As of this writing, Russia’s war on Ukraine continues – reduced in scope due to Ukraine’s staunch defense and the surprisingly ineffective military performance of Russia’s mix of professional and conscript troops. This has forced Russia to focus on the Donbass/Luhansk front, where it can bolster its strength with conscripted forces from the “republics.” Information and cyber warfare, previously assessed as a major Russian strength, have not been areas of obvious advantage, and Russian propaganda – while still largely successful at home – has not made much headway in the rest of the world.
Conflict in the 21st century, both in Europe and in the developing world, re-emphasizes the utility of covert action and non-attributable forces. In our first article, “Revisiting plausible deniability”, Michael Poznansky of the University of Pittsburgh examines this critical concept. He proposes two models – the state model and the executive model. The former attempts to shield the government writ large, when it risks escalation or violations of international law. The latter attempts to protect the head of state, in the event of violations of domestic law or hostile public opinion. He notes that states may pursue plausible deniability for one or both reasons simultaneously and may even shift from one mode to the other. This will complicate signaling efforts in crisis and efforts by historians to understand decision-making in context.Footnote1
Issues of attribution and plausible deniability complicate the assessment of cyber attacks. Richard Harknett (University of Cincinnati) and Max Smeets (ETH-Zurich) examine both the state of the cybersecurity studies field and the potential of future cyber campaigns in their article “Cyber campaigns and strategic outcomes.” They argue that cyber campaigns in the past decade sought to use linked cyber operations to achieve strategic effects without risking escalation to armed conflict. Cyber, they argue, offers an alternative short of war for affecting the national power of rivals, and will become a persistent new element in international power politics without replicating the potential catastrophic consequences of kinetic warfare.Footnote2
The prosecution of an overseas war on terror significantly taxed the manpower resources of the U.S. military, leading to claims that the ranks are filled disproportionately from less fortunate groups in society – the poor and the disenfranchised. Andrea Asoni (Charles River Associates), Andrea Gilli (NATO Defence College), Mauro Gilli (ETH Zurich) and Tino Sanandaji (Stockholm School of Economics) examine the post-9/11 US military in “A mercenary army of the poor? Technological change and the demographic composition of the post-9/11 U.S. military”. The authors employ two variables – socio-economic status and technological and cognitive skills and competencies. They find that the demands of technology, operations, tactics, and doctrine require soldiers with higher sklll levels than in older conscript armies. Comparing metrics such as family income, family wealth and cognitive abilities, military personnel are roughly comparable to or slightly better than the average American citizen. The high skill level of recruits, as contrasted for instance with the low quality of Russian conscripts, may help explain the relatively high levels of military effectiveness the US has demonstrated in recent conflicts.Footnote3
Critics often claim that domestic debates over strategy and policy harm counterinsurgency efforts by democratic states. Jonathan Monten (University College London) and Radha Iyengar Plumb (RAND Corporation) investigate this hypothesis in their article “Is there an ‘emboldenment’ effect: Evidence from the insurgency in Iraq”, examining the public (and often contentious) US debate over counterinsurgency strategy in Iraq. They find that even though Iraqi insurgents knew of the US debates, it does not appear to have resulted in either an increase in attacks on US forces (to exploit casualty sensitivity) or on Iraqi civilians (to increase the impression that the US was losing the counterinsurgency battle, and thereby affect the domestic debate). One possible explanation is the de-centralized nature of the Iraqi insurgency, which may have limited coordination between factions.Footnote4
Henning Tamm (University of St. Andrew’s) examines the cohesion of rebel militant groups in his article “In the balance: External troop support and rebel fragmentation in the Second Congo War”. The Congo conflict demonstrated the critical role state sponsors can play in the evolution of armed groups. By sending troops to fight alongside foreign rebels, state sponsors can strengthen existing leaders, replace them with a rival, or encourage a rival to form an alternative splinter group (more compatible with the sponsor’s interests).Footnote5
Disclosure statement
No potential conflict of interest was reported by the author(s).
Notes
1 On plausible deniability and covert action, see Cormac, ‘Coordinating Covert Action’, 692–717; Jensen, Valeriano, and Maness, ‘Fancy Bears and Digital Trolls: Cyber Strategy with a Russian Twist’, 212–34; Maher, ‘The Covert Campaign against Iran’s Nuclear Program’, 1014–1040; Wilner ‘The Dark Side of Extended Deterrence’, 410–437; and Scazzieri ‘Europe, Russia and the Ukraine Crisis’, 392–416.
2 On cyber war and emerging technological competition, see Jensen, Valeriano, and Maness, ‘Fancy Bears and Digital Trolls’, 212–34; Junio, ‘How Probable Is Cyber War?’, 125–33; Liff, ‘Cyberwar: A New “Absolute Weapon”?’, 401–28, and ‘The Proliferation of Cyberwarfare Capabilities and Interstate War, Redux’, 134–38; McGraw, ‘Cyber War Is Inevitable (Unless We Build Security In)’, 109–19; Rid, ‘Cyber War Will Not Take Place’, 5–32; Smeets, ‘A Matter of Time’, 6–32; Stone, ‘Cyber War Will Take Place!’, 101–08; Tor, ‘“Cumulative Deterrence” as a New Paradigm for Cyber Deterrence’, 92–117; Sechser, ‘Neil Narang & Caitlin Talmadge’,727–735; Talmadge, ‘Emerging Technology and Intra-war Escalation Risks’, 864–887, and ‘Travis Sharp Theorizing Cyber Coercion’, 898–926.
3 See Biddle, ‘Speed Kills? Reassessing the Role of Speed, Precision, and Situation Awareness in the Fall of Saddam’, 3–46; Biddle and Zirkle, ‘Technology, Civil-Military Relations, and Warfare in the Developing World’, 171–212; Zegart, ‘Cheap Fights, Credible Threats’, 6–46; and Broekhof, Kitzen and Osinga, ‘A Tale of Two Mosuls, The Resurrection of the Iraqi Armed Forces and the Military Defeat of ISIS’, 96–118.
4 Malkasian, ‘Signaling Resolve, Democratization, and the First Battle of Fallujah’, 423–52.
5 Bowen and Andrew, ‘Coercive Diplomacy and the Donbas’, 312–43; Reiter, ‘Command and Military Effectiveness in Rebel and Hybrid Battlefield Coalitions’, 211–233; and Tankel, ‘Beyond the Double Game’,545–575.
References
- Biddle, Stephen D. and Robert Zirkle, ’Technology, Civil-Military Relations, and Warfare in the Developing World’, Journal of Strategic Studies 19/2 (1996), 171–212. doi:https://doi.org/10.1080/01402399608437634.
- Biddle, Stephen D., ’Speed Kills? Reassessing the Role of Speed, Precision, and Situation Awareness in the Fall of Saddam’, Journal of Strategic Studies 30/1 (2007), 3–46. doi:https://doi.org/10.1080/01402390701210749.
- Bowen, Andrew S., ’Coercive Diplomacy and the Donbas: Explaining Russian Strategy in Eastern Ukraine’, Journal of Strategic Studies 42/3–4 (2019), 312–43. doi:https://doi.org/10.1080/01402390.2017.1413550.
- Broekhof, Maarten P., Martijn W. M. Kitzen, and Frans P. B. Osinga, ’A Tale of Two Mosuls, the Resurrection of the Iraqi Armed Forces and the Military Defeat of ISIS’, Journal of Strategic Studies 45/1 (2022), 96–118. doi:https://doi.org/10.1080/01402390.2019.1694912.
- Cormac, Rory, ’Coordinating Covert Action: The Case of the Yemen Civil War and the South Arabian Insurgency’, Journal of Strategic Studies 36/5 (2013), 692–717. doi:https://doi.org/10.1080/01402390.2011.651534.
- Jensen, Ben, Brandon Valeriano, and Ryan C. Maness, ’Fancy Bears and Digital Trolls: Cyber Strategy with a Russian Twist’, Journal of Strategic Studies 42/2 (2019), 212–34. doi:https://doi.org/10.1080/01402390.2018.1559152.
- Junio, Timothy J., ’How Probable is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate’, Journal of Strategic Studies 36/1 (2013), 125–33. doi:https://doi.org/10.1080/01402390.2012.739561.
- Liff, Adam P., ’Cyberwar: A New ‘Absolute Weapon’? the Proliferation of Cyberwarfare Capabilities and Interstate War’, Journal of Strategic Studies 35/3 (2012), 401–28. doi:https://doi.org/10.1080/01402390.2012.663252.
- Liff, Adam P., ’The Proliferation of Cyberwarfare Capabilities and Interstate War, Redux: Liff Responds to Junio’, Journal of Strategic Studies 36/1 (2013), 134–38. doi:https://doi.org/10.1080/01402390.2012.733312.
- Maher, Richard, ’The Covert Campaign Against Iran’s Nuclear Program: Implications for the Theory and Practice of Counterproliferation’, Journal of Strategic Studies 44/7 (2021), 1014–1040. doi:https://doi.org/10.1080/01402390.2019.1662401.
- Malkasian, Carter, ’Signaling Resolve, Democratization, and the First Battle of Fallujah’, Journal of Strategic Studies 29/3 (2006), 423–52. doi:https://doi.org/10.1080/01402390600765843.
- McGraw, Gary, ’Cyber War is Inevitable (Unless We Build Security In)’, Journal of Strategic Studies 36/1 (2013), 109–19. doi:https://doi.org/10.1080/01402390.2012.742013.
- Reiter, Dan, ’Command and Military Effectiveness in Rebel and Hybrid Battlefield Coalitions’, Journal of Strategic Studies 45/2 (2022), 211–233. doi:https://doi.org/10.1080/01402390.2021.2002692.
- Rid, Thomas, ’Cyber War Will Not Take Place’, Journal of Strategic Studies 35/1 (2012), 5–32. doi:https://doi.org/10.1080/01402390.2011.608939.
- Scazzieri, Luigi, ’Europe, Russia and the Ukraine Crisis: The Dynamics of Coercion’, Journal of Strategic Studies 40/3 (2017), 392–416. doi:https://doi.org/10.1080/01402390.2016.1265509.
- Sechser, Todd S., Neil Narang, and Caitlin Talmadge, ’Emerging Technologies and Strategic Stability in Peacetime, Crisis, and War’, Journal of Strategic Studies 42/6 (2019), 727–735. doi:https://doi.org/10.1080/01402390.2019.1626725.
- Sharp, Travis, ’Theorizing Cyber Coercion: The 2014 North Korean Operation Against Sony’, Journal of Strategic Studies 40/7 (2017), 898–926. doi:https://doi.org/10.1080/01402390.2017.1307741.
- Smeets, Max, ’A Matter of Time: On the Transitory Nature of Cyberweapons’, Journal of Strategic Studies 41–1/2 (2018), 6–32. doi:https://doi.org/10.1080/01402390.2017.1288107.
- Stephen, Tankel, ’Beyond the Double Game: Lessons from Pakistan’s Approach to Islamist Militancy’, Journal of Strategic Studies 41/4 (2018), 545–575. doi:https://doi.org/10.1080/01402390.2016.1174114.
- Stone, John, ’Cyber War Will Take Place!’, Journal of Strategic Studies 36/1 (2013), 10108. doi:https://doi.org/10.1080/01402390.2012.730485.
- Talmadge, Caitlin, ’Emerging Technology and Intra-War Escalation Risks: Evidence from the Cold War, Implications for Today’, Journal of Strategic Studies 42/6 (2019), 864–887. doi:https://doi.org/10.1080/01402390.2019.1631811.
- Tor, Uri, ’“Cumulative Deterrence” as a New Paradigm for Cyber Deterrence’, Journal of Strategic Studies 40/1–2 (2017), 92–117. doi:https://doi.org/10.1080/01402390.2015.1115975.
- Wilner, Alex, ’The Dark Side of Extended Deterrence: Thinking Through the State Sponsorship of Terrorism’, Journal of Strategic Studies 41/3 (2018), 410–437. doi:https://doi.org/10.1080/01402390.2017.1284064.
- Zegart, Amy, ’Cheap Fights, Credible Threats: The Future of Armed Drones and Coercion’, Journal of Strategic Studies 43/1 (2018), 6–46. doi:https://doi.org/10.1080/01402390.2018.1439747.