|
Sort Order |
|
|
|
Items / Page
|
|
|
|
|
|
|
Srl | Item |
1 |
ID:
134356
|
|
|
Summary/Abstract |
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
162063
|
|
|
3 |
ID:
090624
|
|
|
4 |
ID:
152022
|
|
|
Summary/Abstract |
Politics is critical to making sense of Pakistani successes and failures in dealing with non-state armed groups. This includes domestic political currents; regional political currents; and the global impetus of the post-9/11 era. How these currents overlap renders to any reading of insurgency in Pakistan real complexity. This article engages with this complexity rather than shirking from it. Its hypothesis is that while the insurgency bordering Afghanistan has been an epicentre of Pakistani military efforts to fight the Taliban, this theatre is in of itself insufficiently inclusive to grasp the nature of Pakistan’s security challenges and its consequent responses.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
129964
|
|
|
6 |
ID:
100957
|
|
|
Publication |
2010.
|
Summary/Abstract |
The Cold Start doctrine is an innovative exercise. While Cold Start discusses how to start the campaign, equal thinking needs to attend how to end it. On the conventional level, the learning is that the Cold Start offensives of the integrated battle groups need to be delinked from those of the strike corps. Plausible political aims cannot be visualised that make nuclear risk of launch of strike corps offensives worth running. On the nuclear front, fallout of the scenario considered is on the doctrine of 'massive' nuclear retaliation. This has its limitations in reacting to nuclear strikes of low opprobrium quotient. Moving to 'flexible' nuclear retaliation countenancing ending an exchange at the lowest possible level may be preferable instead. In the nuclear age, utility of military force has reached its limits. The future lies in energising non-military problem solving approaches.
|
|
|
|
|
|
|
|
|
|
7 |
ID:
104718
|
|
|
8 |
ID:
080676
|
|
|
Publication |
2007.
|
Summary/Abstract |
In response to the perceived inability of the Indian military to leverage its conventional superiority to end Pakistan's "proxy war" in Kashmir, the Indian Army announced a new offensive doctrine in 2004 intended to allow it to mobilize quickly and undertake limited retaliatory attacks on its neighbor, without crossing Pakistan's nuclear threshold. This Cold Start doctrine marks a break with the fundamentally defensive military doctrines that India has employed since gaining independence in 1947. Requiring combined arms operating jointly with the Indian Air Force, Cold Start represents a significant advance in India's conventional military capabilities. Yet, despite the Indian Army's intentions, it risks provoking or escalating a crisis on the subcontinent that could breach the nuclear threshold. Recent military exercises and associated organizational changes indicate that although the Indian Army has made progress toward developing an operational Cold Start capability, particularly in the area of network-centric warfare, the doctrine remains in the experimental stage. Nevertheless, this is a development that deserves further study. As the Indian Army enhances its ability to achieve a quick military decision against Pakistan, the political pressure to employ such a strategy in a crisis will increase-with potentially catastrophic results.
|
|
|
|
|
|
|
|
|
|
9 |
ID:
123445
|
|
|
Publication |
2013.
|
Summary/Abstract |
Henelito A Sevilla analyses the genesis of the confl ict in Syria and how and why the internal crisis became internationalised. He argues that the civil war is increasingly being driven and overshadowed by geostrategic competition among other regional and extra-regional powers, which has given it the complexion of an intractable proxy war.
|
|
|
|
|
|
|
|
|
|
10 |
ID:
169585
|
|
|
11 |
ID:
151876
|
|
|
12 |
ID:
181961
|
|
|
Summary/Abstract |
On 9 November 2016, India’s Prime Minister Narendra Modi announced his ‘demonetization’ policy which rendered all Rs. 500 and Rs. 1000 notes null and void. His government claimed that this policy, among other things, would curb stone-pelting in India’s restive Jammu and Kashmir by rendering valueless the copious illegal currency that, according to India, Pakistan pumped into the state to pay protestors to throw stones. Subsequently, New Delhi claimed success despite countervailing evidence for this claim. Here, we assemble a novel dataset to evaluate these assertions. After controlling for other factors that may explain variation in stone-pelting, we find that demonetization corresponded to increased stone-pelting. This finding is important for at least two reasons. First, Indian efforts to depict all protests in Jammu and Kashmir as the result of Pakistani payments both delegitimize Kashmiris’ grievances by reducing them to anti-state behaviors and diminish public appetite for addressing those grievances. Second, the current populist Indian government, which caters to Hindu nationalists, selectively curates facts to justify its actions, big and small, to the detriment of democratic accountability and governance.
|
|
|
|
|
|
|
|
|
|
13 |
ID:
122516
|
|
|
14 |
ID:
102203
|
|
|
15 |
ID:
075621
|
|
|
16 |
ID:
151881
|
|
|
17 |
ID:
190888
|
|
|
Summary/Abstract |
In this article, we present the most up-to-date, fine-grained, global dataset on external support in armed conflicts: the UCDP External Support Dataset (ESD). The dataset encompasses data on states and non-state actors as both supporters and recipients and provides detailed information on the type of support provided to warring parties in armed conflicts between 1975 and 2017. We use it to highlight three broader trends in the provision of external support: (1) a dramatic increase in the number of external supporters, (2) a larger share of pro-government interventions, and (3) the rise of direct military intervention as the predominant mode of external support. In conclusion, we identify several avenues worthy of future inquiry that could significantly improve our understanding of external support in armed conflicts.
|
|
|
|
|
|
|
|
|
|
18 |
ID:
052507
|
|
|
Publication |
April 2004.
|
Summary/Abstract |
In the wake of a terrorist attack on Parliament House in New Delhi in 2001, India mobilized its armies along its western frontiers, and threatened to go to war with Pakistan. In the event, India did not go to war, although none of its key demands--an end to cross-border terrorism, for example, or the return of twenty terrorists claimed to be harbored by Pakistan--were met. This article examines the backdrop to the military of crisis of 2001-2002, in particular the long series of war threats made by India in response to Pakistani sub-conventional warfare in Punjab and Jammu and Kashmir. It argues that neither war threats nor physical fencing of India's frontiers have deterred this subconventional warfare, and that alternate means have to be found to contain it.
|
|
|
|
|
|
|
|
|
|
19 |
ID:
131632
|
|
|
Publication |
2014.
|
Summary/Abstract |
The French intervention in Mali in early 2013 emphasizes that the decision-makers in Paris, Brussels, and Washington considered the establishment of the radical Islamist regime in Northern Mali a threat to their security interests. The widespread instability including the rise of radical Islamist groups in Somalia was perceived as a threat to western interests. It is the core argument of the paper if western powers decide to provide security in Africa, they will be inclined to use proxy instead of deploying own troops. Security provision by proxy in African means that African troops are doing the actual fighting and peacekeeping on the ground while western powers basically pay the costs, the logistics, and the training of local African troops. The paper concludes that the African Union Mission in Somalia (AMISOM) in Somalia and The African-led International Support Mission to Mali (AFISMA) in Mali are proxies for the USA and the European Union.
|
|
|
|
|
|
|
|
|
|
20 |
ID:
177754
|
|
|
Summary/Abstract |
The rapid expansion of the proxy war literature invites an examination of its advances and developments. This article’s aims are threefold. First, to assess proxy war literature with a view to understand how it has progressed knowledge. Second, to map the field’s effort to cumulate knowledge. Third, to think creatively about the future directions of this research agenda as it addresses a problem no longer at the periphery of contemporary security debates. This article proposes a novel categorization of the evolution of our thinking about proxy wars across three “generations”: founders, framers, and reformers. Following on from this, it provides an assessment of the literature’s assumptions in order to show what remains, or not, under-studied. In doing so, it makes a case for a historiography of the idea of “proxy war,” and one for embedding strategy in analyses of wars by proxy.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|