Query Result Set
Skip Navigation Links
   ActiveUsers:1037Hits:18574923Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
PROXY WAR (70) answer(s).
 
1234Next
SrlItem
1
ID:   134356


African nations as proxies in covert cyber operations / Kallberg, Jan; Steven, Rowlen   Article
Kallberg, Jan Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.
        Export Export
2
ID:   162063


Approximating war / Byman, Daniel   Journal Article
Byman, Daniel Journal Article
0 Rating(s) & 0 Review(s)
Key Words Proxy War  Syrian Civil War 
        Export Export
3
ID:   090624


Asymmetric wars - lessons from recent conflicts and its relevan / Mallick, P K   Journal Article
Mallick, P K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
        Export Export
4
ID:   152022


Brinkmanship, not COIN, in Pakistan’s post-9/11 internal war / Puri, Samir   Journal Article
Puri, Samir Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Politics is critical to making sense of Pakistani successes and failures in dealing with non-state armed groups. This includes domestic political currents; regional political currents; and the global impetus of the post-9/11 era. How these currents overlap renders to any reading of insurgency in Pakistan real complexity. This article engages with this complexity rather than shirking from it. Its hypothesis is that while the insurgency bordering Afghanistan has been an epicentre of Pakistani military efforts to fight the Taliban, this theatre is in of itself insufficiently inclusive to grasp the nature of Pakistan’s security challenges and its consequent responses.
Key Words Terrorism  Insurgency  Taliban  Afghanistan  Proxy War  South Asia 
Pakistan  War on Terror  COIN  9/11 
        Export Export
5
ID:   129964


Challenge and dominance...on the line of control / Sabharwal, Mukesh   Journal Article
Sabharwal, Mukesh Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
6
ID:   100957


Cold start and the Sehjra option / Ahmed, Ali   Journal Article
Ahmed, Ali Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Summary/Abstract The Cold Start doctrine is an innovative exercise. While Cold Start discusses how to start the campaign, equal thinking needs to attend how to end it. On the conventional level, the learning is that the Cold Start offensives of the integrated battle groups need to be delinked from those of the strike corps. Plausible political aims cannot be visualised that make nuclear risk of launch of strike corps offensives worth running. On the nuclear front, fallout of the scenario considered is on the doctrine of 'massive' nuclear retaliation. This has its limitations in reacting to nuclear strikes of low opprobrium quotient. Moving to 'flexible' nuclear retaliation countenancing ending an exchange at the lowest possible level may be preferable instead. In the nuclear age, utility of military force has reached its limits. The future lies in energising non-military problem solving approaches.
        Export Export
7
ID:   104718


Cold start doctrine / Athale, Anil   Journal Article
Athale, Anil Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
8
ID:   080676


Cold Start for hot wars? the Indian army's new limited war doct / Ladwig, Walter C   Journal Article
Ladwig, Walter C Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Summary/Abstract In response to the perceived inability of the Indian military to leverage its conventional superiority to end Pakistan's "proxy war" in Kashmir, the Indian Army announced a new offensive doctrine in 2004 intended to allow it to mobilize quickly and undertake limited retaliatory attacks on its neighbor, without crossing Pakistan's nuclear threshold. This Cold Start doctrine marks a break with the fundamentally defensive military doctrines that India has employed since gaining independence in 1947. Requiring combined arms operating jointly with the Indian Air Force, Cold Start represents a significant advance in India's conventional military capabilities. Yet, despite the Indian Army's intentions, it risks provoking or escalating a crisis on the subcontinent that could breach the nuclear threshold. Recent military exercises and associated organizational changes indicate that although the Indian Army has made progress toward developing an operational Cold Start capability, particularly in the area of network-centric warfare, the doctrine remains in the experimental stage. Nevertheless, this is a development that deserves further study. As the Indian Army enhances its ability to achieve a quick military decision against Pakistan, the political pressure to employ such a strategy in a crisis will increase-with potentially catastrophic results.
Key Words Military doctrine  Security  Proxy War  India  Limited War  Pakistan - 1967-1977 
        Export Export
9
ID:   123445


Conflict in Syria: the changing political landscape of the Middle East / Sevilla, Henelito   Journal Article
Sevilla, Henelito Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract Henelito A Sevilla analyses the genesis of the confl ict in Syria and how and why the internal crisis became internationalised. He argues that the civil war is increasingly being driven and overshadowed by geostrategic competition among other regional and extra-regional powers, which has given it the complexion of an intractable proxy war.
Key Words Proxy War  Middle East  Syria  Regional Powers  Geostrategic Competition  Civil War 
        Export Export
10
ID:   169585


Countering Pakistan's proxy war / Kanwal, Gurmeet   Journal Article
Kanwal, Gurmeet Journal Article
0 Rating(s) & 0 Review(s)
Key Words Proxy War  Pakistan 
        Export Export
11
ID:   151876


Countering Pakistan's war: tactical assertiveness, strategic restraint / Kanwal, Gurmeet   Journal Article
Kanwal, Gurmeet Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
12
ID:   181961


Did India’s demonetization policy curb stone-pelting in Indian-administered Kashmir / Fair, C Christine; Ghotane, Digvijay; Patel, Parina   Journal Article
Fair, C Christine Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract On 9 November 2016, India’s Prime Minister Narendra Modi announced his ‘demonetization’ policy which rendered all Rs. 500 and Rs. 1000 notes null and void. His government claimed that this policy, among other things, would curb stone-pelting in India’s restive Jammu and Kashmir by rendering valueless the copious illegal currency that, according to India, Pakistan pumped into the state to pay protestors to throw stones. Subsequently, New Delhi claimed success despite countervailing evidence for this claim. Here, we assemble a novel dataset to evaluate these assertions. After controlling for other factors that may explain variation in stone-pelting, we find that demonetization corresponded to increased stone-pelting. This finding is important for at least two reasons. First, Indian efforts to depict all protests in Jammu and Kashmir as the result of Pakistani payments both delegitimize Kashmiris’ grievances by reducing them to anti-state behaviors and diminish public appetite for addressing those grievances. Second, the current populist Indian government, which caters to Hindu nationalists, selectively curates facts to justify its actions, big and small, to the detriment of democratic accountability and governance.
        Export Export
13
ID:   122516


Economics of defence: investment vs deterrence / Banerjee, Gautam   Journal Article
Banerjee, Gautam Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
14
ID:   102203


Efficacy of coercive force in the Indian context / Kanwal, Gurmeet   Journal Article
Kanwal, Gurmeet Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
15
ID:   075621


Ethopia's deployment to Somalia risks proxy war / Hansen, Stig Jarle   Journal Article
Hansen, Stig Jarle Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
        Export Export
16
ID:   151881


Exploiting Pakistan's internal faultlines: where lies the problem? / Sareen, Sushant   Journal Article
Sareen, Sushant Journal Article
0 Rating(s) & 0 Review(s)
Key Words Terrorism  Proxy War  India  Pakistan  Jammu and Kashmir  Asymmetric Warfare 
        Export Export
17
ID:   190888


External support in armed conflicts: introducing the UCDP external support dataset (ESD), 1975–2017 / Meier, Vanessa; Karlen, Niklas ; Croicu, Mihai   Journal Article
Karlen, Niklas Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In this article, we present the most up-to-date, fine-grained, global dataset on external support in armed conflicts: the UCDP External Support Dataset (ESD). The dataset encompasses data on states and non-state actors as both supporters and recipients and provides detailed information on the type of support provided to warring parties in armed conflicts between 1975 and 2017. We use it to highlight three broader trends in the provision of external support: (1) a dramatic increase in the number of external supporters, (2) a larger share of pro-government interventions, and (3) the rise of direct military intervention as the predominant mode of external support. In conclusion, we identify several avenues worthy of future inquiry that could significantly improve our understanding of external support in armed conflicts.
        Export Export
18
ID:   052507


Failed threats and flawed fences: india's military responses to / Swami, Praveen April 2004  Journal Article
Swami, Praveen Journal Article
0 Rating(s) & 0 Review(s)
Publication April 2004.
Summary/Abstract In the wake of a terrorist attack on Parliament House in New Delhi in 2001, India mobilized its armies along its western frontiers, and threatened to go to war with Pakistan. In the event, India did not go to war, although none of its key demands--an end to cross-border terrorism, for example, or the return of twenty terrorists claimed to be harbored by Pakistan--were met. This article examines the backdrop to the military of crisis of 2001-2002, in particular the long series of war threats made by India in response to Pakistani sub-conventional warfare in Punjab and Jammu and Kashmir. It argues that neither war threats nor physical fencing of India's frontiers have deterred this subconventional warfare, and that alternate means have to be found to contain it.
        Export Export
19
ID:   131632


Fighting terrorism in Africa by proxy: the USA and the European Union in Somalia and Mali / Olsen, Gorm Rye   Journal Article
Olsen, Gorm Rye Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The French intervention in Mali in early 2013 emphasizes that the decision-makers in Paris, Brussels, and Washington considered the establishment of the radical Islamist regime in Northern Mali a threat to their security interests. The widespread instability including the rise of radical Islamist groups in Somalia was perceived as a threat to western interests. It is the core argument of the paper if western powers decide to provide security in Africa, they will be inclined to use proxy instead of deploying own troops. Security provision by proxy in African means that African troops are doing the actual fighting and peacekeeping on the ground while western powers basically pay the costs, the logistics, and the training of local African troops. The paper concludes that the African Union Mission in Somalia (AMISOM) in Somalia and The African-led International Support Mission to Mali (AFISMA) in Mali are proxies for the USA and the European Union.
        Export Export
20
ID:   177754


Framers, founders, and reformers: three generations of proxy war research / Rauta, Vladimir   Journal Article
Rauta, Vladimir Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The rapid expansion of the proxy war literature invites an examination of its advances and developments. This article’s aims are threefold. First, to assess proxy war literature with a view to understand how it has progressed knowledge. Second, to map the field’s effort to cumulate knowledge. Third, to think creatively about the future directions of this research agenda as it addresses a problem no longer at the periphery of contemporary security debates. This article proposes a novel categorization of the evolution of our thinking about proxy wars across three “generations”: founders, framers, and reformers. Following on from this, it provides an assessment of the literature’s assumptions in order to show what remains, or not, under-studied. In doing so, it makes a case for a historiography of the idea of “proxy war,” and one for embedding strategy in analyses of wars by proxy.
Key Words Security  Proxy War  External Support  Strategy  History  Cumulation 
        Export Export
1234Next