{"title":"Surrogate Warfare: The Transformation of War in the Twenty-First Century","authors":"Spencer M. Ross","doi":"10.1080/23296151.2021.1904343","DOIUrl":"https://doi.org/10.1080/23296151.2021.1904343","url":null,"abstract":"In this excellent survey and analysis of the debates raised by the use of surrogates in war, Andreas Krieg and Jean-Marc Rickli make a compelling case for both the extent to which surrogacy is changing the nature of war and the seriousness with which this issue needs to be taken. Surrogacy in the context of warfare refers to the process in which the burdens of war are shifted from state and nonstate actors to human and/or technological substitutes. Recognizing that surrogates have been a feature of warfare for as long as there has been war, Krieg and Rickli offer neat historical summaries of past surrogate uses to establish that contemporary developments, and some likely future ones, are stretching earlier ways of thinking about this phenomenon to a breaking point, necessitating new analytical approaches. Surrogates have traditionally served as force multipliers or provided specialist functions within conventional wars, or functioned as disposable actors to be disowned by a state sponsor and provide distance from actions that bring political, ethical, legal, and military risks. Krieg and Rickli argue that in contemporary warfare, surrogacy is increasingly taking on different forms. The authors’ claim regarding the contemporary turning point in surrogate warfare rests on two sets of distinct developments. The first is the shift to what Krieg and Rickli describe as “neotrinitarian” warfare. This view argues that the use of surrogates and proxies effectively relocates many of the most serious costs of warfare outside the Clausewitzian triangle of political authority (the state), political agent (the soldier), and the people. As states find direct engagement in complex conflicts increasingly unpalatable and ineffective—as they are often characterized by blends of insurgency, terrorism, state failure, and criminality—Krieg and Rickli argue that surrogates offer attractive options, although at considerable potential costs. In some respects, there is a clear connection to the long history of surrogates and proxies: states use surrogates to shield themselves","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Paradox of Security Force Assistance after the Rise and Fall of the Islamic State in Syria–Iraq","authors":"Jahara Matisek, Michael W. Fowler","doi":"10.1080/23296151.2020.1820139","DOIUrl":"https://doi.org/10.1080/23296151.2020.1820139","url":null,"abstract":"ABSTRACT This article focuses on innovative conceptual definitions to capture the various terms and ideas that abound concerning the delivery of military assistance, aid, and training in fragile states, often subsumed under the term security force assistance (SFA). It highlights different Kurdish militias and units within the Iraqi Security Forces (ISF) to demonstrate inherent problems with any SFA program. We conduct a conceptual, theoretical, and empirical analysis to evaluate variations, concluding that in these contexts the definition of success and military effectiveness is contextual, often deviating from what the providers, such as the U.S. and other nations, may desire.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129807339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active Measures: The Secret History of Disinformation and Political Warfare","authors":"M. Grzegorzewski","doi":"10.1080/23296151.2020.1814531","DOIUrl":"https://doi.org/10.1080/23296151.2020.1814531","url":null,"abstract":"“Active Measures: The Secret History of Disinformation and Political Warfare” by Thomas Rid is a superb book for the times. As we wrestle with a Russian disinformation campaign that muddies what is...","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133638695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics","authors":"Jake Keplar","doi":"10.1080/23296151.2020.1814539","DOIUrl":"https://doi.org/10.1080/23296151.2020.1814539","url":null,"abstract":"“The Hacker and the State” by Ben Buchanan is a fine addition to the growing literature on hacking, cyber attacks, and cyber policy. The book is unique in that its analytic approach to evaluating c...","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129874444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secret Wars: Covert Conflict in International Politics","authors":"Jonathan D. Carroll","doi":"10.1080/23296151.2020.1814536","DOIUrl":"https://doi.org/10.1080/23296151.2020.1814536","url":null,"abstract":"Secret Wars: Covert Conflict in International Politics by Austin Carson, assistant professor of political science at the University of Chicago, explores two primary questions. First, why do states ...","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128528572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Temperature Rising","authors":"E. McCready","doi":"10.1080/23296151.2020.1814534","DOIUrl":"https://doi.org/10.1080/23296151.2020.1814534","url":null,"abstract":"Nader Uskowi’s book Temperature Rising, provides a concise and sober account of the Islamic Republic of Iran’s extraterritorial military arm, the Islamic Revolutionary Guard Corps (IRGC), and princ...","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126139778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Russian Understanding of War: Blurring the Lines between War and Peace","authors":"Ltc Andy Nilson","doi":"10.1080/23296151.2020.1814537","DOIUrl":"https://doi.org/10.1080/23296151.2020.1814537","url":null,"abstract":"According to Western tradition, war is typically consummated with the exchange of violence. Yet, there are many nonviolent tools available to governments that when applied in the proper proportions...","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131040310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ben Ethan Zweibelson, K. Kyne, Major Robert Rosa, Major Frank Rundus
{"title":"Disruptive Innovation through Military Design: A Collaboration between the US Joint Special Operations University and the Polish Army","authors":"Ben Ethan Zweibelson, K. Kyne, Major Robert Rosa, Major Frank Rundus","doi":"10.1080/23296151.2020.1820263","DOIUrl":"https://doi.org/10.1080/23296151.2020.1820263","url":null,"abstract":"ABSTRACT This article presents a five-year journey for the Polish Armed Forces and U.S. Special Operations Command’s Joint Special Operations University in establishing military design education, theory, and practice within the Polish military. Military design is presented as a significant development in defense theory that draws from complexity theory, systems theory, scenario planning, postmodern theory as well as social paradigm theory as applied to security contexts and war. Military design is a recent development and in part a reaction to traditional, mechanistic, and linear planning and strategy methodologies becoming insufficient in contemporary security environments. The increasing complexity of modern security challenges coupled with institutional barriers to challenging well-established military doctrine, decision-making methodologies, and belief systems concerning war and warfare have ushered “military design” to the forefront of numerous militaries; designing for war is not without controversy and debate over methodological application and relation to existing warfare methods. JSOU and a small team of Polish Army educators would work in tandem to implement military design theory as currently provided within the SOCOM enterprise to international partner nations such as the Polish Armed Forces and Polish Special Forces. The JSOU andragogic approach to design education emphasizes building design facilitation capacity within the partnered organization, and this article explains the five-year process to stand up Polish-centric design concepts and customized education oriented toward Polish security challenges and attuned to cultural as well as geopolitical considerations.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130149089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demystifying Artificial Intelligence through DoD Education","authors":"M. Grzegorzewski","doi":"10.1080/23296151.2020.1813372","DOIUrl":"https://doi.org/10.1080/23296151.2020.1813372","url":null,"abstract":"ABSTRACT Artificial Intelligence (AI) technologies will exponentially change the pace at which states compete with each other and create a strategic advantage for early adopters of this technology. One of the early adopters of this technology is the U.S. Department of Defense (DoD) having already successfully employed AI tech in the field. As a result, widespread adoption of this technology across the force will occur in the near future. Therefore, the DoD must educate its workforce on the potential, and pitfalls, of Artificial Intelligence (AI) technologies to most effectively employ this capability.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat Finance System: A Common Approach to Defining the Problem","authors":"S. Johnson, C. Russell","doi":"10.1080/23296151.2020.1829795","DOIUrl":"https://doi.org/10.1080/23296151.2020.1829795","url":null,"abstract":"ABSTRACT Globalization has created an environment where access to advances in technology, communications, and transportation transcends international boundaries creating a rich operating space for threat networks to exploit. Threat networks around the globe leverage their geographically dispersed structures to increase reach while mitigating risks to disruption by operating in various environments and domains. Like all networked organizations, threat networks rely on financial structures that are sustainable while providing resilience when faced with inevitable disruption. Increasingly, threat networks pursue options that are decentralized and rely on local placement and access for resourcing while exploiting gaps in various environments in order to establish and maintain their financial systems. Defining the system threat networks use to finance their operations in a clear and repeatable construct supports the common understanding that leads to unified action.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"147 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}