CINXE.COM

(PDF) Introduction to the Special Issue ‘Proxy forces in modern warfare’ | Cuneyt Gurer - Academia.edu

<!DOCTYPE html> <html > <head> <meta charset="utf-8"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <meta content="width=device-width, initial-scale=1" name="viewport"> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs"> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="rfK/cjSiB+fgvXqFpAr82MJv4+aVwGZdLW5BIKO3G29moN7B2yOcAdu5ox3mPvNKN5qGvdoKyQRs6cuDHFlyHQ==" /> <meta name="citation_title" content="Introduction to the Special Issue ‘Proxy forces in modern warfare’" /> <meta name="citation_publication_date" content="2020/01/01" /> <meta name="citation_author" content="Cuneyt Gurer" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:url" content="https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_" /> <meta name="twitter:title" content="Introduction to the Special Issue ‘Proxy forces in modern warfare’" /> <meta name="twitter:description" content="As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the" /> <meta name="twitter:image" content="https://0.academia-photos.com/4622523/1932755/18260467/s200_cuneyt.gurer.jpg" /> <meta property="fb:app_id" content="2369844204" /> <meta property="og:type" content="article" /> <meta property="og:url" content="https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_" /> <meta property="og:title" content="Introduction to the Special Issue ‘Proxy forces in modern warfare’" /> <meta property="og:image" content="http://a.academia-assets.com/images/open-graph-icons/fb-paper.gif" /> <meta property="og:description" content="As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the" /> <meta property="article:author" content="https://kentstate.academia.edu/CuneytGurer" /> <meta name="description" content="As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the" /> <title>(PDF) Introduction to the Special Issue ‘Proxy forces in modern warfare’ | Cuneyt Gurer - Academia.edu</title> <link rel="canonical" href="https://www.academia.edu/64623242/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_" /> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "single_work", 'action': "show", 'controller_action': 'single_work#show', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script> var $controller_name = 'single_work'; var $action_name = "show"; var $rails_env = 'production'; var $app_rev = '9387f500ddcbb8d05c67bef28a2fe0334f1aafb8'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.require = { config: function() { return function() {} } } </script> <script> window.Aedu = window.Aedu || {}; window.Aedu.hit_data = null; window.Aedu.serverRenderTime = new Date(1733035238000); window.Aedu.timeDifference = new Date().getTime() - 1733035238000; </script> <script type="application/ld+json">{"@context":"https://schema.org","@type":"ScholarlyArticle","abstract":"As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the battlefield, however ancient, has been gaining momentum recently as developments in almost all contemporary conflict zones illustrate. Raging from the Central African Republic, to Libya, Syria, Ukraine, and beyond, contemporary wars are being waged more and more with or through non-state actors – proxies. Whether foreign military interventions, counter-terrorism operations, training missions, or hybrid wars, proxies have been there and, seemingly, are to remain. Therefore, it fell upon us to ensure that such an urgent and pertinent topic should not evade deeper academic scrutiny and, together with our corresponding Authors, both practitioners and academics, we hope that this Special Issue at least partially achieves this.","author":[{"@context":"https://schema.org","@type":"Person","name":"Cuneyt Gurer"}],"contributor":[],"dateCreated":"2022-02-13","dateModified":"2022-02-13","datePublished":"2020-01-01","headline":"Introduction to the Special Issue ‘Proxy forces in modern warfare’","inLanguage":"en","keywords":[],"locationCreated":null,"publication":null,"publisher":{"@context":"https://schema.org","@type":"Organization","name":null},"image":null,"thumbnailUrl":null,"url":"https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_","sourceOrganization":[{"@context":"https://schema.org","@type":"EducationalOrganization","name":"kentstate"}]}</script><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/single_work_page/loswp-102fa537001ba4d8dcd921ad9bd56c474abc201906ea4843e7e7efe9dfbf561d.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-8d679e925718b5e8e4b18e9a4fab37f7eaa99e43386459376559080ac8f2856a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/text_button-73590134e40cdb49f9abdc8e796cc00dc362693f3f0f6137d6cf9bb78c318ce7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> </head> <body> <div id='react-modal'></div> <div class="js-upgrade-ie-banner" style="display: none; text-align: center; padding: 8px 0; background-color: #ebe480;"><p style="color: #000; font-size: 12px; margin: 0 0 4px;">Academia.edu no longer supports Internet Explorer.</p><p style="color: #000; font-size: 12px; margin: 0;">To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.querySelector('.js-upgrade-ie-banner').style.display = 'block'; }</script> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "2a8fb9a5dddb3c02c4a80fa70dcc22f9c63424e57749c470d438ecff681ca17f", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="LRyqZF5rlqF4Lv7MRjoux8QVPHZb4oICpHZfZH2UXVHmTsvXseoNR0MqJ1QEDiFVMeBZLRQoLVvl8dXHwno0Iw==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="goTRezaX9m5CC19En3G/fByA6z5P4CIDrkN8o92oTqpJ1rDI2RZtiHkPhtzdRbDu6XWOZQAqjVrvxPYAYkYn2A==" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><input class="btn btn-primary btn-block g-recaptcha js-password-reset-submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" type="submit" value="Email me a link" /></form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script> <div class="header--container" id="main-header-container"><div class="header--inner-container header--inner-container-ds2"><div class="header-ds2--left-wrapper"><div class="header-ds2--left-wrapper-inner"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="hide-on-desktop-redesign" style="height: 24px; width: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hide-on-mobile-redesign" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a><div class="header--search-container header--search-container-ds2"><form class="js-SiteSearch-form select2-no-default-pills" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><svg style="width: 14px; height: 14px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="search" class="header--search-icon svg-inline--fa fa-search fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"></path></svg><input class="header--search-input header--search-input-ds2 js-SiteSearch-form-input" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" /></form></div></div></div><nav class="header--nav-buttons header--nav-buttons-ds2 js-main-nav"><a class="ds2-5-button ds2-5-button--secondary js-header-login-url header-button-ds2 header-login-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/login" rel="nofollow">Log In</a><a class="ds2-5-button ds2-5-button--secondary header-button-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a><button class="header--hamburger-button header--hamburger-button-ds2 hide-on-desktop-redesign js-header-hamburger-button"><div class="icon-bar"></div><div class="icon-bar" style="margin-top: 4px;"></div><div class="icon-bar" style="margin-top: 4px;"></div></button></nav></div><ul class="header--dropdown-container js-header-dropdown"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/login" rel="nofollow">Log In</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a></li><li class="header--dropdown-row js-header-dropdown-expand-button"><button class="header--dropdown-button">more<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-down" class="header--dropdown-button-icon svg-inline--fa fa-caret-down fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z"></path></svg></button></li><li><ul class="header--expanded-dropdown-container"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/about">About</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/press">Press</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://medium.com/@academia">Blog</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/documents">Papers</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/terms">Terms</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/privacy">Privacy</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/copyright">Copyright</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/hiring"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="header--dropdown-row-icon svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>We&#39;re Hiring!</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://support.academia.edu/"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="header--dropdown-row-icon svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>Help Center</a></li><li class="header--dropdown-row js-header-dropdown-collapse-button"><button class="header--dropdown-button">less<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-up" class="header--dropdown-button-icon svg-inline--fa fa-caret-up fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></button></li></ul></li></ul></div> <script src="//a.academia-assets.com/assets/webpack_bundles/fast_loswp-bundle-86832e264efa375cdd3fa5979579c95643bf6a5c1b20c95ec7a98005fcb4b9a4.js" defer="defer"></script><script>window.loswp = {}; window.loswp.author = 4622523; window.loswp.bulkDownloadFilterCounts = {}; window.loswp.hasDownloadableAttachment = true; window.loswp.hasViewableAttachments = true; // TODO: just use routes for this window.loswp.loginUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F71298110%2FIntroduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_%3Fauto%3Ddownload"; window.loswp.translateUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F71298110%2FIntroduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_%3Fshow_translation%3Dtrue"; window.loswp.previewableAttachments = [{"id":80702854,"identifier":"Attachment_80702854","shouldShowBulkDownload":false}]; window.loswp.shouldDetectTimezone = true; window.loswp.shouldShowBulkDownload = true; window.loswp.showSignupCaptcha = false window.loswp.willEdgeCache = false; window.loswp.work = {"work":{"id":71298110,"created_at":"2022-02-13T00:06:01.373-08:00","from_world_paper_id":195563640,"updated_at":"2022-02-13T00:29:00.696-08:00","_data":{"abstract":"As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the battlefield, however ancient, has been gaining momentum recently as developments in almost all contemporary conflict zones illustrate. Raging from the Central African Republic, to Libya, Syria, Ukraine, and beyond, contemporary wars are being waged more and more with or through non-state actors – proxies. Whether foreign military interventions, counter-terrorism operations, training missions, or hybrid wars, proxies have been there and, seemingly, are to remain. Therefore, it fell upon us to ensure that such an urgent and pertinent topic should not evade deeper academic scrutiny and, together with our corresponding Authors, both practitioners and academics, we hope that this Special Issue at least partially achieves this.","publication_date":"2020,,"},"document_type":"paper","pre_hit_view_count_baseline":null,"quality":"high","language":"en","title":"Introduction to the Special Issue ‘Proxy forces in modern warfare’","broadcastable":false,"draft":null,"has_indexable_attachment":true,"indexable":true}}["work"]; window.loswp.workCoauthors = [4622523]; window.loswp.locale = "en"; window.loswp.countryCode = "SG"; window.loswp.cwvAbTestBucket = ""; window.loswp.designVariant = "ds_vanilla"; window.loswp.fullPageMobileSutdModalVariant = "control"; window.loswp.useOptimizedScribd4genScript = false; window.loswp.appleClientId = 'edu.academia.applesignon';</script><script defer="" src="https://accounts.google.com/gsi/client"></script><div class="ds-loswp-container"><div class="ds-work-card--grid-container"><div class="ds-work-card--container js-loswp-work-card"><div class="ds-work-card--cover"><div class="ds-work-cover--wrapper"><div class="ds-work-cover--container"><button class="ds-work-cover--clickable js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;swp-splash-paper-cover&quot;,&quot;attachmentId&quot;:80702854,&quot;attachmentType&quot;:&quot;pdf&quot;}"><img alt="First page of “Introduction to the Special Issue ‘Proxy forces in modern warfare’”" class="ds-work-cover--cover-thumbnail" src="https://0.academia-photos.com/attachment_thumbnails/80702854/mini_magick20220213-15452-13htoa5.png?1644739787" /><img alt="PDF Icon" class="ds-work-cover--file-icon" src="//a.academia-assets.com/assets/single_work_splash/adobe.icon-574afd46eb6b03a77a153a647fb47e30546f9215c0ee6a25df597a779717f9ef.svg" /><div class="ds-work-cover--hover-container"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span><p>Download Free PDF</p></div><div class="ds-work-cover--ribbon-container">Download Free PDF</div><div class="ds-work-cover--ribbon-triangle"></div></button></div></div></div><div class="ds-work-card--work-information"><h1 class="ds-work-card--work-title">Introduction to the Special Issue ‘Proxy forces in modern warfare’</h1><div class="ds-work-card--work-authors ds-work-card--detail"><a class="ds-work-card--author js-wsj-grid-card-author ds2-5-body-md ds2-5-body-link" data-author-id="4622523" href="https://kentstate.academia.edu/CuneytGurer"><img alt="Profile image of Cuneyt Gurer" class="ds-work-card--author-avatar" src="https://0.academia-photos.com/4622523/1932755/18260467/s65_cuneyt.gurer.jpg" />Cuneyt Gurer</a></div><div class="ds-work-card--detail"><p class="ds-work-card--detail ds2-5-body-sm">2020</p><div class="ds-work-card--work-metadata"><div class="ds-work-card--work-metadata__stat"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">visibility</span><p class="ds2-5-body-sm" id="work-metadata-view-count">…</p></div><div class="ds-work-card--work-metadata__stat"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">description</span><p class="ds2-5-body-sm">5 pages</p></div><div class="ds-work-card--work-metadata__stat"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">link</span><p class="ds2-5-body-sm">1 file</p></div></div><script>(async () => { const workId = 71298110; const worksViewsPath = "/v0/works/views?subdomain_param=api&amp;work_ids%5B%5D=71298110"; const getWorkViews = async (workId) => { const response = await fetch(worksViewsPath); if (!response.ok) { throw new Error('Failed to load work views'); } const data = await response.json(); return data.views[workId]; }; // Get the view count for the work - we send this immediately rather than waiting for // the DOM to load, so it can be available as soon as possible (but without holding up // the backend or other resource requests, because it's a bit expensive and not critical). const viewCount = await getWorkViews(workId); const updateViewCount = (viewCount) => { const viewCountNumber = Number(viewCount); if (!viewCountNumber) { throw new Error('Failed to parse view count'); } const commaizedViewCount = viewCountNumber.toLocaleString(); const viewCountBody = document.getElementById('work-metadata-view-count'); if (viewCountBody) { viewCountBody.textContent = `${commaizedViewCount} views`; } else { throw new Error('Failed to find work views element'); } }; // If the DOM is still loading, wait for it to be ready before updating the view count. if (document.readyState === "loading") { document.addEventListener('DOMContentLoaded', () => { updateViewCount(viewCount); }); // Otherwise, just update it immediately. } else { updateViewCount(viewCount); } })();</script></div><p class="ds-work-card--work-abstract ds-work-card--detail ds2-5-body-md">As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the battlefield, however ancient, has been gaining momentum recently as developments in almost all contemporary conflict zones illustrate. Raging from the Central African Republic, to Libya, Syria, Ukraine, and beyond, contemporary wars are being waged more and more with or through non-state actors – proxies. Whether foreign military interventions, counter-terrorism operations, training missions, or hybrid wars, proxies have been there and, seemingly, are to remain. Therefore, it fell upon us to ensure that such an urgent and pertinent topic should not evade deeper academic scrutiny and, together with our corresponding Authors, both practitioners and academics, we hope that this Special Issue at least partially achieves this.</p><div class="ds-work-card--button-container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;continue-reading-button--work-card&quot;,&quot;attachmentId&quot;:80702854,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;workUrl&quot;:&quot;https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_&quot;}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;download-pdf-button--work-card&quot;,&quot;attachmentId&quot;:80702854,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;workUrl&quot;:&quot;https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_&quot;}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div></div><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-doc_id="80702854" data-landing_url="https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><div class="ds-top-related-works--grid-container"><div class="ds-related-content--container ds-top-related-works--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="0" data-entity-id="115804999" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/115804999/Foreword_to_the_Special_Issue_Proxy_forces_in_modern_warfare_Practitioner_s_perspective_on_the_use_of_proxy_forces">Foreword to the Special Issue ‘Proxy forces in modern warfare’: Practitioner’s perspective on the use of proxy forces</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1096584" href="https://independent.academia.edu/%C3%96merCantenar">Ömer Cantenar</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Security and Defence Quarterly, 2020</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Foreword to the Special Issue ‘Proxy forces in modern warfare’: Practitioner’s perspective on the use of proxy forces&quot;,&quot;attachmentId&quot;:112110051,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/115804999/Foreword_to_the_Special_Issue_Proxy_forces_in_modern_warfare_Practitioner_s_perspective_on_the_use_of_proxy_forces&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/115804999/Foreword_to_the_Special_Issue_Proxy_forces_in_modern_warfare_Practitioner_s_perspective_on_the_use_of_proxy_forces"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="1" data-entity-id="78011339" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/78011339/Outsourcing_warfare_Proxy_forces_in_contemporary_armed_conflicts">Outsourcing warfare: Proxy forces in contemporary armed conflicts</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="34766279" href="https://marshallcenter.academia.edu/JamesWither">James Wither</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Security and Defence Quarterly</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Outsourcing warfare: Proxy forces in contemporary armed conflicts&quot;,&quot;attachmentId&quot;:85205822,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/78011339/Outsourcing_warfare_Proxy_forces_in_contemporary_armed_conflicts&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/78011339/Outsourcing_warfare_Proxy_forces_in_contemporary_armed_conflicts"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="2" data-entity-id="45068106" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/45068106/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine">Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="6009796" href="https://independent.academia.edu/BlazejPoplawski">Blazej Poplawski</a><span>, </span><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="56324293" href="https://independent.academia.edu/CyprianKozera">Cyprian Kozera</a><span>, </span><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="4622523" href="https://kentstate.academia.edu/CuneytGurer">Cuneyt Gurer</a><span>, </span><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="39497328" href="https://rwu.academia.edu/MehmetAlperS%C3%96ZER">Mehmet Alper SÖZER</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Security and Defense Quarterly, 2020</p><p class="ds-related-work--abstract ds2-5-body-sm">The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject , governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently , the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict&#39;s outcome.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine&quot;,&quot;attachmentId&quot;:65624067,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/45068106/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/45068106/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="3" data-entity-id="24939682" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/24939682/From_civil_war_to_proxy_war_past_history_and_current_dilemmas">From civil war to proxy war: past history and current dilemmas</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="48084021" href="https://diolt.academia.edu/hoorschumail">hoor schumail</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;From civil war to proxy war: past history and current dilemmas&quot;,&quot;attachmentId&quot;:45270982,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/24939682/From_civil_war_to_proxy_war_past_history_and_current_dilemmas&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/24939682/From_civil_war_to_proxy_war_past_history_and_current_dilemmas"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="4" data-entity-id="6697149" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/6697149/Hlouchova_Iveta_Afghanistan_After_2014_A_proxy_War_published_in_In_Majer_M_Ondrejcs%C3%A1k_R_eds_Panorama_of_Global_Security_Environment_2013_Bratislava_Center_for_European_and_North_Atlantic_Affairs_2013_s_457_468_ISBN_978_80_971124_5_5">Hlouchova Iveta Afghanistan After 2014 A proxy War - published in: In Majer, M. – Ondrejcsák, R. (eds.). Panorama of Global Security Environment 2013. Bratislava: Center for European and North Atlantic Affairs, 2013. s. 457-468. ISBN 978-80-971124-5-5</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3471952" href="https://unyp.academia.edu/IvetaHlouchova">Iveta Hlouchova</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Hlouchova Iveta Afghanistan After 2014 A proxy War - published in: In Majer, M. – Ondrejcsák, R. (eds.). Panorama of Global Security Environment 2013. Bratislava: Center for European and North Atlantic Affairs, 2013. s. 457-468. ISBN 978-80-971124-5-5&quot;,&quot;attachmentId&quot;:33420780,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/6697149/Hlouchova_Iveta_Afghanistan_After_2014_A_proxy_War_published_in_In_Majer_M_Ondrejcs%C3%A1k_R_eds_Panorama_of_Global_Security_Environment_2013_Bratislava_Center_for_European_and_North_Atlantic_Affairs_2013_s_457_468_ISBN_978_80_971124_5_5&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/6697149/Hlouchova_Iveta_Afghanistan_After_2014_A_proxy_War_published_in_In_Majer_M_Ondrejcs%C3%A1k_R_eds_Panorama_of_Global_Security_Environment_2013_Bratislava_Center_for_European_and_North_Atlantic_Affairs_2013_s_457_468_ISBN_978_80_971124_5_5"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="5" data-entity-id="115480478" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/115480478/A_Symposium_debating_surrogate_warfare_and_the_transformation_of_war">A Symposium – debating ‘surrogate warfare’ and the transformation of war</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="2687908" href="https://gcsp.academia.edu/JeanMarcRickli">Jean-Marc Rickli</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Defence Studies, 2019</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;A Symposium – debating ‘surrogate warfare’ and the transformation of war&quot;,&quot;attachmentId&quot;:111875885,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/115480478/A_Symposium_debating_surrogate_warfare_and_the_transformation_of_war&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/115480478/A_Symposium_debating_surrogate_warfare_and_the_transformation_of_war"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="6" data-entity-id="78570009" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/78570009/Changing_the_character_of_proxy_warfare_and_its_consequences_for_geopolitical_relationships">Changing the character of proxy warfare and its consequences for geopolitical relationships</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="119495632" href="https://etu.academia.edu/ZoranIvanov">Zoran Ivanov</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2021</p><p class="ds-related-work--abstract ds2-5-body-sm">The main purpose of the article is to examine the causal relationship between key elements of the geostrategic environment (i.e. political, military, and technological) and the changes in the characteristics of proxy force. Qualitative data analysis is used to identify the geopolitical environment conditions, actors, and their relationship. The causal analysis between key elements of the geopolitical environment, such as politics, military, and technological, therefore influences how proxy forces change character. The findings imply that the contemporary geopolitical environment is changing the character of the proxies. They can be used as multipurpose forces depending on the desired strategic outcome. The results advocate that proxies have a global reach beyond the traditional battlefield. These capabilities allow proxies to be used in a wide range of political, economic, and military activities, especially in peacetime, and, therefore, influencing, changing, and damaging the state...</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Changing the character of proxy warfare and its consequences for geopolitical relationships&quot;,&quot;attachmentId&quot;:85572628,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/78570009/Changing_the_character_of_proxy_warfare_and_its_consequences_for_geopolitical_relationships&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/78570009/Changing_the_character_of_proxy_warfare_and_its_consequences_for_geopolitical_relationships"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="7" data-entity-id="121313482" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/121313482/Proxy_Warfare">Proxy Warfare</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="16031" href="https://biu.academia.edu/ArielZellman">Ariel Zellman</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Political Science Quarterly, 2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Proxy Warfare&quot;,&quot;attachmentId&quot;:116225378,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/121313482/Proxy_Warfare&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/121313482/Proxy_Warfare"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="8" data-entity-id="37347851" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/37347851/The_Proxy_Warfare_in_Syria">The Proxy Warfare in Syria</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1763029" href="https://nottingham.academia.edu/AytacKADIOGLU">Aytac KADIOGLU</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Political Reflection, 2018</p><p class="ds-related-work--abstract ds2-5-body-sm">It has been seven years since the beginning of the Syrian civil war. When the Arab uprisings spread throughout Syria, it was not thought that the peaceful protests would turn into one of the worst human-made disasters since World War II. After the Assad regime’s security forces shot dead protesters in southern city of Daraa, the level of violence has been steadily increased nationwide. The situation has been even more complicated when the civil war turned a proxy warfare led by the most powerful countries in the world. This paper aims to draw a picture of why and how proxy warfare occurred in Syria.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;The Proxy Warfare in Syria&quot;,&quot;attachmentId&quot;:57545044,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/37347851/The_Proxy_Warfare_in_Syria&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/37347851/The_Proxy_Warfare_in_Syria"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="9" data-entity-id="12697679" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/12697679/Ariel_Ahram_Proxy_Warriors_The_Rise_and_Fall_of_State_Sponsored_Militias_Timothy_D_Sisk_International_Mediation_in_Civil_Wars_Bargaining_with_Bullets_Amalendu_Misra_Politics_of_Civil_Wars_Conflict_Intervention_and_Resolution">Ariel Ahram: Proxy Warriors: The Rise and Fall of State-Sponsored Militias Timothy D. Sisk: International Mediation in Civil Wars: Bargaining with Bullets Amalendu Misra: Politics of Civil Wars: Conflict, Intervention and Resolution</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="31714931" href="https://georgetown.academia.edu/LaiaBalcells">Laia Balcells</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Democracy and Security, 2012</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Ariel Ahram: Proxy Warriors: The Rise and Fall of State-Sponsored Militias Timothy D. Sisk: International Mediation in Civil Wars: Bargaining with Bullets Amalendu Misra: Politics of Civil Wars: Conflict, Intervention and Resolution&quot;,&quot;attachmentId&quot;:39613224,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/12697679/Ariel_Ahram_Proxy_Warriors_The_Rise_and_Fall_of_State_Sponsored_Militias_Timothy_D_Sisk_International_Mediation_in_Civil_Wars_Bargaining_with_Bullets_Amalendu_Misra_Politics_of_Civil_Wars_Conflict_Intervention_and_Resolution&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/12697679/Ariel_Ahram_Proxy_Warriors_The_Rise_and_Fall_of_State_Sponsored_Militias_Timothy_D_Sisk_International_Mediation_in_Civil_Wars_Bargaining_with_Bullets_Amalendu_Misra_Politics_of_Civil_Wars_Conflict_Intervention_and_Resolution"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div></div><div class="ds-sticky-ctas--wrapper js-loswp-sticky-ctas hidden"><div class="ds-sticky-ctas--grid-container"><div class="ds-sticky-ctas--container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;continue-reading-button--sticky-ctas&quot;,&quot;attachmentId&quot;:80702854,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;workUrl&quot;:null}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;download-pdf-button--sticky-ctas&quot;,&quot;attachmentId&quot;:80702854,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;workUrl&quot;:null}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div><div class="ds-below-fold--grid-container"><div class="ds-work--container js-loswp-embedded-document"><div class="attachment_preview" data-attachment="Attachment_80702854" style="display: none"><div class="js-scribd-document-container"><div class="scribd--document-loading js-scribd-document-loader" style="display: block;"><img alt="Loading..." src="//a.academia-assets.com/images/loaders/paper-load.gif" /><p>Loading Preview</p></div></div><div style="text-align: center;"><div class="scribd--no-preview-alert js-preview-unavailable"><p>Sorry, preview is currently unavailable. You can download the paper by clicking the button above.</p></div></div></div></div><div class="ds-sidebar--container js-work-sidebar"><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="0" data-entity-id="113871090" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/113871090/Proxy_War_its_Philosophy_and_Ethics">Proxy War: its Philosophy and Ethics</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1177657" href="https://uni-nke.academia.edu/MihalyBoda">Mihaly Boda</a></div><p class="ds-related-work--metadata ds2-5-body-xs">POSREDNA VOJNA: NJENA FILOZOFIJA IN ETIKA / Contemporary Military Challenges, 2023</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Proxy War: its Philosophy and Ethics&quot;,&quot;attachmentId&quot;:110720620,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/113871090/Proxy_War_its_Philosophy_and_Ethics&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/113871090/Proxy_War_its_Philosophy_and_Ethics"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="1" data-entity-id="80164575" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/80164575/Proxy_Wars_and_the_Role_of_Intelligence_Services_in_the_Current_Middle_East">Proxy Wars and the Role of Intelligence Services in the Current Middle-East</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="30143087" href="https://muni.academia.edu/JosefKraus">Josef Kraus</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Vojenské rozhledy, 2018</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Proxy Wars and the Role of Intelligence Services in the Current Middle-East&quot;,&quot;attachmentId&quot;:86637625,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/80164575/Proxy_Wars_and_the_Role_of_Intelligence_Services_in_the_Current_Middle_East&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/80164575/Proxy_Wars_and_the_Role_of_Intelligence_Services_in_the_Current_Middle_East"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="2" data-entity-id="99427051" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/99427051/_The_Geopolitics_of_Proxy_Wars_in_the_Middle_East_A_Study_of_the_Syrian_Conflict_">&quot;The Geopolitics of Proxy Wars in the Middle East: A Study of the Syrian Conflict&quot;</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="100109380" href="https://upesh.academia.edu/MuhammadLabeebkhanSIkendar">Muhammad Labeeb khan SIkendar</a></div><p class="ds-related-work--metadata ds2-5-body-xs">The Geopolitics of Proxy Wars in the Middle East: A Study of the Syrian Conflict, 2023</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;\&quot;The Geopolitics of Proxy Wars in the Middle East: A Study of the Syrian Conflict\&quot;&quot;,&quot;attachmentId&quot;:100519837,&quot;attachmentType&quot;:&quot;docx&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/99427051/_The_Geopolitics_of_Proxy_Wars_in_the_Middle_East_A_Study_of_the_Syrian_Conflict_&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/99427051/_The_Geopolitics_of_Proxy_Wars_in_the_Middle_East_A_Study_of_the_Syrian_Conflict_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="3" data-entity-id="75236261" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/75236261/Private_Military_Companies_and_the_Outsourcing_of_War_A_Spark_of_Destabilisation_to_the_Global_Security">Private Military Companies and the Outsourcing of War: A Spark of Destabilisation to the Global Security</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="5967021" href="https://ufpb.academia.edu/LeilaBijos">Leila Bijos</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2020</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Private Military Companies and the Outsourcing of War: A Spark of Destabilisation to the Global Security&quot;,&quot;attachmentId&quot;:83086937,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/75236261/Private_Military_Companies_and_the_Outsourcing_of_War_A_Spark_of_Destabilisation_to_the_Global_Security&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/75236261/Private_Military_Companies_and_the_Outsourcing_of_War_A_Spark_of_Destabilisation_to_the_Global_Security"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="4" data-entity-id="100904311" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/100904311/ELEMENTS_OF_THE_PROXY_WAR_IN_SYRIA_AND_THE_WIDER_IMPACTS">ELEMENTS OF THE PROXY WAR IN SYRIA AND THE WIDER IMPACTS</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="49164685" href="https://unibit.academia.edu/RamizIsmajli">Ramiz Ismajli</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Security and Defense , 2023</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;ELEMENTS OF THE PROXY WAR IN SYRIA AND THE WIDER IMPACTS&quot;,&quot;attachmentId&quot;:101593133,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/100904311/ELEMENTS_OF_THE_PROXY_WAR_IN_SYRIA_AND_THE_WIDER_IMPACTS&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/100904311/ELEMENTS_OF_THE_PROXY_WAR_IN_SYRIA_AND_THE_WIDER_IMPACTS"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="5" data-entity-id="1058070" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1058070/Internationalized_Non_International_Armed_Conflicts_Case_Studies_of_Afghanistan_Kampuchea_and_Lebanon">Internationalized Non-International Armed Conflicts: Case Studies of Afghanistan, Kampuchea, and Lebanon</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="901541" href="https://alatoo.academia.edu/ZhazgulIshenova">Zhazgul Ishenova</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Am. UL Rev., 1983</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Internationalized Non-International Armed Conflicts: Case Studies of Afghanistan, Kampuchea, and Lebanon&quot;,&quot;attachmentId&quot;:30914296,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/1058070/Internationalized_Non_International_Armed_Conflicts_Case_Studies_of_Afghanistan_Kampuchea_and_Lebanon&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1058070/Internationalized_Non_International_Armed_Conflicts_Case_Studies_of_Afghanistan_Kampuchea_and_Lebanon"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="6" data-entity-id="38249637" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/38249637/The_Seeds_of_Surrogate_Warfare">The Seeds of Surrogate Warfare</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="98628018" href="https://independent.academia.edu/RichardNewton17">Richard Newton</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Contemporary Security Challenges: Irregular Warfare and Indirect Approaches, 2009</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;The Seeds of Surrogate Warfare&quot;,&quot;attachmentId&quot;:58291877,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/38249637/The_Seeds_of_Surrogate_Warfare&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/38249637/The_Seeds_of_Surrogate_Warfare"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="7" data-entity-id="86353472" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/86353472/Counter_terrorism_and_the_protection_of_civilians_Armed_non_state_actors">Counter-terrorism and the protection of civilians: Armed non-state actors</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3454378" href="https://diis.academia.edu/JAIROMUNIVE">JAIRO MUNIVE</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2015</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Counter-terrorism and the protection of civilians: Armed non-state actors&quot;,&quot;attachmentId&quot;:90821597,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/86353472/Counter_terrorism_and_the_protection_of_civilians_Armed_non_state_actors&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/86353472/Counter_terrorism_and_the_protection_of_civilians_Armed_non_state_actors"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="8" data-entity-id="28516621" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/28516621/_Strong_militias_weak_states_and_armed_violence_Towards_a_theory_of_state_parallel_paramilitaries_Security_Dialogue_47_6_2016_pp_498_516">&quot;Strong militias, weak states and armed violence. Towards a theory of ‘state-parallel’ paramilitaries,&quot; Security Dialogue 47(6), 2016, pp. 498-516.</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="847783" href="https://glasgow.academia.edu/HuseynAliyev">Huseyn Aliyev</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;\&quot;Strong militias, weak states and armed violence. Towards a theory of ‘state-parallel’ paramilitaries,\&quot; Security Dialogue 47(6), 2016, pp. 498-516.&quot;,&quot;attachmentId&quot;:49072069,&quot;attachmentType&quot;:&quot;docx&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/28516621/_Strong_militias_weak_states_and_armed_violence_Towards_a_theory_of_state_parallel_paramilitaries_Security_Dialogue_47_6_2016_pp_498_516&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/28516621/_Strong_militias_weak_states_and_armed_violence_Towards_a_theory_of_state_parallel_paramilitaries_Security_Dialogue_47_6_2016_pp_498_516"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="9" data-entity-id="113119413" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/113119413/War_on_the_cheap_Assessing_the_costs_and_benefits_of_proxy_war">War on the cheap? Assessing the costs and benefits of proxy war</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="24189736" href="https://erau.academia.edu/TyroneGroh">Tyrone Groh</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2010</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;War on the cheap? Assessing the costs and benefits of proxy war&quot;,&quot;attachmentId&quot;:110163519,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/113119413/War_on_the_cheap_Assessing_the_costs_and_benefits_of_proxy_war&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/113119413/War_on_the_cheap_Assessing_the_costs_and_benefits_of_proxy_war"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="10" data-entity-id="43232271" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/43232271/Introduction_Foreign_fighters_and_multinational_armies_from_civil_conflicts_to_coalition_wars_1848_2015_Special_issue_">Introduction – Foreign fighters and multinational armies: from civil conflicts to coalition wars, 1848-2015 (Special issue)</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="312169" href="https://sorbonne-fr.academia.edu/StevenOConnor">Steven O&#39;Connor</a><span>, </span><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="160707297" href="https://independent.academia.edu/GuillaumePiketty">Guillaume Piketty</a></div><p class="ds-related-work--metadata ds2-5-body-xs">European Review of History, 2020</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Introduction – Foreign fighters and multinational armies: from civil conflicts to coalition wars, 1848-2015 (Special issue)&quot;,&quot;attachmentId&quot;:63501464,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/43232271/Introduction_Foreign_fighters_and_multinational_armies_from_civil_conflicts_to_coalition_wars_1848_2015_Special_issue_&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/43232271/Introduction_Foreign_fighters_and_multinational_armies_from_civil_conflicts_to_coalition_wars_1848_2015_Special_issue_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="11" data-entity-id="56851351" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/56851351/Surrogate_warfare_the_art_of_war_in_the_21st_century">Surrogate warfare: the art of war in the 21st century?</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="2687908" href="https://gcsp.academia.edu/JeanMarcRickli">Jean-Marc Rickli</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Surrogate warfare: the art of war in the 21st century?&quot;,&quot;attachmentId&quot;:72034069,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/56851351/Surrogate_warfare_the_art_of_war_in_the_21st_century&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/56851351/Surrogate_warfare_the_art_of_war_in_the_21st_century"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="12" data-entity-id="64958580" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/64958580/Pseudo_Operations_And_Counterinsurgency_Lessons_From_Other_Countries">Pseudo Operations And Counterinsurgency: Lessons From Other Countries</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="4542761" href="https://independent.academia.edu/LawrenceCline">Lawrence Cline</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Pseudo Operations And Counterinsurgency: Lessons From Other Countries&quot;,&quot;attachmentId&quot;:76752721,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/64958580/Pseudo_Operations_And_Counterinsurgency_Lessons_From_Other_Countries&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/64958580/Pseudo_Operations_And_Counterinsurgency_Lessons_From_Other_Countries"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="13" data-entity-id="78699337" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/78699337/Peace_operations_by_proxy_implications_for_humanitarian_action_of_UN_peacekeeping_partnerships_with_non_UN_security_forces">Peace operations by proxy: implications for humanitarian action of UN peacekeeping partnerships with non-UN security forces</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="154954327" href="https://independent.academia.edu/arthurboutellis">arthur boutellis</a></div><p class="ds-related-work--metadata ds2-5-body-xs">International Review of the Red Cross, 2013</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Peace operations by proxy: implications for humanitarian action of UN peacekeeping partnerships with non-UN security forces&quot;,&quot;attachmentId&quot;:85655364,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/78699337/Peace_operations_by_proxy_implications_for_humanitarian_action_of_UN_peacekeeping_partnerships_with_non_UN_security_forces&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/78699337/Peace_operations_by_proxy_implications_for_humanitarian_action_of_UN_peacekeeping_partnerships_with_non_UN_security_forces"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="14" data-entity-id="66456880" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/66456880/Insurgency_and_Counterinsurgency_in_Modern_War">Insurgency and Counterinsurgency in Modern War</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="734353" href="https://aber.academia.edu/StewartWebb">Stewart Webb</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2015</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Insurgency and Counterinsurgency in Modern War&quot;,&quot;attachmentId&quot;:77640635,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/66456880/Insurgency_and_Counterinsurgency_in_Modern_War&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/66456880/Insurgency_and_Counterinsurgency_in_Modern_War"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="15" data-entity-id="4788776" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/4788776/Counterinsurgency_Principles_for_the_Diplomat">Counterinsurgency Principles for the Diplomat</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="6177861" href="https://independent.academia.edu/KurtAmend">Kurt Amend</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Counterinsurgency Principles for the Diplomat&quot;,&quot;attachmentId&quot;:32091529,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/4788776/Counterinsurgency_Principles_for_the_Diplomat&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/4788776/Counterinsurgency_Principles_for_the_Diplomat"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="16" data-entity-id="45181508" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/45181508/Russian_Surrogate_Warfare_in_Ukraine_and_Syria_Understanding_the_Utility_of_Militias_and_Private_Military_Companies">Russian Surrogate Warfare in Ukraine and Syria: Understanding the Utility of Militias and Private Military Companies</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1705405" href="https://kcl.academia.edu/EmmanuelKaragiannis">Emmanuel Karagiannis</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Journal of Balkan and Near Eastern Studies, 2021</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Russian Surrogate Warfare in Ukraine and Syria: Understanding the Utility of Militias and Private Military Companies&quot;,&quot;attachmentId&quot;:82272449,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/45181508/Russian_Surrogate_Warfare_in_Ukraine_and_Syria_Understanding_the_Utility_of_Militias_and_Private_Military_Companies&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/45181508/Russian_Surrogate_Warfare_in_Ukraine_and_Syria_Understanding_the_Utility_of_Militias_and_Private_Military_Companies"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="17" data-entity-id="108390871" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/108390871/PRIVATE_MILITARY_COMPANIES_AND_THE_OUTSOURCING_OF_WAR_A_Spark_of_Destabilisation_to_the_Global_Secu_1">PRIVATE MILITARY COMPANIES AND THE OUTSOURCING OF WAR A Spark of Destabilisation to the Global Secu 1</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="5967021" href="https://ufpb.academia.edu/LeilaBijos">Leila Bijos</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Annales de la Faculté de Droit d’Istanbul, 2020</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;PRIVATE MILITARY COMPANIES AND THE OUTSOURCING OF WAR A Spark of Destabilisation to the Global Secu 1&quot;,&quot;attachmentId&quot;:106787869,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/108390871/PRIVATE_MILITARY_COMPANIES_AND_THE_OUTSOURCING_OF_WAR_A_Spark_of_Destabilisation_to_the_Global_Secu_1&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/108390871/PRIVATE_MILITARY_COMPANIES_AND_THE_OUTSOURCING_OF_WAR_A_Spark_of_Destabilisation_to_the_Global_Secu_1"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="18" data-entity-id="45133485" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/45133485/Outsourcing_Death_Sacrifice_and_Remembrance_The_Socio_Political_Effects_of_Remote_Warfare">Outsourcing Death, Sacrifice and Remembrance: The Socio- Political Effects of Remote Warfare</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="2812237" href="https://st-andrews.academia.edu/NormaRossi">Norma Rossi</a><span>, </span><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="55321034" href="https://leidenuniv.academia.edu/MalteRiemann">Malte Riemann</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Remote Warfare - Interdisciplinary Perspectives, 2021</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Outsourcing Death, Sacrifice and Remembrance: The Socio- Political Effects of Remote Warfare&quot;,&quot;attachmentId&quot;:65704408,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/45133485/Outsourcing_Death_Sacrifice_and_Remembrance_The_Socio_Political_Effects_of_Remote_Warfare&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/45133485/Outsourcing_Death_Sacrifice_and_Remembrance_The_Socio_Political_Effects_of_Remote_Warfare"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="19" data-entity-id="41689617" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/41689617/The_Globalization_of_Local_Conflicts_Foreign_Fighters_in_Donbass_National_Call_for_Papers">The Globalization of Local Conflicts Foreign Fighters in Donbass National Call for Papers</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="8903523" href="https://independent.academia.edu/ObinHartono">Obin Hartono</a></div><p class="ds-related-work--metadata ds2-5-body-xs">National Call for Paper, President University, 2016</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;The Globalization of Local Conflicts Foreign Fighters in Donbass National Call for Papers&quot;,&quot;attachmentId&quot;:61846662,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/41689617/The_Globalization_of_Local_Conflicts_Foreign_Fighters_in_Donbass_National_Call_for_Papers&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/41689617/The_Globalization_of_Local_Conflicts_Foreign_Fighters_in_Donbass_National_Call_for_Papers"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="20" data-entity-id="73404255" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/73404255/States_vs_Non_State_Actors_Asymmetric_Conflict_of_the_21st_Century_and_Challenges_to_Military_Transformation">States vs. Non-State Actors: Asymmetric Conflict of the 21st Century and Challenges to Military Transformation</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="29510024" href="https://independent.academia.edu/JahangirArasli">Jahangir Arasli</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2011</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;States vs. Non-State Actors: Asymmetric Conflict of the 21st Century and Challenges to Military Transformation&quot;,&quot;attachmentId&quot;:81938757,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/73404255/States_vs_Non_State_Actors_Asymmetric_Conflict_of_the_21st_Century_and_Challenges_to_Military_Transformation&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/73404255/States_vs_Non_State_Actors_Asymmetric_Conflict_of_the_21st_Century_and_Challenges_to_Military_Transformation"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="21" data-entity-id="32304057" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/32304057/Fighting_Through_Auxiliaries_Kadercan">Fighting Through Auxiliaries Kadercan</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33315527" href="https://usnwc.academia.edu/BKadercan">Burak Kadercan</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Fighting Through Auxiliaries Kadercan&quot;,&quot;attachmentId&quot;:52518022,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/32304057/Fighting_Through_Auxiliaries_Kadercan&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/32304057/Fighting_Through_Auxiliaries_Kadercan"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="22" data-entity-id="78927153" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/78927153/Civilianising_warfare_ways_of_war_and_peace_in_modern_counterinsurgency">Civilianising warfare: ways of war and peace in modern counterinsurgency</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="4723197" href="https://usask.academia.edu/ColleenBell">Colleen Bell</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Journal of International Relations and Development, 2011</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{&quot;location&quot;:&quot;wsj-grid-card-download-pdf-modal&quot;,&quot;work_title&quot;:&quot;Civilianising warfare: ways of war and peace in modern counterinsurgency&quot;,&quot;attachmentId&quot;:85813105,&quot;attachmentType&quot;:&quot;pdf&quot;,&quot;work_url&quot;:&quot;https://www.academia.edu/78927153/Civilianising_warfare_ways_of_war_and_peace_in_modern_counterinsurgency&quot;,&quot;alternativeTracking&quot;:true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/78927153/Civilianising_warfare_ways_of_war_and_peace_in_modern_counterinsurgency"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div></div></div></div><div class="footer--content"><ul class="footer--main-links hide-on-mobile"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We&#39;re Hiring!</strong></a></li><li><a href="https://support.academia.edu/"><svg style="width: 12px; height: 12px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer--research-interests"><li>Find new research papers in:</li><li><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul><ul class="footer--legal-links hide-on-mobile"><li><a href="https://www.academia.edu/terms">Terms</a></li><li><a href="https://www.academia.edu/privacy">Privacy</a></li><li><a href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2024</li></ul></div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10