6,074
Views
12
CrossRef citations to date
0
Altmetric
Original Articles

Surrogate warfare: the art of war in the 21st century?

&
Pages 113-130 | Received 06 Nov 2017, Accepted 15 Jan 2018, Published online: 21 Jan 2018

References

  • Abrahamsen, R. and Williams, M., 2010. Security beyond the state: private security in international politics. Cambridge: Cambridge UP.10.1017/CBO9780511974441
  • Abrahamsen, R. and Williams, M., 2017. Golden assemblages: security and development in Tanzania’s gold mines. In: P. Higate and M. Utas, eds. Private security in Africa: from the global assemblage to the everyday. London: Zed Books, 15–31.
  • Almezaini, K., and Rickli, J.M., eds., 2016. The small Gulf States: foreign and security policies before and after the Arab spring. London: Routledge.
  • Anderson, J.W., 2003. The internet and Islam’s new interpreters. In: D.F. Eickelman, et al., eds. New media in the Muslim world – the emerging public sphere. Indianapolis, IN: Indiana UP, 45–60.
  • Atwood, R., 1980. The Hessians: mercenaries from Hessen-Kassel in the American revolution. Cambridge: Cambridge UP.10.1017/CBO9780511523038
  • Autesserre, S., 2010. The trouble with the Congo: local violence and the failure of international peacebuilding. Cambridge: Cambridge UP.10.1017/CBO9780511761034
  • Beck, U., Aug 2006. Living in the risk society. Economy and Society, 35(3), 329–345
  • Bislev, S., 2004. Globalization, state transformation, and public security. International Political Science Review, 25 (3), 281–296.10.1177/0192512104043017
  • Boot, M., 2013. Invisible armies: an epic history of guerrilla warfare from ancient times to the present. New York, NY: Norton.
  • Bull, H., 2012. The anarchical society: a study of order in world politics. 4th ed. London: Palgrave.10.1007/978-0-230-39340-0
  • Caldwell, W.B., Murphy, D. and Menning, A., 2009. Learning to leverage new media: the Israeli defense forces in recent conflicts. Military Review, 2–10 May–June.
  • Carruthers, S.L., 2014. “Casualty aversion”: media, society and public opinion. In: S. Scheipers, ed. Heroism and the changing character of war. London: Palgrave Macmillan, 162–187.10.1057/9781137362537
  • Clausewitz, v. C., 1832. Vom Kriege. Berlin: Ferdinand Dümmler.
  • Clausewitz, v. C., 1940. On war. Translated by J.J. Graham. London: Keagan Paul, French, Truebner.
  • Coker, C., 2013. War in an age of risk. London: Wiley.
  • Cook, M., 2004. The moral warrior: ethics and service in the US military. New York, NY: SUNY Press.
  • Cottle, S., 2006. Mediatized conflict – developments in media and conflict studies. New York, NY: McGraw-Hill.
  • Davies, W., 2016. The age of post-truth politics. New York Times, 24 Aug 2016.
  • Deghhanpishe, B. 2014. Special report: the fighters of Iraq who answer to Iran. Reuters, 12 November 2014
  • Ferris, J., 2012. Small wars and great games: the British Empire and hybrid warfare, 1700–1970. In: Murray & Mansoor, eds. Hybrid warfare. Cambridge: Cambridge UP, 199–224.
  • Förster, S., 1987. Facing ‘people’s war’: Moltke the elder and Germany’s military options after 1871. Journal of Strategic Studies, 10 (2), 1987.
  • Gberie, L., 2005. A dirty war in west Africa: the RUF and the destruction of sierra Leone. Bloomington, IN: Indiana UP.
  • Gregory, D., Sep 2011. The everywhere war. The Geographical Journal, 177(3), 238–250.
  • Grove, T. 2015. Up to nine Russian contractors die in Syria, experts say. The Wall Street Journal, 18 Dec.
  • Haass, R.N., May–Jun 2008. The age of nonpolarity: what will follow US dominance?, Foreign Affairs, 87(3), 44–56.
  • Habermas, J., 1974. The public sphere: an encyclopedia article 1964, transl. by Sara Lennox and Frank Lennox. New German Critique, 3, 49–55.
  • Hager, E.B and Mazzetti, M., 2015. Emirates secretly sends Colombian mercenaries to Yemen fight. New York Times, 25 Nov. https://www.nytimes.com/2015/11/26/world/middleeast/emirates-secretly-sends-colombian-mercenaries-to-fight-in-yemen.html?_r=0
  • Holmqvist, C., 2005. Major armed conflicts. In: Stockholm International Peace Research Institute, ed. SIPRI Yearbook 2006: Armaments, Disarmament and International Security. Oxford: Oxford University Press, 77–106.
  • Huber, T., 2002. Compound warfare: a conceptual framework. In: T.M. Huber, ed. Compound warfare: that fatal knot. Fort Leavenworth, KS: US Army CGS College Press, 1–10.
  • Humud, C., Blanchard, C.M., Nikitin, M.B., 2017. Armed conflict in Syria: overview and US response. Congressional Research Service Report, 6 Jan.
  • Johnson, L.K., 2012. Intelligence analysis and planning for paramilitary operations. Journal for National Security Law & Policy, 5, 2012.
  • Kaldor, M., 1999. New and old wars: organised violence in a global era. Stanford: Stanford University Press.
  • Kaspersen, A., and Rickli, J-M., 2016. The global war of narratives and the role of social media. World Economic Forum, 8 Jul. https://www.weforum.org/agenda/2016/07/the-global-war-of-narratives-and-the-role-of-social-media/
  • Krieg, A., Jan 2016a. Externalizing the burden of war: the Obama Doctrine and US foreign policy in the Middle East. International Affairs, 92(1), 97-113.
  • Krieg, A., 2016b. Commercializing cosmopolitan security. New York, NY: Palgrave.10.1007/978-3-319-33376-2
  • Krieg, A., 2016c. The contractor as the new cosmopolitan soldier. In: C. Kinsey and J. Berndtsson, eds. Routledge research companion on outsourcing security. London: Routledge, 181–190.
  • Krieg, A., 2017. Socio-political order and security in the Arab world. New York, NY: Palgrave.10.1007/978-3-319-52243-2
  • Lacey, J., 2012. Conquering Germania: a province too far. In: W. Murray and P.R. Mansoor, eds. Fighting complex opponents from the ancient world to the present. Cambridge: Cambridge UP, 18–44.
  • Larson, E.V., 1996. Casualties and consensus – the historical role of casualties in domestic support for us military operations. Santa Monica, CA: RAND.
  • Leander, A., 2002. Conditional legitimacy, reinterpreted monopolies: globalisation and the evolving state monopoly on legitimate violence. Paper presented at the annual convention of the ISA, New Orleans, 24–27 March. Tucson, AZ: International Studies Association.
  • Levy, Y., 2011. How casualty sensitivity affects civilian control: the Israeli experience. International Studies Perspectives, 2011 (12), 68–88.10.1111/insp.2011.12.issue-1
  • Levy, Y, 2013. The death hierarchy: western states and the changing sacrifices of citizens and soldiers, working paper, no. 24. Raanna: Research Insititute for Policy, Political Economy and Society, The Open University of Israel.
  • Lipton, E., Sanger, D., and Shane, S., 2016. The perfect weapon: how Russian cyberpower invaded the US. The New York Times, 13 Dec.
  • Mandel, R., 2004. Security, strategy, and the quest for bloodless war. London: Lynne Rienner Publishers.
  • Mansoor, P.R., 2012. Introduction: hybrid warfare in history, In: Murray & Mansoor, eds. Hybrid warfare. Cambridge: Cambridge UP,  1–17.
  • MayfieldIII, T., 2011. A commander’s strategy for social media. Joint Forces Quarterly. Issue 40, 1st Quarter.
  • Mueller, J. E., 1996. Policy principles for unthreatened wealth-seekers. Foreign Policy, 102 Spring.
  • Mumford, A., 2013. Proxy warfare. Cambridge: Polity Press.
  • Oxford English Dictionary, 2017. Oxford: Oxford University Press.
  • Qaiddari, A. 2015. Comparing Iraq’s Shiite forces to Iran’s Basij. Al-Monitor, 11 May.
  • Rasmussen, M.V., 2006. The risk society at war. Cambridge: Cambridge University Press.10.1017/CBO9780511491634
  • Realuyo, C.B. Jul 2015. The future evolution of transnational criminal organizations and the threat to U.S. national security. Washington, DC: Center For Hemispheric Defense Studies.
  • Rickli, J.M., 7 Feb 2007. The impact of globalization on the changing nature of war. GCSP Policy Brief. Geneva: Geneva Centre for Security Policy, No. 24.
  • Rickli, J-M, 2017a. Artificial intelligence and the future of warfare. 2017 global risks report. Geneva: World Economic Forum, 49. http://reports.weforum.org/global-risks-2017/part-3-emerging-technologies/3-2-assessing-the-risk-of-artificial-intelligence/#view/fn-10
  • Rickli, J.-M., 2017b. The impact of autonomous weapons systems on international security and strategic stability. In: Quentin, Ladetto, eds. Defence future technologies: what we see on the horizon. Armasuisse: Thun, 61–64.
  • Rosenau, J.N., 25 Feb 1999. States, sovereignty, and diplomacy in the information age. United States Institute of Peace. Washington, DC: US Institute of Peace.
  • Safi, M., and Robertson, J., 2015. Australian mercenary reportedly killed in Yemen clashes. The Guardian, 8 Dec.
  • Schwab, K., 2016. The fourth industrial revolution. Geneva: World Economic Forum.
  • Shaw, M., 2005. The new western way of war. Malden, MA: Polity Press.
  • Singer, P.W., 2003. Corporate warriors – the rise of the privatized military industry. Ithaca, NY: Cornell University Press.
  • Smith, H., Summer 2005. What costs will democracies bear? A review of popular theories of casualty aversion. Armed Forces & Society, 31(4), 487–512.10.1177/0095327X0503100403
  • Smith, K.H., 2009. Surrogate warfare in the 21st century. In: R.D. Newton, et al. eds. Contemporary security challenges: irregular warfare and indirect approaches. Hurlburt Field, FL: JSOU Report 09-3, 39–54.
  • Thomson, J.E., 1996. Mercenaries, pirates and sovereigns. Princeton, NJ: Princeton UP.10.1515/9781400821242
  • Van Creveld, M., 1991. The transformation of war. New York, NY: Simon & Schuster.
  • Van Creveld, M., 2002. The transformation of war revisited. Small Wars & Insurgencies, 13(2), 3–15.
  • Wiggintona, M., Burton, R., Jensen, C., McElreath, D., Mallory, S. and Doss, D., 2015. Al-Qods Force: Iran’s weapon of choice to export terrorism. Journal of Policing, Intelligence and Counter Terrorism, 10 (2), 153–165.
  • Wulf, H., 2005. The bumpy road to re-establishing a monopoly of violence. Working Paper prepared for the LSE study Group on Europe’s security capabilities. London: London School of Economics and Political Science.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.