July 2023
·
15 Reads
·
3 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
July 2023
·
15 Reads
·
3 Citations
July 2023
·
39 Reads
·
8 Citations
July 2023
·
9 Reads
January 2023
·
38 Reads
·
6 Citations
International Security
External state support to non-state armed groups is commonly seen as a direct relationship between a state sponsor and a rebel group. But powerful states often use third-party states as conduits of military aid. These intermediary states are secondary, subordinate principals that are part of extended chains of “dual delegation.” Because intermediaries are likely to have their own separate agendas, powerful states often face a double principal-agent problem when providing material support to rebel groups. The difficulties and problems associated with controlling the agent are reflected in the relationship between the principal and the intermediary. States need to identify the alignment of interests at an early stage, or risk strategic failure. There are two ideal types of intermediaries—dealers and brokers. Case studies of the United States’ support to the Mujahideen in Afghanistan and to UNITA in Angola (channeled through Pakistan and Zaire, respectively) demonstrate that intermediaries affect the provision of external support. States engaging in counterterrorism need to look beyond sponsors of terrorism and explore the role of all states involved in the process of conflict delegation. That states use intermediaries when providing support to non-state armed groups indicates that holding states accountable for violating the nonintervention principle under international law should be reconsidered.
May 2022
·
23 Reads
This chapter addresses fundamentalism by placing it within international relations broadly and the interactive strategic environment more narrowly. By comparing the role played by fundamentalism within two ethno-nationalist groups and the development of their campaigns, this chapter challenges some of the long running assumptions around the topic of fundamentalism, including the role of religion and the simplistic answers which have been offered on the topic in the past. We present fundamentalism as a strategic choice which brings positive and negative consequences to those who embrace it. Arguing that adopting and maintaining, or eventually abandoning, a fundamentalist position is a strategic choice, we reposition the topic of fundamentalism away from a simplistic label of non-state actors and towards a more nuanced position within the wider strategic environment.
December 2021
·
49 Reads
November 2021
·
66 Reads
·
14 Citations
Defence Studies
The debates around remote warfare have grown significantly over the last decade, leading to the term acquiring a certain buzz in the media, think-tank, and policy discourse. The lack of any serious attempt to reflect and take stock of this body of scholarship informs the scope of this special issue, in general, and of this article in particular. This paper addresses this former gap and, in doing so, serves a threefold purpose. First, to provide a state-of-the-art review of this emerging debate. Second, to both categorise what properties make a buzzword and to make the case for why existing remote warfare scholarship should be approached in this way. Third, to introduce how the various contributions to this special issue extend the debate’s conceptual, theoretical, and empirical parameters.
November 2021
·
204 Reads
·
12 Citations
International Studies Review
This forum provides an outlet for an assessment of research on the delegation of war to non-state armed groups in civil wars. Given the significant growth of studies concerned with this phenomenon over the last decade, this forum critically engages with the present state of the field. First, we canvass some of the most important theoretical developments to demonstrate the heterogeneity of the debate. Second, we expand on the theme of complexity and investigate its multiple facets as a window into pushing the debate forward. Third, we draw the contours of a future research agenda by highlighting some contemporary problems, puzzles, and challenges to empirical data collection. In essence, we seek to connect two main literatures that have been talking past each other: external support in civil wars and proxy warfare. The forum bridges this gap at a critical juncture in this new and emerging scholarship by offering space for scholarly dialogue across conceptual labels.
September 2021
·
181 Reads
·
9 Citations
Contemporary Security Policy
The United Kingdom’s integrated defense and security review put “grey zone” or “hybrid” challenges at the center of national security and defense strategy. The United Kingdom is not alone: The security and defense policies of NATO, the European Union, and several other countries (including the United States, France, Germany, and Australia) have taken a hybrid-turn in recent years. This article attempts to move the hybrid debate toward more fertile ground for international policymakers and scholars by advocating a simple distinction between threats and warfare. The United Kingdom’s attempts to grapple with its own hybrid policy offer a national case study in closing the gap between rhetoric and practice, or stagecraft and statecraft, before an avenue of moving forward is proposed—informally, through a series of questions, puzzles, and lessons from the British experience—to help international policy and research communities align their efforts to address their own stagecraft-statecraft dichotomies.
January 2021
·
3,117 Reads
·
14 Citations
Civil Wars
This article presents a definitional structure for the notion of 'proxy war' organised around three components: (1) a material-constitutive feature, (2) a processual feature and (3) a relational feature. First, the article evaluates the multiple usages of the term of 'proxy war' in light of its contested character. Second, it proposes a way of making sense of the literature's conceptual turmoil by analysing the different attempts at defining the notion. To this end, it adds an important link to the methodology of concept analysis, namely the 'semantic field', which it reintroduces as a heuristic to identify 'military intervention' as a root concept for defining proxy wars. The article does so by identifying a type of semantic relationship between 'proxy war' and 'military intervention', namely sub-type inclusion.
... Future research should extend our focus on crises and the occurrence of negotiations to another type of indirect interstate conflict: competitive interventions, in which rival states support opposite sides in the same intrastate conflict, often significantly prolonging it (Anderson 2019). Due to conflict dynamics especially in Libya, Syria, and Yemen, competitive interventions have received much media and scholarly attention in recent years, often under the rubric of proxy wars (Moghadam et al. 2023). But how to get competitive interveners to the negotiating table has received relatively little attention. ...
July 2023
... When identifying target responses, our focus is on the direct relationship between supporter states and rebel groups. However, recent research has shown that there might also be conduit states that channel external support to rebels (Karlén and Rauta, 2023). Sponsor states may use such intermediary states when they want to gain informational advantage, when the intermediaries are closer to the rebel group, or if they want to be able to plausibly deny their involvement (Karlén and Rauta, 2023: 121). ...
January 2023
International Security
... To summarise the argument developed both here and in our special issue itself (Biegon, Rauta & Watts 2021;Rauta, 2021b): as a 'buzzword', remote warfare has gotten people talking about a range of issues including on the role of technology in war, the use of different 'light-footprint' practices of military intervention, and the consequences of recent Western security and counterterrorism policy. As often happens with buzzwords, however, their over-use can be damaging. ...
Reference:
Remote-Warfare-A-Debate-Worth-the-Buzz
November 2021
Defence Studies
... Among others, this concerns the principal-agent and proxy warfare frameworks (see, e.g. Ahram, 2011;Bar-Siman-Tov, 1984;Karlén et al., 2021;Mumford, 2013;Rauta, 2021aRauta, , 2021bSalehyan, 2009;Salehyan et al., 2014). They are relatively interrelated with the patron-client concept, and, as such, they are likely to provide additional valuable insights. ...
November 2021
International Studies Review
... Historical epochs are clearly demarcated and obvious (hence "post-industrial" versus "industrial"), with war necessarily obeying wider macrotrends. Notions of radically altered war, and a new security environment, became not just one scenario among many, but (in the words of one MP) the "whole lens through which influence and counterinfluence must be focused, organized and fought" ( Rauta and Monaghan 2021 ). ...
September 2021
Contemporary Security Policy
... Sartori's technique of a "semantic field" is especially useful for helping scholars refine, specify, and articulate a concept's sub-types (Masullo 2021), including more critical scholars (see Herborth 2022). Identifying a concept's semantic field helps us identify the attributes of the initial concept and contrasting concepts (Rauta 2021). Hence, we can determine where the boundary lies, for example, between 'peace' (initial concept) and 'war' or 'conflict' (contrasting concepts). ...
January 2021
Civil Wars
... Among others, this concerns the principal-agent and proxy warfare frameworks (see, e.g. Ahram, 2011;Bar-Siman-Tov, 1984;Karlén et al., 2021;Mumford, 2013;Rauta, 2021aRauta, , 2021bSalehyan, 2009;Salehyan et al., 2014). They are relatively interrelated with the patron-client concept, and, as such, they are likely to provide additional valuable insights. ...
July 2020
Contemporary Security Policy
... In the transactional relationship, the intermediary possesses a military force that allows him to act, but believes that the involvement of a sponsor increases his chances of success. Examples of the materialization of this model are: the support given by the US to Iraq for the defeat of ISIS, the support provided by Russia to Syria in the framework of the civil war, etc. Regardless of the model in which proxy warfare fits, it will remain a preferred form of conducting conflicts, repositioning spheres of influence or releasing tensions on the international stage and will remain "a core feature of the contemporary and future strategic and security environment" [9], because, in theory, proxy war is a simple solution to a complex problem. In practice, however, it has been found that proxy war is actually a simple solution only in the short term, because the evolution of events is unpredictable and most of the time the consequences and effects are not anticipated and are very difficult to manage. ...
April 2020
The RUSI Journal
... Since World War II, 75% of states having internal wars have fought rebel groups receiving foreign state support (San-Akca, 2019). Regardless of the different names attributed to the relationship between states and rebel groups, from tactical alliances (Karlén, 2017) to rebels as proxies, auxiliaries, affiliates, and surrogates (Rauta et al., 2019), or from clandestine affairs (Cormac and Aldrich, 2018) to transnational balancing (Tamm, 2016), in the end, state support for rebel groups is a threat to the interests of target states and might cause interstate crises and conflicts between target and supporter states. Certain drawbacks of external support for target states include the strengthening of rebels (Sawyer et al., 2017), making rebels more likely to achieve their goals (Qiu, 2022), increasing the fatalities and costs of civil wars (Khan, 2021), and escalating if not directly causing interstate disputes and conflicts (Schultz, 2010;Martin, 2024). ...
October 2019
Defence Studies
... Spectres of superiority and dominance between states have contributed to the ongoing geopolitical and cyber-diplomatic struggles globally. Superiority is being determined by one nation's economic, political and military strength which has led to conversations and debates on cyber governance [18]. States such as China and Russia have resorted to diverse covert activities to gain economic and technological power. ...
September 2019
Cambridge Review of International Affairs