Chapter

Why big nations lose small wars: The politics of asymmetric conflict

Authors:
To read the full-text of this research, you can request a copy directly from the author.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Due to the prevalence of disputes, scholars have made numerous attempts to comprehend and classify them. Consequently, words like "internal conflicts" are now used (Brown 1996), 'asymmetrical warfare' (Mack, 1974(Mack, , 2008Arreguin-Toft, 2001), 'civilian-based civil wars' (Anderson, 1999); 'fire next door' (Francis, 2011), 'new wars' (Kaldor 2001), 'small wars' (Harding 1994), 'civil wars' (King 1997), 'ethnic conflicts' (Stavenhagen 1996), 'conflicts in post-colonial states' (van de Goor et al 1996), 'ethno-religious wars' (Furley, 1995), 'greed and grievance' (Berdal andMalone, 2004, Collier, 2004), 'guerrilla/insurgence warfare' (Clapham, 2000),and 'unconventional warfare' (Merari, 2007), to categorise and explain the different types of conflicts pervading the world today. Zartman (1991, p. 370) has correlated, conflict arises with interactions among people; "an unavoidable concomitant of choices and decisions and an expression of the basic fact of human interdependence." ...
Article
Full-text available
Objective: The aim of this study is to reveal the symbiotic relationship between environmental change and the hazards it poses to people, nation-states, and society, and to put environmental security studies squarely on the minds of security scholars and practitioners everywhere. The study concluded that environmental security is not only a worthwhile area of study in and of itself but also has much to offer security studies in general. Method: The study adopted a theoretical exploration of the linkage between security and environmental change. Result: Environmental security studies research has an impact on the nature of threats, the status of security, the execution of security, and strategies for undoing crisis politics, in addition to the ethics of security and privatization. The risks that people face depend not just on the physical changes in their environment, but also on how dependent they are on it for survival and how well they can adapt to these changes. Conclusion: Therefore, societal factors of insecurity like conflict, corruption, trade dependence, and liberalization of the economy have an impact on how sensitive and adaptable people are to environmental changes.
... Among a host of literature on the field of asymmetric warring methods, one idea stands out that might help explain Russian cyber behavior. Asymmetry of interests is considered to be a strong indicator of conflict outcomes (Mack, 1975). Current Russian behavior suggests that their desire to sow discord in the United States and the European Union is greater than its adversaries' desire to meddle in Russian affairs. ...
Article
Full-text available
This case analysis addresses the notion that the United States lacks the appropriate tools and strategies to combat Russian propaganda spread throughout social media networks. This problem is magnified by a social phenomenon that proves Americans’ increased likelihood to engage with content that reflects their own interests and beliefs. This makes social media users more vulnerable, polarizing them and exacerbating societal divisions. Further, Russian bot and troll farms like the Internet Research Agency (IRA) exploit this social media user behavior, making it increasingly difficult to mitigate their ability to disseminate agenda-driven misinformation across the American digital landscape.
Article
Full-text available
The different death practices that Mexican drug cartels have been using for the last two decades and their reproduction in everyday social spheres, as well as their ties to the State, challenge current theoretical frameworks. We propose an explanation of this phenomenon, but we do not resort to the failed or weak State hypothesis, hoping to overcome the problems posed by those accounts. In this paper, we attempt to apply the necropractices from the immunitarian reading of biopolitics of Roberto Esposito, while radicalizing it to be able to attribute epistemic responsibilities for the proliferation and reproduction of the knowledge of death that has reached the whole of the social.
Article
Full-text available
The introduction and analysis of a simple idealized model enables basic insights into how military characteristics and recruitment strategies affect the dynamics of armed conflicts, even in the complex case of three or more fighting groups. In particular, the model shows when never ending wars (stalemates) are possible and how initial conditions and interventions influence a conflict’s fate. The analysis points out that defensive recruitment policies aimed at compensating for suffered losses lead to conflicts with simple dynamics, while attack groups sensitive to the damages they inflict onto their enemies can give rise to conflicts with turbulent behaviours. Since non-governmental groups often follow attack strategies, the conclusion is that the evolution of conflicts involving groups of that kind can be expected to be difficult to forecast.
Chapter
This article considers the conceptual bases of providing the military and economic security of the member states of the Collective Security Treaty Organization in the context of countering hybrid threats. The authors present approaches to model development and hybrid war stages. They justify the creation of an efficient dynamic system of military and economic security for the Collective Security Treaty Organization. The suggested concept aimed at providing the military and economic safety of the member states of the Collective Security Treaty Organization stipulates the subsequent implementation of the following: hybrid threat monitoring, military and economic assessment of the best parameter of resource provision for the countering and mitigation of hybrid threats by the member states of the Collective Security Treaty Organization, special operations to counter hybrid aggression and the development of methods and tools for the creation of a dynamic system for military and economic security of the member states of the Collective Security Treaty Organization in the context of countering hybrid threats.KeywordsConceptOrganizationMilitary and economic securityHybrid threatsSystemState
Article
Full-text available
North Korea’s asymmetric provocations over the last decades can be classified into two periods: tactical provocations at sea in 1970–1990 and strategic (nuclear) provocations in 2000–2020. What is the logic underlying the North Korean imbroglio? And how does the former period differ from the latter? The first set of provocations was intended to shift the threat imbalance caused by a widening gap in conventional military capabilities into a balance of insecurity, where the weaker North Korean side faced South Korea and the combined ROK–US forces. The second set was intended to shift the balance of insecurity into an imbalance of terror while ensuring that only Pyongyang would be armed with nuclear weapons in the area. The “gray zone” discourse of the denuclearization of the Korean Peninsula (rather than North Korea) ended up bolstering North Korea’s nuclear program, while South Korea intensified only its conventional weapons program.
Article
Full-text available
The article analyzes the specifics of modern military and political conflicts (hybrid, asymmetric warfare). It considers the scenarios of resolving the armed conflict in eastern Ukraine. The attention is paid to the importance of using diplomatic means through the active involvement of the international community and strengthening of economic sanctions against Russian Federation.
ResearchGate has not been able to resolve any references for this publication.