrain and obtain support from locals. As Mao Tse-tung (1937)
concluded: guerrillas should move amongst the people as sh swimming in the sea. Non-
state actors thus benet from blurring the distinction between combatants and non-
combatants.
Insurgents have another strategic resource that their state opponents often lack:
a readiness to accept sacrice, or Opferbereitschaft as Münkler (2005) calls it. Most states
are loath to accept the surrender of non-state actors, let alone to negotiate with them, as
this risks legitimizing their actorhood (Bartholomees, 2008, p. 33). But the greater the
sacrice we demand from our opponent, the greater resistance he will put up, von
Clausewitz (1873/1976, p. 81) reminds us.
5
As a result, rebels often see no option but to
continue their struggle until the bitter end. States can seldom muster the same degree of
determination, in particular when bringing in soldiers from distant lands (Betts, 2000,
p. 46; Mack, 1975, p. 177). This pattern is reected in the French ght against the Algerian
National Liberation Front in the 1960s, the Russian struggle against Chechen separatists in
the 1990s, the U.S.-led battle against Iraqi insurgents in the 2000s, and in other cases
when the armed forces of the metropolitan state no longer were defending their home
turf or families other than in an allegorical sense. The main challenge facing states is
therefore to maintain morale among its soldiers and popular support for the engagement
6C.BERGLUNDANDE.A.SOULEIMANOV
back home. Insurgents are cognizant of this fact and do not seek to defeat their oppo-
nents on the battleeld, but to drain their willingness to ght through prolonged wars of
attrition (Arreguin-Toft, 2001).
6
If outgunned non-state actors avoid confronting stronger state actors in pitched
battles, and succeed in undermining their determination, then insurgents can emerge
victorious. [T]he guerrilla wins if he does not lose. The conventional army loses if it does
not win, as Kissinger (1969, p. 39) once concluded. Research suggests that democracies,
in particular, are prone to lose counterinsurgencies due to the electoral impact of war
weariness (Merom, 2003).
7
Even states with superior capabilities thus risk being outwitted
through strategic manoeuvring. But advice is inconsistent. Galula (1964) recommends
counterinsurgencies to focus on winning the hearts and minds of the locals (see also
Bualoe, 2006, p. 16). Arreguin-Toft (2001, p. 109) argues that retribution against civilians
could induce them to cease supporting rebels, though this tactic often backres. He
therefore advises decision-makers to create special operation forces trained for COIN-
missions; a counsel taken up in the U.S., which set up the Marine Corps Forces Special
Operations Command in 2006.
8
Souleimanov (2015) and Souleimanov and Aliyev (2015,
2017) instead stress the importance of co-opting former rebels into the states embrace as
a means of gathering inside knowledge and thus prevent insurgencies from gathering
steam.
However, confrontations between actors pursuing dierent strategies also occur
when belligerents share the same legal status, when both parties have similar capabil-
ities at their disposal, or both. According to Gross (2010,pp.1920), states sometimes
nd it advantageous to let others do their ghtingand therefore engage their oppo-
nent using proxies. He points to Hezbollah, a militant Shiite organization representing
Irans interests in the Levant, as one example. It has directed hit-and-run attacks against
U.S. and Israeli targets, including civilian ones, designed to drain their willingness, rather
than their capabilities, to ght. Russia has also made use of proxies to stop countries in
the near abroad from leaving its orbit. It has utilized state-owned corporations as agents
of inuence, dispatched little green mento Ukraine, conducted active measuresto
sow polarization, and coaxed organized crime groups into doing the Kremlins bidding
abroad (Galeotti, 2017a,2017b; Thornton, 2016). In both these cases, one actor is
resorting to indirect strategies in otherwise regular conicts to avoid retaliation and
to undermine the political determination of their opponents to persist in the
confrontation.
Conclusions
Much ink has been spilled on the topic of asymmetricwarfare since scholars and
strategists began dedicating their intellectual energies to irregular conicts in the
1990s. Yet, there is no consensus as to the meaning of this concept, despite or perhaps
because of its widespread usage. All to often, authors oer a laundry list of associated
features and sporadic examples, thus forcing readers to engage in text exegesis. In order
to reduce the conceptual confusion besetting the eld, this article set out to dissect the
notion of asymmetricconicts.
Based on a close reading of the prior academic literature, it distinguishes between
three asymmetries involving belligerents possessing (1) dierent legal status, (2) dierent
DYNAMICS OF ASYMMETRIC CONFLICT 7
capabilities, or (3) using dierent strategies. What do each of these dierences entail? In
the rst case, the confrontation stands between a state actor and a non-state actor.In
the second instance, the conict involves a strong actor, equipped with advanced arma-
ments and technological, economic, demographic, and other structural resources that can
be put to use on the battleeld, ghting a weak actor with a glaring lack of access to these
same capabilities. In the third and nal conict situation, one actor adheres to direct
strategies targeting their opponentsghting capabilities whereas the other actor makes
use of indirect strategies targeting their opponentsghting willingness.
Since scholars seldom state which (combination of) features should be present for
a conict to count as asymmetric, this article oers a blue-print for tracing the connota-
tion of this contested concept. The possible interaction eects, rst plotted in Figure 1, are
catalogued in Table 1. It maps out the spectrum of possible asymmetries, from those
involving just one dierence (white rows) to those featuring two dierences (grey rows)
and, last but not least, those where the entire set of dierences are present at once (the
dark row).
Table 1 illustrates that asymmetricconicts can take on numerous meanings depend-
ing on the latent concept structure (Goertz, 2006, pp. 3950). If we start from a classic
concept structure, then the term asymmetricshould be reserved for those conicts
where all three dierences are present, as in the case of the First Chechen War between
the Russian Federation and Chechen Republic of Ichkeria. It is the intersection of all
features that makes a confrontation asymmetric.If we start from a family resemblance
concept structure, then the label can extend to conicts where either one of the three
dierences are present. Each attribute can substitute for the others. Choosing between
these standpoints is no simple task as both have good and bad consequences.
Restricting the connotation of the term to its classical meaning has the benetof
imbuing it with clear contents and preventing conceptual stretching, or vague, amor-
phous conceptualizationsas Sartori (1970, p. 1034) calls them. It becomes easier to see
what asymmetric conicts are not if confrontations missing one trait fall short of the
denition. But, we also risk missing the chance to make fruitful comparisons, since the
concept is discarded in cases where signicant similarities are at hand (Collier & Mahon,
1993, p. 852). If membership in the class of asymmetric conicts is not a dichotomous all
or nothingmatter, but rather an issue of degrees, then we need to build a continuous
concept to detect the existence of borderline cases (Goertz, 2006, pp. 29, 34). As a result, it
might seem prudent to conclude that it is enough for either attribute to be present for the
conict to be asymmetric, thus permitting usage of the concept in its peripheral sense
(see Table 1).
Table 1. Types of asymmetric conicts.
Dierent legal status Dierent capabilities Dierent strategies
Yes No No
No Yes No Peripheral meaning
No No Yes
Yes Yes No
No Yes Yes Regular meaning
Yes No Yes
Yes Yes Yes Classical meaning
8C.BERGLUNDANDE.A.SOULEIMANOV
Yet, dierences in legal status, capabilities, and strategies are so common that the
concept then is in danger of overextension. Most modern wars involve non-state actors
challenging state authorities (PRIO, 2018). Almost all confrontations involving the
U.S. could, due to its superior capabilities, be labelled asymmetric(Stepanova, 2008,
p. 15). And the search for strategic leverage can propel actors, even in regular conicts,
to use proxies for draining the political determination of their opponents (Jonsson &
Seely, 2015,pp.45). It is dubious if cases as disparate as the conict over Serbian
Krajina, the British-Argentine Falklands War, and Russias subversion eorts in Ukraine
belong under the same label. Perhaps it is wiser to require that two of the three
dierences are present so that conicts are asymmetricin the more regular use of
the term (see Table 1).
Even in the latter case, there is a need to decide whether all dimensions can
substitute for one another, if one feature should be weighted as more important, or if
one dierence is so essential that its presence is required for a conict to be asym-
metric. For instance, some authors assume that dierences in capabilities generate
dierences in legal status and dierences in strategies, hence assigning the former
dimension a primordial role. It is outside the remit of this article to inspect all these
possibilities, to arrive at a denite denition of the concept, and to map its empirical
extension. But our conceptual blue-print serves to highlight the shifting meaning
attached to the notion of asymmetricconicts. It could, thus, help inject greater
precision into future debates if scholars focus on assessing how its constituent dimen-
sions combine to form the overarching concept.
Notes
1. RANDs(n.d.) conceptualization of asymmetric warfaretakes notice of all three dimensions:
conicts between nations or groups that have disparate military capabilities and strategies.
2. A case in point is the U.S. debate on the use of enhanced interrogation techniquesunder
George W. Bush.
3. Strategists often speak of ve distinct domains: land, sea, air, space, and information
operations.
4. All warfare is based on deception. Hence, when able to attack, we must seem unable; when
using our forces, we must seem inactive. [. . .] If he is in superior strength, evade him. [. . .]
Attack him where he is unprepared, appear where you are not expected, Sun Tzu (1910/
2000,p.34) recommends the readers of his treatise.
5. Awar fought for great purposes implies willingness to accept casualties even in large
numbers, as Luttwak (1995) has phrased it.
6. Some scholars suggest that this preference for indirect tactics of attrition, drawing on a larger
dose of communal Opferbereitschaft,reect an Asianor Easternstrategic mindset, dier-
ent from the Americanor Westernpreference for direct and decisive battles (Metz &
Johnson, 2001, p. 12; Cassidy, 2003, p. 53).
7. Autocrats controlling the media can conceal their own losses and use of retributive tactics
against rebels.
8. However, even the best trained and equipped special units face diculties in operating in
unfamiliar terrain, in particular if the local population does not support them.
DYNAMICS OF ASYMMETRIC CONFLICT 9
Acknowledgments
This article is an outcome of a project supported by Charles Universitys research centres pro-
gramme no. UNCE/HUM/037: The Human-Machine Nexus and Its Implications for the International
Order. The authors would also like to express their gratitude to the Institute of International
Relations Prague, and to the Royal Swedish Academy of Letters, History and Antiquities, for
facilitating their collaboration on this paper.
Disclosure statement
No potential conict of interest was reported by the authors.
Funding
This work was supported by the Charles Universitys research centres programme: The Human-
Machine Nexus and Its Implications for the International Order [UNCE/HUM/037]; The Royal Swedish
Academy of Letters, History and Antiquities [Va2019-0007].
Notes on contributors
Christofer Berglund is Assistant Professor at the Department of Global Political Studies, Malmö
University, and has published articles on ethnic conicts and state-building for Nations and
Nationalism, Nationalities Papers, Demokratizatsiya, and several other outlets.
Emil Aslan Souleimanov is Associate Professor at the Institute of Political Studies, Charles University,
and has published articles on conicts and insurgencies for World Politics, International Security,
Post-Soviet Aairs, Third World Quarterly, and numerous other journals.
ORCID
Christofer Berglund http://orcid.org/0000-0002-9923-0775
Emil Aslan Souleimanov http://orcid.org/0000-0003-1200-0203
References
Amidror, Y. (2010). Winning counterinsurgency war: The Israeli experience. Jerusalem: Jerusalem
Center for Public Aairs.
Arreguin-Toft, I. (2001). How the weak win wars: A theory of asymmetric conict. International
Security,26(1), 93128.
Arrequin-Toft, I. (2005). How the weak win wars: A theory of asymmetric conict. Cambridge:
Cambridge University Press.
Azar, E. (1990). The management of protracted social conicts. Aldershot: Dartmouth.
Bartholomees, B. (2008). Theory of victory. Parameters,38(2), 2536.
Betts, R. (2000). Is strategy an illusion? International Security,25(2), 550.
Blakkisrud, H., & Kolsto, P. (2011). From secessionist conict toward a functioning state: Processes of
state- and nation-building in Transnistria. Post-Soviet Aairs,27(2), 178210.
Blank, S. (2003). Rethinking asymmetric threats. Carlisle, PA: Strategic Studies Institute.
Bualoe, D. (2006). Dening asymmetric warfare. Arlington, VA: The Institute of Land Warfare.
Cassidy, R. (2003). Russia in Afghanistan and Chechnya: Military strategic culture and the paradoxes of
asymmetric conict. Carlisle Barracks, PA: Strategic Studies Institute.
10 C.BERGLUNDANDE.A.SOULEIMANOV
Cassidy, R. (2008). Counterinsurgency and military culture: State regulars versus non-state irregulars.
Baltic Security & Defence Review,10,5385.
Collier, D., & Mahon, J. (1993). Conceptual stretchingrevisited: Adapting categories in comparative
analysis. American Political Science Review,87(4), 845855.
Crane, C. (2013). The lure of strike. Parameters,43(2), 512.
Dixon, H. (1989). Low intensity conict: Overview, denitions, and policy concerns. Langley, VA: Army-
Air Force Center for Low Intensity Conict.
Galeotti, M. (2017a). Crimintern: How the Kremlin uses Russias criminal networks in Europe. Policy
Brief. London: European Council on Foreign Relations.
Galeotti, M. (2017b). Controlling chaos: How Russia manages its political war in Europe. Policy Brief.
London: European Council on Foreign Relations.
Galula, D. (1964). Counterinsurgency warfare: Theory and practice. Westport, CT: Praeger Security
International.
Goertz, G. (2006). Social science concepts: A users guide. Princeton, NJ: Princeton University Press.
Grange,D.(2000). Asymmetric warfare: Old method, new concern. National Strategy Forum Review,9,
16.
Gross, M. (2010). Moral dilemmas of modern war: Torture, assassination and blackmail in an age of
asymmetric conict. New York, NY: Cambridge University Press.
Jonsson, O., & Seely, R. (2015). Russian full-spectrum conict: An appraisal after Ukraine. Journal of
Slavic Military Studies,28(1), 122.
Kaldor, M. (1999). New and old wars: Organized violence in a global era. Cambridge: Polity Press.
Kilcullen, D. (2005). Countering global insurgency. Journal of Strategic Studies,28(4), 597617.
King, C. (2001). The benets of ethnic war: Understanding Eurasias unrecognized states. World
Politics,53(4), 524552.
Kissinger, H. (1969, January). The Vietnam negotiations. Foreign Aairs,11(2), 3850.
Lind, W., Schmitt, J., & Wilson, G. (1989, October). The changing face of war: Into the fourth
generation. Marine Corps Gazette. Retrieved from https://www.academia.edu/7964013/The_
Changing_Face_of_War_Into_the_Fourth_Generation
Luttwak, E. (1995, May/June). Toward post-heroic warfare. Foreign Aairs,74(3), 109122.
Mack, A. (1975). Why big nations lose small wars: The politics of asymmetric conict. World Politics,
27(2), 175200.
Merom, G. (2003). How democracies lose small wars: State, society, and the failure of France in Algeria,
Israel in Lebanon, and the United States in Vietnam. Cambridge: Cambridge University Press.
Metz, S., & Johnson, D. (2001). Asymmetry and U.S. military strategy: Denition, background, and
strategic concepts (strategic studies institute report). Carlisle, PA: Strategic Studies Institute.
Mitchell, C. (1991). Classifying conicts: Asymmetry and resolution. The Annals of the American
Academy of Political and Social Science,518(1), 2338.
Münkler, H. (2005). Die Strategie des transnationalen terrorismus [The strategy of transnational
terrorism]. Paper presented at the conference Terror-Zellen: Was tun gegen neue Kriegeund
Metastasen der Zerstörung? [Terror cells: How to deal with New Warsand the Metastasis of
Destruction?], Tutzing: Evangelische Akademie Tutzing.
OECD. (2012). Improving international support to peace processes: The missing piece. Paris: Author.
Olson, W. (1990). The concept of small wars. Small Wars & Insurgencies,1(1), 3946.
Paul, T. (1994). Asymmetric conicts: War initiation by weaker powers. Cambridge: Cambridge
University Press.
Pfanner, T. (2005). Asymmetrical warfare from the perspective of humanitarian law and humanitar-
ian action. International Review of the Red Cross,87(857), 149174.
PRIO. (2018). Trends in armed conict, 19462017. Oslo: Peace Research Institute Oslo. Retrieved from
https://www.prio.org/utility/DownloadFile.ashx?id=1698&type=publicationle)
RAND. (n.d.)Asymmetric warfare. Retrieved from https://www.rand.org/topics/asymmetric-warfare.
html
Sartori, G. (1970). Concept misformation in comparative politics. American Political Science Review,64
(4), 10331053.
DYNAMICS OF ASYMMETRIC CONFLICT 11
Schmitt, M. (2007). Asymmetrical warfare and international humanitarian law. In H. von Heinegg &
V. Epping (Eds.), International humanitarian law: Facing new challenges (pp. 1148). Berlin:
Springer.
Sloan, A. (1998). Terrorism and asymmetry. In L. Matthews (Ed.), Challenging the United States
symmetrically and asymmetrically: Can America be defeated? (pp. 173193). Carlisle Barracks, PA:
Strategic Studies Institute.
Smith, R. (2008). The utility of force: The Art of War in the modern world. New York, NY: Vintage Books.
Souleimanov, E. A. (2015). An ethnography of counterinsurgency: Kadyrovtsy and Russias policy of
chechenization. Post-Soviet Aairs,31(2), 91114.
Souleimanov, E. A., & Aliyev, H. (2015). Asymmetry of values, indigenous forces, and incumbent
success in counterinsurgency: Evidence from Chechnya. Journal of Strategic Studies,38(5),
678703.
Souleimanov, E. A., & Aliyev, H. (2017). How socio-cultural codes shaped violent mobilization and pro-
insurgent support in the Chechen wars. Basingstoke: Palgrave Macmillan.
Stepanova, E. (2008). Terrorism in asymmetrical conict: Ideological and structural aspects (SIPRI
Research Report No. 23). Stockholm: Oxford University Press.
Tzu, S. (1910/2000). The Art of War. Leicester: Allandale Publishing.
Thornton, R. (2016). Turning strengths into vulnerabilities: The art of asymmetric warfare as applied
by the Russian military in its hybrid warfare concept. In B. Renz & H. Smith (Eds..), Russia and hybrid
warfare: Going beyond the label (pp. 5260). Helsinki: Aleksanteri Papers No 1. Kikimora
Publications.
Tse-tung, M. (1937). On Guerrilla warfare. Maoist Documentation Project. Retrieved from https://
www.marxists.org/reference/archive/mao/works/1937/guerrilla-warfare/
von Clausewitz, C. (1873/1976). On war. Princeton, NJ: Princeton University Press.
von Heinegg, H. (2011). Asymmetric warfare: How to respond? International Law Studies,87,
463480.
Wilson, P. (1998). Asymmetric threats. In H. Binnendijk (Ed.), Strategic assessment: Engaging power for
peace (pp. 169184). Washington, DC: Institute for National Strategic Studies.
Winter, Y. (2011). The asymmetric war discourse and its moral economies: A critique. International
Theory,3(3), 488514.
12 C.BERGLUNDANDE.A.SOULEIMANOV
... Although asymmetric con licts are not a recent topic in international relations, their dynamics are constantly being updated and are, therefore, a constant research subject for the scienti ic community. Conceptually, asymmetric con licts depict confrontations in which combatants use unconventional tactics to increase their strategic advantages and exploit the weaknesses of their opponents (Berglund & Souleimanov, 2020). The terminology came into widespread use with the end of the Cold War, when centralized clashes between armies gradually gave way to guerrilla warfare, espionage, terrorism, cyber-attacks or economic sanctions (Berglund & Souleimanov, 2020). ...
... Conceptually, asymmetric con licts depict confrontations in which combatants use unconventional tactics to increase their strategic advantages and exploit the weaknesses of their opponents (Berglund & Souleimanov, 2020). The terminology came into widespread use with the end of the Cold War, when centralized clashes between armies gradually gave way to guerrilla warfare, espionage, terrorism, cyber-attacks or economic sanctions (Berglund & Souleimanov, 2020). The main features associated with this type of dispute are its ability to be used in diverse geographical conditions, the lexibility of decision-making from the central to the local level, and the strong psychological impact on the adversary (Grant, 1991). ...
... During the 2000s asymmetric con licts became more deeply embedded in academic language as a result of their association with the ight against terrorism and the development of cybercrime (Berglund & Souleimanov, 2020;Buffaloe, 2005). Gross (2009) has centered his approach around the hypothesis that unconventional means of warfare make up modern warfare, which is gradually replacing traditional warfare. ...
Article
Full-text available
A new way in which China has tried to expand its control over the South China Sea for the past decade has been to engage paramilitary forces in its territorial disputes. These forces acted as auxiliary devices for the People`s Liberation Army, applying tactics specific to asymmetric conflicts, such as rapid and low-intensity attacks on foreign ships. The leading role was assumed by the People`s Armed Forces Maritime Militia, a structure made up of civilian personnel with military training and fishing vessels equipped with surveillance technology. These actions are part of China’s strategy to attribute its maritime aggression to civilian entities to hinder possible military responses from other countries and in particular from the United States. Using collective case studies, this article illustrated the dynamics of the coercive activities of the Chinese naval forces and the inability of affected states to deal with these unconventional threats. Keywords: South China Sea, asymmetric conflicts, paramilitary forces, maritime aggression, People’s Republic of China
... In asymmetric intergroup conflicts, victim groups typically have lower power, with limited legal status (e.g., being not internationally recognised as a state) and fewer resources (e.g., armaments, technological, economic, demographic, and other structural resources; Berglund & Souleimanov, 2020). At the same time, perpetrator groups tend to have more power, are often recognised by other countries and have access to far more resources. ...
... Within security studies, asymmetry in armed conflicts has been extensively studied. In this regard, the objective is to understand how the military capabilities of two actors can affect their performance in a violent confrontation (Berglund & Souleimanov, 2020;Tasseron & Lawson, 2022). ...
Article
Full-text available
This article seeks to explain why there is more violence against migrants and transporters in some regions than in others. We compare the criminal ecosystem (number and type of criminal actors in a territory) and state resilience (a state’s capacity to take measures to combat organized crime) in the Gulf of Urabá (Colombia) and Agadez (Niger), and provide evidence from five other subregions between 2015 and 2022 using data from the Global Initiative Against Transnational Organized Crime’s organized crime index. We found that violence is a resource that hierarchically organized groups have more incentive to use against migrants and transporters than smaller or poorly organized criminal groups. The hypothesis targets only violence against migrants and transporters. More work needs to be done to address other forms of organized criminal violence.
... Dentro de los estudios de seguridad, la asimetría ha sido considerablemente bien estudiada en relación con los conflictos armados. En ese respecto, el objetivo es comprender de qué forma las capacidades militares de dos actores pueden afectar su desempeño en una confrontación violenta (Berglund & Souleimanov, 2020;Tasseron & Lawson, 2022). ...
Article
Full-text available
Este artículo busca explicar por qué hay más violencia contra migrantes y transportistas en algunas regiones que en otras. Para esto, se compararon el ecosistema criminal (número y tipo de actores criminales en un territorio) y la resiliencia estatal (capacidad de un Estado para tomar medidas de combate contra el crimen organizado) en el Golfo del Urabá (Colombia) y Agadez (Níger), y se ofrece evidencia de otras cinco subregiones entre 2015 y 2022 utilizando datos del índice del crimen organizado del Global Initiative Against Transnational Organized Crime. Se encontró que la violencia es un recurso del que tienen más incentivos los grupos jerárquicamente organizados para utilizar contra migrantes y transportistas que aquellos grupos criminales más pequeños o pobremente organizados. La hipótesis apunta únicamente a la violencia contra migrantes y transportistas. Más trabajo debe ser hecho para abordar otras formas de violencia del crimen organizado.
... In international relations, power is determined by factors such as the size of nations' population and territory, access to resources, economic capability, military strength, and political stability (Berglund & Souleimanov, 2020;Kriesberg, 2009). An asymmetrical power balance characterizes many international conflicts, like the one in Northern Ireland or the one in Israel-Palestine (Gallo & Marzano, 2009;McAuley et al., 2008). ...
Article
Nations mired in prolonged conflict develop and disseminate societal beliefs to address society's needs. These beliefs are also used to garner support in the international arena. Two key beliefs commonly voiced to the international community by leaders of rival parties concern the threats posed to their nation and their nation's aspiration for peace. Not accounting for power differences, so common in international conflicts, current literature asserts that both parties in conflict express these beliefs. However, we suggest that the extent these beliefs are voiced depends on the nations' relative power. Namely, we hypothesize that because of inferior capabilities, low‐power nations are likely to mention the threats posed to their security and their eagerness for peace more frequently than high‐power nations. To test our hypothesis, we analyzed the entire corpus of speeches made by Israeli and Palestinian representatives speaking at the United Nations General Debate between 1998 and 2020. We found that although representatives from both parties spoke about the threats posed to their security and their eagerness for peace, both beliefs were voiced more frequently by speakers from the low‐power party (in this case, Palestinians) than the high‐power party (Israelis). Implications for psychological research of nations in conflict are discussed.
... The desire of developed countries to reduce the direct participation of their military personnel in such conflicts is noticeable. Military technologies are being actively developed that allow delivering smashing strikes at a distance without the direct presence of 75 Stepanova, 2010;Berglund and Souleimanov, 2020;Selivanov and Chvarkov, 2020. 76 Kiss, 2015. the military (drones, high-precision weapons, artillery, etc.). ...
... The Obsolescence of Major War, New York, Basic Books, 1989, 327 p. 5 Colin S. Gray, Another Bloody Century. Future Warfare, Londres, Phoenix, 2006, 431 p. ;Christofer Berglund et Emil Aslan Souleimanov, « What is (not) asymmetric conflict ? From conceptual stretching to conceptual structuring », Dynamics of Asymmetric Conflict, vol. ...
Article
The application of the concept of asymmetry in the domain of security enables a comprehensive overview of the strategic relations between the opposing parties, as well as the methods used by the adversaries in an effort to turn this type of inequality into a permanent strategic advantage. As a process, asymmetry can most often be reduced to the creation or exploitation of power inequality between adversaries, with the ultimate goal of generating strategic or political asymmetry. By skilfully exploiting the political and security asymmetry that arose after the NATO aggression in 1999, Pristina and its allies constantly constantly built statehood of the so-called "Republic of Kosovo". At the same time, they undertook various political, security and economic activities in order to reduce the effectiveness of the instruments of power of the Republic of Serbia in Kosovo and Metohija and neutralize Serbia's influence in the southern Serbian province. In addition to building institutions and developing various instruments of power, the Albanian political elite in Kosovo and Metohija worked intensively on building internal and external legitimacy. The key results of such activities of Pristina certainly represent: the extortion of the international community foreign policy attitude on the irreversibility of Kosovo's independence, the support of the USA, the EU and NATO members to the self-proclaimed independence, the relocation of Belgrade-Pristina negotiations outside the UN and the mediation of the European Union, the pressure of its international allies on Belgrade to "normalize" relations and stop the "de-recognition" campaign, in order to maintain the foreign policy asymmetry in international relations. In the domain of internal politics, Prishtina constantly exploits Serbia's key weakness, which is its inability to ensure security and normal living conditions for the local Serbian population in Kosovo and Metohija. A large part of the concessions that the Albanian side received, through a series of agreements with Belgrade, were achieved with combination of US and EU pressure on Serbia and internal political, security and socio-economic pressure on the Serbian population in the southern Serbian province. The above-mentioned activities of Pristina were especially intensified after the beginning of the war in Ukraine. Increasingly frequent instrumentalization of violence and demonstration of force and the undertaking of unilateral and provocative moves are evident. The authorities in Pristina are obviously counting on the preoccupation of the USA, the EU and NATO with the war in Ukraine. Albanian political elite from Kosovo and Metohija are actively exploiting US and EU efforts to prevent the aforementioned conflict from spilling over into the Balkan region. The analysis of Prishtina's actions so far, shows the implementation of the their's attrition strategy towards the USA, the European Union and Belgrade. At the same time they are gradually strengthening the institutions of the new Albanian state and establishing the new political order in the entire territory of the Kosovo and Metohija, with intention to strengthen the internal and build external legitimacy of the so-called "Republic of Kosovo". In this long-term process, violence is skilfully used to exploit the weaknesses of the policies of the European Union and the USA in the region and to reduce and neutralize the influence of the Republic of Serbia in Kosovo and Metohija. The strategy of the so-called "Republic of Kosovo" is not basically different from the rebel strategies of other non-state actors. The longterm goal of Pristina's strategy is to gradually build its own legitimacy and state institutions, while at the same time reducing the legitimacy and destroying political order of its opponents. In the last phase of this strategy, from the second half of 2023, the so-called "Kosovo Government", following Western counterinsurgency models, openly engaged on the complete dismantling of the "parallel" political system in the north of Kosovo and Metohija, using various instruments of political, security and economic coercion. Considering the weak reaction of the USA and the European Union, even more robust and energetic action by the government of the so-called "Republic of Kosovo" can be expected in order to completely remove any presence and influence of Serbia in the north of Kosovo. On the other hand, in the short term, Prishtina strives to make the concessions to the Serbian side as small and symbolic as possible. The formation of the Community/Association of Serbian Municipalities in Kosovo and Metohija with symbolic powers and responsibilities for them is a condition for the de-facto recognition of the so-called "Republic of Kosovo". In the long term, the constant and irreversible outflow of the Serbian population from Kosovo and Metohija, indicates that the actions of the so-called "Republic of Kosovo" on the ground are gradual assimilation, constant segregation and narrowing of the socio-economic and cultural space for Serbs, so that they would "voluntarily" leave Kosovo and Metohija and thus solve the Serbian problem according to the "Croatian model".
Article
The acceleration of globalization has caused a series of negative political, security, demographic and socio-economic consequences in the world, causing the weakening and the collapse of some states, the appearance of various forms of expression of political and social unrest, as well as the strengthening of non-state actors, especially those who use violence to achieve their political, ideological and socio-economic goals. The operation of non-state armed actors, or groups, such as Al-Qaeda, the Islamic State, the Taliban, Hezbollah, Hamas, and Al-Shabaab, in post-conflict zones and areas of frozen conflicts, represents a significant political, security and social problem, at the national, regional and global level. Explanation of the nature and character of the non-state armed groups activities is the subject of consideration in this paper. The authors start from the hypothesis that the action of these actors is essentially asymmetric and largely based on the exploitation of the weaknesses of state and international entities. In this paper authors use the theoretical concept of asymmetry to explain the approaches, methods, techniques and tactics used by nonstate armed groups in an effort to maximize their strengths and exploit the weaknesses of a superior adversary. The paper presents a theoretical synthesis of extensive scientific and professional literature on the nature of the activities of non-state armed groups. Numerous scientific and expert analysis and research indicate that non-state armed groups use unconventional and irregular approaches and methods of warfare against a superior opponent, often transferring the conflict to non-military dimensions, in order to compensate their military inferiority and effectively use the enemy's weaknesses. Their activity is very present in post-conflict zones and zones of frozen conflicts, especially in areas where the nexus of criminal activities, conflicts and vulnerability prevails. The asymmetric action of non-state armed groups, in the mentioned zones, is based on challenging state control of the territory and population, through deep infiltration into the political system of the state, creating state-like political orders, violently challenging the state legitimacy by carrying out terrorist attacks, usurping and taking over legal economic and financial flows, as well as organizing various criminal activities.
Article
Full-text available
The article discusses the features of armed confl icts at the beginning of the 21st century through the prism of the theory of asymmetric confl ict. Within the framework of the theory, basic and accompanying asymmetries are distinguished, which determine the reasons for the political, rather than military, defeat of developed countries in wars against relatively weak opponents. At the beginning of the 21st century most of the armed confl icts have pronounced signs of multiple asymmetries that aff ect the course and outcome of confl icts. On the basis of the theory, several important aspects can be distinguished that should be taken into account by the military and politicians when planning and conducting military operations. Among them: the legitimacy of military operations from the point of view of international law, neutralization of anti-war sentiments, minimization of losses of military personnel, ensuring the safety of the population in the war zone. Foreign analytics is characterized by a focus on the reasons for the failures of the United States and other Western states in military operations in Afghanistan, Iraq, Libya, and Syria. Among the reasons for the failures are a lack of understanding of the culture and characteristics of the countries where hostilities are conducted, the regime of occupation, and attempts at nation-building. Some foreign experts note that the Russian Federation is much more successful in participating in asymmetric confl icts of the 21st century. Among Russian military experts, there is a noticeable interest in developing an “asymmetric war” strategy in the framework of the geopolitical confrontation with the countries of the West. The tendency to develop non-contact methods of warfare and the involvement of private military companies to neutralize anti-war sentiments and minimize losses of military personnel has a universal character. At the same time, the problem of non-selectivity of such methods of warfare and their compliance with international law is becoming more and more acute. The theory of asymmetric confl ict is a theory of international relations, which main assumptions are are useful for politicians and the military to take into account in the process of deciding on the start of hostilities and the possibility of achieving political goals by military means, and not just for fi nding victorious strategies in asymmetric confl icts.
Book
This book argues that the existing scholarship on asymmetric conflict has so far failed to take into account the role of socio-cultural disparities among belligerents. In order to remedy this deficiency, this study conceptualizes socio-cultural asymmetry under the term of asymmetry of values. It proposes that socio-cultural values which are based upon the codes of retaliation, silence, and hospitality values which are intrinsic to honor cultures, yet absent from modern institutionalized cultures may significantly affect violent mobilization and pro-insurgent support in that they facilitate recruitment into and support for insurgent groups, while denying such support to incumbent forces. Utilizing Russia's counterinsurgency campaigns in the First and Second Chechnya Wars as an empirical case study, this study explains how asymmetry of values can have an effect on the dynamics of contemporary irregular wars.
Book
This book examines a question generally neglected in the study of international relations: why does a militarily and economically less powerful state initiate conflict against a relatively strong state? T. V. Paul analyses this phenomenon by focusing on the strategic and political considerations, domestic and international, which influence a weaker state to initiate war against a more powerful adversary. The key argument of deterrence theory is that the military superiority of the status quo power, coupled with a credible retaliatory threat, will prevent attack by challengers. The author challenges this assumption by examining six twentieth-century asymmetric wars, from the Japanese offensive against Russia in 1904 to the Argentine invasion of the Falkland Islands in 1982. The book's findings have wide implications for the study of war, power, deterrence, coercive diplomacy, strategy, arms races, and alliances.
Article
Founded in 1959, the Peace Research Institute Oslo (PRIO) is an independent research institution known for its effective synergy of basic and policy-relevant research. In addition to such research, PRIO conducts graduate training and is engaged in the promotion of peace through conflict resolution, dialogue and reconciliation, public information and policymaking activities. The Institute’s working language is English.
Book
Gil Merom argues that modern democracies fail in insurgency wars because they are unable to find a winning balance between expedient and moral tolerance to the costs of war. Small wars, he argues, are lost at home when a critical minority mass shifts the center of gravity from the battlefield to the market place of ideas. Merom analyzes the role of brutality in counterinsurgency, the historical foundations of moral and expedient opposition to war, and the actions states traditionally took in order to preserve foreign policy autonomy. He then discusses the elements of the process that led to the failure of France in Algeria and Israel in Lebanon. In the conclusion, Merom considers the Vietnam War and the influence failed small wars had on Western war-making and military intervention.
Article
Asymmetric conflict is changing the way that we practise and think about war. Torture, rendition, assassination, blackmail, extortion, direct attacks on civilians, and chemical weapons are all finding their way to the battlefield despite longstanding international prohibitions. This book offers a practical guide for policy makers, military officers, students, and others who ask such questions as: Do guerillas deserve respect or long jail sentences? Are there grounds to torture guerillas for information or assassinate them on the battlefield? Is there room for nonlethal weapons to subdue militants and safeguard the lives of noncombatants? Who are noncombatants in asymmetric war? What is the status of civilians who shelter and aid guerillas? And, do guerillas have any right to attack civilians, particularly those who aid and shelter members of the stronger army? If one side can expand the scope of civilian vulnerability, then why can't the other? To read and comment on Michael Gross's blog article on the UN Human Rights Council Report on Gaza
Article
Exploring the case study of the Moscow-led counterinsurgency in Chechnya, this article shows the crucial importance of cultural knowledge understood in an ethnographic sense in terms of patterns of social organization, persisting value systems, and other related phenomena – in the relative success of the eradication of the Chechnya-based insurgency. Using a range of first-hand sources – including interviews by leading Russian and Chechen experts and investigative journalists, and the testimonies of eyewitnesses and key actors from within local and Russian politics – the article explains the actual mechanisms of Moscow's policy of Chechenization that have sought to break the backbone of the local resistance using local human resources. To this end, the study focuses on the crucial period of 2000–2004, when Moscow's key proxy in Chechnya, the kadyrovtsy paramilitaries, were established and became operational under the leadership of Akhmad Kadyrov, which helped create a sharp division within Chechen society, reducing the level of populace-based support for the insurgents, thereby increasing support for the pro-Moscow forces.
Article
This article fills the gap in existing scholarship on asymmetric conflict, indigenous forces, and how socio-cultural codes shape the dynamics and outcomes of conflict transformation. Specifically, it identifies three key socio-cultural values commonplace in honorific societies: retaliation, hospitality, and silence. As sources of effective pro-insurgent violent mobilisation and support from among the local population, these values provide insurgents with an asymmetric advantage over much stronger incumbents. Using the case studies of the two Russian counterinsurgencies in Chechnya, the article shows the mechanisms on the ground through which Moscow’s deployment of indigenous forces against insurgents helped to stem the tide of conflict, reversing the insurgents’ initial advantage in terms of asymmetry of values.