An insurgency is a violent, armed rebellion by small, lightly armed bands who practice guerrilla warfare against a larger authority . The key descriptive feature of insurgency is its asymmetric nature: small irregular forces face a large, well-equipped, regular military force state adversary. Due to this asymmetry, insurgents avoid large-scale direct battles, opting instead to blend in with the civilian population (often in rural areas ) where they gradually expand territorial control and military forces. Insurgency frequently hinges on control of and collaboration with local populations.
109-474: An insurgency can be fought via counter-insurgency warfare, as well as other political, economic and social actions of various kinds. Due to the blending of insurgents with the civilian population, insurgencies tend to involve considerable violence against civilians (by the state and the insurgents). State attempts to quell insurgencies frequently lead to the infliction of indiscriminate violence, whereas rebel control of territory frequently involves violence against
218-409: A non-state adversary . Insurgency and counterinsurgency campaigns have been waged since ancient history . However, modern thinking on counterinsurgency was developed during decolonization . During insurgency and counterinsurgency, the distinction between civilians and combatants is often blurred. Counterinsurgency may involve attempting to win the hearts and minds of populations supporting
327-606: A 2004 article, Robert R. Tomes spoke of four elements that "typically encompass an insurgency": Tomes' is an example of a definition that does not cover all insurgencies. For example, the French Revolution had no cell system, and in the American Revolution , little to no attempt was made to terrorize civilians. In consecutive coups in 1977 and 1999 in Pakistan, the initial actions focused internally on
436-574: A BA in physics from Cornell University in 1979, and then another BA in philosophy and mathematics from the University of Oxford in 1981. She then received a MA in physics at the University of California, Berkeley , followed by an MA in Latin American Studies in 1988, also from UC Berkeley. She completed her education in 1995, receiving a PhD in political science from Stanford University . Upon completing her PhD, Wood became
545-412: A British Secret Intelligence Service definition as "a generalized intention to ( emphasis added ) " overthrow or undermine parliamentary democracy by political, industrial or violent means." While insurgents do not necessarily use terror, it is hard to imagine any insurgency meeting its goals without undermining aspects of the legitimacy or power of the government or faction it opposes. Rosenau mentions
654-458: A basic part of his first part of the three phases of revolutionary warfare. Several insurgency models recognize that completed acts of terrorism widen the security gap ; the Marxist guerrilla theoretician Carlos Marighella specifically recommended acts of terror, as a means of accomplishing something that fits the concept of opening the security gap. Mao considered terrorism to be part of forming
763-539: A clear advantage over rebels in coercive capacity." In this kind of conflicts, rebel groups can reintegrate into the civilian population after an attack if the civilians are willing to silently accept them. Some of the most recent examples include the conflicts in Afghanistan and Iraq. As the European countries intervenes in the conflicts, creating asymmetry between the government forces and rebels, asymmetric conflict
872-523: A common structure for 9 contemporary insurgent wars, supported on statistical data of more than 50,000 insurgent attacks. The model explains the recurrent statistical pattern found in the distribution of deaths in insurgent and terrorist events. Kilcullen describes a framework for counterinsurgency. He gives a visual overview of the actors in his model of conflicts, which he represents as a box containing an "ecosystem" defined by geographic, ethnic, economic, social, cultural, and religious characteristics. Inside
981-463: A counterinsurgent needs to choose two goals out of three. Relying on economic theory , this is what Zambernardi labels the "impossible trilemma" of counterinsurgency. Specifically, the impossible trilemma suggests that it is impossible to simultaneously achieve: 1) force protection, 2) distinction between enemy combatants and non-combatants, and 3) the physical elimination of insurgents. According to Zambernardi, in pursuing any two of these three goals,
1090-403: A degree that victory is easy or assured for the regular forces. However, in many modern rebellions, one does not see rebel fighters working in conjunction with regular forces. Rather, they are home-grown militias or imported fighters who have no unified goals or objectives save to expel the occupier. According to Liddell Hart, there are few effective counter-measures to this strategy. So long as
1199-440: A guerrilla movement. While not every insurgency involves terror, most involve an equally hard to define tactic, subversion. "When a country is being subverted it is not being outfought; it is being out-administered. Subversion is literally administration with a minus sign in front." The exceptional cases of insurgency without subversion are those where there is no accepted government that is providing administrative services. While
SECTION 10
#17327976155851308-472: A more recent definition that suggests subversion includes measures short of violence, which still serve the purposes of insurgents. Rarely, subversion alone can change a government; this arguably happened in the liberalization of Eastern Europe. To the Communist government of Poland , Solidarity appeared subversive but not violent. In arguing against the term Global War on Terror , Francis Fukuyama said
1417-431: A political or ideological (whether secular or religious) purpose. Terrorism is a criminal act, but it is more than mere criminality. To overcome the problem of terrorism it is necessary to understand its political nature as well as its basic criminality and psychology. The United Nations needs to address both sides of this equation. Yet another conflict of definitions involves insurgency versus terrorism. The winning essay of
1526-541: A prime example the French occupation of Spain during the Napoleonic wars . Whenever Spanish forces managed to constitute themselves into a regular fighting force, the superior French forces beat them every time. However, once dispersed and decentralized, the irregular nature of the rebel campaigns proved a decisive counter to French superiority on the battlefield. Napoleon 's army had no means of effectively combating
1635-769: A professor in the department of politics at New York University . She remained a professor in that department until 2004, when she moved to Yale University. During this time she also began a professorship at the Santa Fe Institute in 2002 which she held until 2010. From 2010 to 2017, she was a member of the external faculty at the Santa Fe Institute. In 2000, Wood published her first book, Forging Democracy from Below: Insurgent Transitions in South Africa and El Salvador . In this book, Wood uses micro-level ethnographic data obtained from fieldwork in
1744-403: A rationalist explanation behind them, which explains why leaders prefer to gamble in wars and avoid peaceful bargains. Fearon states that intermediate bargains can be a problem because countries cannot easily trade territories with the spread of nationalism. Furthermore, wars can take the form of civil wars . In her article Why Bad Governance Leads to Civil Wars, Barbara F. Walter has presented
1853-445: A reason for the insurgents to continue until victory. Trường Chinh , second in command to Ho Chi Minh of Vietnam , wrote in his Primer for Revolt : The guiding principle of the strategy for our whole resistance must be to prolong the war. To protract the war is the key to victory. Why must the war be protracted? ... If we throw the whole of our forces into a few battles to try to decide the outcome, we shall certainly be defeated and
1962-425: A state must be able to close three "gaps", of which the first is most important: Note the similarity between Eizenstat's gaps and Kilcullen's three pillars. In the table below, do not assume that a problematic state is unable to assist less developed states while closing its own gaps. McCormick's model is designed as a tool for counterinsurgency (COIN), but develops a symmetrical view of the required actions for both
2071-520: A state must forgo some portion of the third objective. In particular, a state can protect its armed forces while destroying insurgents, but only by indiscriminately killing civilians as the Ottomans , Italians , and Nazis did in the Balkans, Libya, and Eastern Europe. It can choose to protect civilians along with its own armed forces instead, avoiding so-called collateral damage, but only by abandoning
2180-606: A successful counterinsurgency: In "The Three Pillars of Counterinsurgency", Dr. David Kilcullen , the Chief Strategist of the Office of the Coordinator for Counterterrorism of the U.S. State Department in 2006, described a framework for interagency cooperation in counterinsurgency operations. His pillars – Security, Political and Economic – support the overarching goal of Control, but are based on Information: This
2289-500: A theory that explains the role of strong institutions in preventing insurgencies that can result in civil wars. Walter believes that institutions can contribute to four goals. Institutions are responsible for checking the government, creating multiple peaceful routes to help the government solve problems, making the government committed to political terms that entails preserving peace, and creating an atmosphere where rebels do not need to form militias. Furthermore, Walter adds that if there
SECTION 20
#17327976155852398-401: A war not specifically on the tactic of terror but in co-ordination among multiple national or regional insurgencies. It may be politically infeasible to refer to a conflict as an "insurgency" rather than by some more charged term, but military analysts, when concepts associated with insurgency fit, should not ignore those ideas in their planning. Additionally, the recommendations can be applied to
2507-433: A worldwide view of terror: Social scientists, soldiers, and sources of change have been modeling insurgency for nearly a century if one starts with Mao. Counterinsurgency models, not mutually exclusive from one another, come from Kilcullen, McCormick, Barnett and Eizenstat. Kilcullen describes the "pillars" of a stable society, while Eizenstat addresses the "gaps" that form cracks in societal stability. McCormick's model shows
2616-410: Is a conflict between the government and the insurgents in the form of a civil war, that can bring about a new government that is accountable to a wider range of people, who have to commit to a compromise in political bargains. According to Walter, the presence of strong influential institutions can be beneficial to prevent the repetition of civil wars, but autocratic governments are less likely to accept
2725-530: Is a sociological phenomenon that constrains the habits of a military (in this case, the Nigerian military) to the long-established, yet increasingly ineffective, ideology of the offensive in irregular warfare. As Omeni writes, Whereas the Nigerian military's performance against militias in the Niger Delta already suggested the military had a poor grasp of the threat of insurgent warfare; it was further along
2834-655: Is an American political scientist , currently the Franklin Muzzy Crosby Professor of the Human Environment, professor of political science, and professor of international and area studies at Yale University . She studies sexual violence during war, the emergence of political insurgencies and individuals' participation in them, and democratization , with a focus on Latin American politics and African politics . Wood received
2943-401: Is because perception is crucial in developing control and influence over population groups. Substantive security, political and economic measures are critical but to be effective they must rest upon, and integrate with a broader information strategy. Every action in counterinsurgency sends a message; the purpose of the information campaign is to consolidate and unify this message. ... Importantly,
3052-400: Is not primarily military, but a combination of military, political and social actions under the strong control of a single authority. Galula proposes four "laws" for counterinsurgency: Galula contends that: A victory [in a counterinsurgency] is not the destruction in a given area of the insurgent's forces and his political organization. ... A victory is that plus the permanent isolation of
3161-456: Is one of the axioms of military doctrine that change with the use of swarming:. In Edwards' swarming model, as in Kilcullen's mode, unity of command becomes " unity of effort at best, and collaboration or deconfliction at least." As in swarming, in Kilcullen's view unity of effort "depends less on a shared command and control hierarchy, and more on a shared diagnosis of the problem (i.e.,
3270-421: Is probably the earliest author who dealt systematically in his writings with counterinsurgency. In his Reflexiones Militares , published between 1726 and 1730, he discussed how to spot early signs of an incipient insurgency, prevent insurgencies, and counter them, if they could not be warded off. Strikingly, Santa Cruz recognized that insurgencies are usually due to real grievances: "A state rarely rises up without
3379-961: Is the most common form of subnational conflicts and the most civil conflicts where the western countries are likely to be involved. Such interventions and their impacts can be seen in the NATO operation in Libya in 2011 and the French-led intervention in Mali in 2013 . Berman and Matanock suggested an information-centric framework to describe asymmetric conflicts on a local level. Three parties are involved in framework: government forces, rebels and civilians. Government forces and rebels attack each other and may inadvertently harm civilians whereas civilians can anonymously share local information with government forces, which would allow government forces to effectively use their asymmetric advantage to target rebels. Taking
Insurgency - Misplaced Pages Continue
3488-406: Is throw overboard 99 percent of the literature on counterinsurgency, counter guerrilla, counterterrorism, and the like. Since most of it was written by the losing side, it is of little value. In examining why so many counterinsurgencies by powerful militaries fail against weaker enemies, Van Creveld identifies a key dynamic that he illustrates by the metaphor of killing a child. Regardless of whether
3597-447: Is well to understand that counterterrorism, as used by Cordesman, does not mean using terrorism against the terrorism, but an entire spectrum of activities, nonviolent and violent, to disrupt an opposing terrorist organization. The French general, Joseph Gallieni, observed, while a colonial administrator in 1898, A country is not conquered and pacified when a military operation has decimated its inhabitants and made all heads bow in terror;
3706-532: The Confederate States of America was not recognized as a sovereign state, but it was recognized as a belligerent power, and thus Confederate warships were given the same rights as United States warships in foreign ports. Sometimes there may be two or more simultaneous insurgencies (multipolar) occurring in a country. The Iraq insurgency is one example of a recognized government versus multiple groups of insurgents. Other historic insurgencies, such as
3815-602: The Russian Civil War , have been multipolar rather than a straightforward model made up of two sides. During the Angolan Civil War there were two main sides: MPLA and UNITA . At the same time, there was another separatist movement for the independence of the Cabinda region headed up by FLEC . Multipolarity extends the definition of insurgency to situations where there is no recognized authority, as in
3924-672: The Somali Civil War , especially the period from 1998 to 2006 , where it broke into quasi-autonomous smaller states, fighting among one another in changing alliances. James Fearon and David Laitin define insurgency as "a technology of military conflict characterized by small, lightly armed bands practicing guerrilla warfare from rural base areas." Austin Long defines insurgency as "the use of political and military means by irregular forces to change an existing political order. These forces typically mingle with civilians in order to hide from
4033-525: The US South ran high risks of bodily harm in challenging the long-standing practices of racial exclusion in Mississippi ." There are many selective incentives that encourage insurgency and violent movements against autocratic political regimes. For example, the supply of safety as a material good can be provided by the insurgents, which abolishes the exploitation of the government and thus forms one of
4142-638: The US Department of State as the Policy Advisor to the Deputy Prime Minister of Iraq, Salam al-Zaubai . In his book, When Bad States Win: Rethinking Counterinsurgency Strategy , he found little evidence to support the ‘hearts and minds’ approach to counterinsurgency. “There is little robust generalizable evidence that population-centric approaches are effective,” he argued. Elisabeth Jean Wood Elisabeth Jean Wood
4251-468: The University of Michigan . Berman, Shapiro, and Felter have outlined the modern information-centric model. In this framework, the critical determinant of counterinsurgent success is information about insurgents provided to counterinsurgents, such as insurgent locations, plans, and targets. Information can be acquired from civilian sources (human intelligence, HUMINT ), or through signals intelligence ( SIGINT ). Dr. Jeffrey Treistman previously served with
4360-504: The 24th Annual United States Chairman of the Joint Chiefs of Staff Strategic Essay Contest, by Michael F. Morris, said [A pure terrorist group] "may pursue political, even revolutionary, goals, but their violence replaces rather than complements a political program." Morris made the point that the use, or non-use, of terrorism does not define insurgency, "but that organizational traits have traditionally provided another means to tell
4469-503: The Insurgent and COIN forces to achieve success. In this way the counterinsurgency model can demonstrate how both the insurgent and COIN forces succeed or fail. The model's strategies and principle apply to both forces, therefore the degree the forces follow the model should have a direct correlation to the success or failure of either the Insurgent or COIN force. The model depicts four key elements or players: All of these interact, and
Insurgency - Misplaced Pages Continue
4578-593: The Nigerian Army has struggled in COIN due to capabilities shortcomings, holds some merit. However, a full-spectrum analysis of the Nigeria case suggests that this popular dominant narrative scarcely scratches the surface of the true COIN challenge. This population-centered challenge, moreover, is one that militaries across the world continue to contend with. And in attempting to solve the COIN puzzle, state forces over
4687-724: The Policy Working Group on the United Nations and Terrorism. Reporting to the Secretary-General in 2002, the Working Group stated the following: Without attempting a comprehensive definition of terrorism, it would be useful to delineate some broad characteristics of the phenomenon. Terrorism is, in most cases, essentially a political act. It is meant to inflict dramatic and deadly injury on civilians and to create an atmosphere of fear, generally for
4796-668: The Turkish forces off. In both the preceding cases, the insurgents and rebel fighters were working in conjunction with or in a manner complementary to regular forces. Such was also the case with the French Resistance during World War II and the National Liberation Front during the Vietnam War . The strategy in these cases is for the irregular combatant to weaken and destabilize the enemy to such
4905-490: The US and its allies need to focus on specific radical groups rather than clash with global Islam. Fukuyama argued that political means, rather than direct military measures, are the most effective ways to defeat that insurgency. David Kilcullen wrote "We must distinguish Al Qa'eda and the broader militant movements it symbolises – entities that use terrorism – from the tactic of terrorism itself." There may be utility in examining
5014-622: The United States was not fighting terrorism generically, as in Chechnya or Palestine . Rather, he said the slogan "war on terror" is directed at "radical Islamism, a movement that makes use of culture for political objectives." He suggested it might be deeper than the ideological conflict of the Cold War, but it should not be confused with Samuel Huntington 's "clash of civilizations." Addressing Huntington's thesis, Fukuyama stressed that
5123-443: The [insurgents' intended] overthrow of the established authority in a country and its replacement by another regime." Steven Metz observes that past models of insurgency do not perfectly fit modern insurgency, in that current instances are far more likely to have a multinational or transnational character than those of the past. Several insurgencies may belong to more complex conflicts, involving "third forces (armed groups which affect
5232-651: The book, Jon Shefner noted that the field sites that Wood spent time in to research the book were particularly challenging and dangerous, and that she documented her findings with noteworthy methodological precision. Wood has been a co-editor of two other books: the 2010 volume Political Representation , and the 2012 volume Understanding and Proving International Sex Crimes . In addition to publications in journals like Politics and Society , The Journal of Peace Research , and Comparative Political Studies on topics like democratization in El Salvador, sexual assault in
5341-702: The box are, among others, governments, counterinsurgent forces, insurgent leaders, insurgent forces, and the general population, which is made up of three groups: Often, but not always, states or groups that aid one side or the other are outside the box. Outside-the-box intervention has dynamics of its own. The counterinsurgency strategy can be described as efforts to end the insurgency by a campaign developed in balance along three "pillars": security, political, and economical. "Obviously enough, you cannot command what you do not control. Therefore, unity of command (between agencies or among government and non-government actors) means little in this environment." Unity of command
5450-408: The child started the fight or how well armed the child is, an adult in a fight with a child will feel that he is acting unjustly if he harms the child and foolish if the child harms him; he will, therefore, wonder if the fight is necessary. Van Creveld argues that "by definition, a strong counterinsurgent who uses his strength to kill the members of a small, weak organization of insurgents – let alone
5559-495: The city, killing between 10-25,000 people, including many women and children. Asked by reporters what had happened, Hafez al-Assad exaggerated the damage and deaths, promoted the commanders who carried out the attacks, and razed Hama's well-known great mosque, replacing it with a parking lot. With the Muslim Brotherhood scattered, the population was so cowed that it would be years before opposition groups dared to disobey
SECTION 50
#17327976155855668-428: The civilian population by which it is surrounded, and which may lend it support – will commit crimes in an unjust cause," while "a child who is in a serious fight with an adult is justified in using every and any means available – not because he or she is right, but because he or she has no choice". Every act of insurgency becomes, from the perspective of the counterinsurgent, a reason to end the conflict, while also being
5777-492: The civilian population. Insurgency sets itself apart from terrorism by aiming for political control rather than resorting to indiscriminate violence, however, it may incorporate terrorist tactics. Where a revolt takes the form of armed rebellion, it may not be viewed as an insurgency if a state of belligerency exists between one or more sovereign states and rebel forces. For example, during the American Civil War ,
5886-540: The decades have tried a range of tactics. Starting in the early 2000s, micro-level data has transformed the analysis of effective counterinsurgency (COIN) operations. Leading this work is the "information-centric" group of theorists and researchers, led by the work of the Empirical Studies of Conflict (ESOC) group at Princeton University , and the Conflict and Peace, Research and Development (CPRD) group at
5995-494: The different elements have to assess their best options in a set of actions: In Thomas Barnett's paradigm, the world is divided into a "connected core" of nations enjoying a high level of communications among their organizations and individuals, and those nations that are disconnected internally and externally. In a reasonably peaceful situation, he describes a "system administrator" force, often multinational, which does what some call "nation-building", but, most importantly, connects
6104-419: The discussion of failed states below.) Metz suggests that contemporary insurgencies have far more complex and shifting participation than traditional wars, where discrete belligerents seek a clear strategic victory. Many insurgencies include terrorism. While there is no accepted definition of terrorism in international law, United Nations -sponsored working definitions include one drafted by Alex P. Schmid for
6213-461: The distributed knowledge of swarms), platforms for collaboration, information sharing and deconfliction. Each player must understand the others' strengths, weaknesses, capabilities and objectives, and inter-agency teams must be structured for versatility (the ability to perform a wide variety of tasks) and agility (the ability to transition rapidly and smoothly between tasks)." Insurgencies, according to Stuart Eizenstat grow out of "gaps". To be viable,
6322-826: The editorial boards of the American Political Science Review from 2007-2013, as well as of World Politics , Politics and Society , and the Contentious Politics Series of the Cambridge University Press . She has also served on the American Political Science Association 's Committee on Human Subjects Research. In 2010, Wood was named a Fellow of the American Academy of Arts and Sciences , and in 2018 she
6431-458: The emergence of strong institutions because of their resulting constraint of governmental corruption and privileges. In her book, Insurgent Collective Action and Civil War in Salvador , Elisabeth Jean Wood explains that participants in high-risk activism are very aware of the costs and benefits of engaging in civil wars. Wood suggests that "participants in the 1964 Freedom Summer campaign in
6540-444: The enemy will win. On the other hand, if while fighting we maintain our forces, expand them, train our army and people, learn military tactics … and at the same time wear down the enemy forces, we shall weary and discourage them in such a way that, strong as they are, they will become weak and will meet defeat instead of victory. Van Creveld thus identifies "time" as the key factor in counterinsurgency. In an attempt to find lessons from
6649-494: The fault of its governors." Consequently, he advocated clemency towards the population and good governance, to seek the people's "heart and love". Liddell Hart attributed the failure of counterinsurgencies to various causes. First, as pointed out in the Insurgency addendum to the second version of his book Strategy: The Indirect Approach , a popular insurgency has an inherent advantage over any occupying force. He showed as
SECTION 60
#17327976155856758-462: The ferments of revolt will germinate in the mass and the rancours accumulated by the brutal action of force will make them grow again Both Kilcullen and Eizenstat define a more abstract goal than does Cordesman. Kilcullen's security pillar is roughly equivalent to Eizenstat's security gap: This pillar most engages military commanders' attention, but of course military means are applied across
6867-629: The few cases of successful counterinsurgency, of which he lists two clear cases: the British efforts during The Troubles of Northern Ireland and the 1982 Hama massacre carried out by the Syrian government to suppress the Muslim Brotherhood , he asserts that the "core of the difficulty is neither military nor political, but moral" and outlines two distinct methods. The first method relies on superb intelligence, provided by those who know
6976-440: The forces defending the political order." According to Matthew Adam Kocher, Thomas Pepinsky and Stathis Kalyvas, a central objective in insurgencies is to achieve control over civilians. To exercise control armed groups apply a variety of practices, including different types of violence, dispute resolution, taxation, regulation of movement, access to aid and services, and social strictures. According to James D. Fearon , wars have
7085-473: The form of propaganda , Psy-ops , and assassinations . Counter-insurgency operations include many different facets: military , paramilitary , political , economic , psychological , and civic actions taken to defeat insurgency . To understand counterinsurgency, one must understand insurgency to comprehend the dynamics of revolutionary warfare. Counter-insurgency focuses on bridging these gaps. Insurgents take advantage of social issues known as gaps. When
7194-524: The gaps are wide, they create a sea of discontent, creating the environment in which the insurgent can operate. In The Insurgent Archipelago , John Mackinlay puts forward the concept of an evolution of the insurgency from the Maoist paradigm of the golden age of insurgency to the global insurgency of the start of the 21st century. He defines this distinction as "Maoist" and "post-Maoist" insurgency. The third Marques of Santa Cruz de Marcenado (1684–1732)
7303-477: The government rather than on seeking broad support. While Tomes' definition fits well with Mao's Phase I, it does not deal well with larger civil wars. Mao does assume terrorism is usually part of the early phases, but it is not always present in revolutionary insurgency. Tomes offers an indirect definition of insurgency, drawn from Trinquier 's definition of counterinsurgency: "an interlocking system of actions—political, economic, psychological, military—that aims at
7412-406: The government. Thus the essence of counterinsurgency warfare is summed up by Galula as "Build (or rebuild) a political machine from the population upward." Robert Grainger Ker Thompson wrote Defeating Communist Insurgency in 1966, wherein he argued that a successful counterinsurgency effort must be proactive in seizing the initiative from insurgents. Thompson outlines five basic principles for
7521-441: The grassroots. The counterinsurgent reaches a position of strength when his power is embedded in a political organization issuing from, and firmly supported by, the population. With his four principles in mind, Galula goes on to describe a general military and political strategy to put them into operation in an area that is under full insurgent control: In a Selected Area 1. Concentrate enough armed forces to destroy or to expel
7630-767: The groupings in Samuel P. Huntington 's idea of the clash of civilizations , but, rather assuming the civilizations must clash, these civilizations simply can be recognized as actors in a multinational world. In the case of Iraq, Cordesman observes that the burden is on the Islamic civilization, not unilaterally the West, if for no other reason that the civilization to which the problematic nation belongs will have cultural and linguistic context that Western civilization cannot hope to equal. The heart of strengthening weak nations must come from within, and that heart will fail if they deny that
7739-443: The information campaign has to be conducted at a global, regional and local level — because modern insurgents draw upon global networks of sympathy, support, funding and recruitment. Kilcullen considers the three pillars to be of equal importance because unless they are developed in parallel, the campaign becomes unbalanced: too much economic assistance with inadequate security, for example, simply creates an array of soft targets for
7848-453: The institution of COIN within militaries and their tendency to reject the innovation and adaptation often necessary to defeat insurgency. These three features, furthermore, influence and can undermine the operational tactics and concepts adopted against insurgents. The COIN challenge, therefore, is not just operational; it also is cultural and institutional before ever it reflects on the battlefield. According to Omeni, institutional isomorphism
7957-485: The insurgency maintains popular support, it will retain all of its strategic advantages of mobility, invisibility, and legitimacy in its own eyes and the eyes of the people. So long as this is the situation, an insurgency essentially cannot be defeated by regular forces. David Galula gained his practical experience in counterinsurgency as a French Army officer in the Algerian War . His theory of counterinsurgency
8066-450: The insurgency. Alternatively, it may be waged in an attempt to intimidate or eliminate civilian populations suspected of loyalty to the insurgency through indiscriminate violence. The guerrilla must swim in the people as the fish swims in the sea. –Aphorism based on the writing of Mao Zedong Counterinsurgency is normally conducted as a combination of conventional military operations and other means, such as demoralization in
8175-456: The insurgent from the population, isolation not enforced upon the population, but maintained by and with the population. ... In conventional warfare, strength is assessed according to military or other tangible criteria, such as the number of divisions, the position they hold, the industrial resources, etc. In revolutionary warfare, strength must be assessed by the extent of support from the population as measured in terms of political organization at
8284-471: The insurgents. Similarly, too much security assistance without political consensus or governance simply creates more capable armed groups. In developing each pillar, we measure progress by gauging effectiveness (capability and capacity) and legitimacy (the degree to which the population accepts that government actions are in its interest). The overall goal, according to this model, "is not to reduce violence to zero or to kill every insurgent, but rather to return
8393-539: The interplay among the actors: insurgents, government, population and external organizations. Barnett discusses the relationship of the country with the outside world, and Cordesman focuses on the specifics of providing security. Recent studies have tried to model the conceptual architecture of insurgent warfare using computational and mathematical modelling. A recent study by Juan Camilo Bohorquez, Sean Gourley, Alexander R. Dixon, Michael Spagat, and Neil F. Johnson entitled "Common Ecology Quantifies Human Insurgency", suggests
8502-451: The line, as the military struggled against Boko Haram's threat, that the extent of this weakness was exposed. At best, the utility of force, for the Nigerian military, had become but a temporary solution against the threat of insurgent warfare. At worst, the existing model has been perpetuated at such high cost, that urgent revisionist thinking around the idea of counterinsurgency within the military institution may now be required. Additionally,
8611-531: The main body of armed insurgents. 2. Detach for the area sufficient troops to oppose an insurgent come back in strength, install these troops in the hamlets, villages, and towns where the population lives. 3. Establish contact with the population, control its movements in order to cut off its links with the guerrillas. 4. Destroy the local insurgent political organization. 5. Set up, by means of elections, new provisional local authorities. 6. Test those authorities by assigning them various concrete tasks. Replace
8720-437: The main incentives. The revolutionary power can help manifest a social-political network that in return provides access to political opportunities to diverse candidates, who share a collective identity and cultural homogeneity. Also, civil wars and insurgencies can provide employment and access to services and resources that were once taken over by the autocratic regimes. Insurgencies differ in their use of tactics and methods. In
8829-411: The majority of modern populations. Counter-insurgency Counterinsurgency ( COIN , or NATO spelling counter-insurgency ) is "the totality of actions aimed at defeating irregular forces ". The Oxford English Dictionary defines counterinsurgency as any "military or political action taken against the activities of guerrillas or revolutionaries" and can be considered war by a state against
8938-445: The margins of the theoretical debate – even though Africa today is faced with a number of deadly insurgencies. In Counter-insurgency in Nigeria , Omeni, a Nigerian academic, discusses the interactions between certain features away from the battlefield, which account for battlefield performance against insurgent warfare. Specifically, Omeni argues that the trio of historical experience, organisational culture (OC) and doctrine, help explain
9047-418: The military's decisive civil war victory, the pivot in Nigeria's strategic culture towards a regional role, and the institutional delegitimization brought about by decades of coups and political meddling, meant that much time went by without substantive revisionism to the military's thinking around its internal function. Change moreover, where it occurred, was institutionally isomorphic and not as far removed from
9156-609: The military's own origins as the intervening decades may have suggested. Further, the infantry-centric nature of the Nigerian Army 's battalions, traceable back to the Nigerian Civil War back in the 1960s, is reflected in the kinetic nature of the Army's contemporary COIN approach. This approach has failed to defeat Boko Haram in the way many expected. Certainly, therefore, the popular argument today, which holds that
9265-562: The military, and sexual violence by armed forces, she has authored a number of public policy pieces in the popular media. These include pieces in The Washington Post , The New York Times , and Al Jazeera . Wood is a member of the 2020-2024 editorial leadership of the American Political Science Review , which is the most selective political science journal. She was previously a member of
9374-478: The model, not just in the security domain, while civilian activity is critically important in the security pillar also ... all three pillars must develop in parallel and stay in balance, while being firmly based in an effective information campaign. Anthony Cordesman, while speaking of the specific situation in Iraq, makes some points that can be generalized to other nations in turmoil. Cordesman recognizes some value in
9483-405: The nation to the core and empowers the natives to communicate—that communication can be likened to swarm coordination. If the state is occupied, or in civil war, another paradigm comes into play: the leviathan, a first-world military force that takes down the opposition regular forces. Leviathan is not constituted to fight local insurgencies, but major forces. Leviathan may use extensive swarming at
9592-428: The natural and artificial environment of the conflict as well as the insurgents. Once such superior intelligence is gained, the counterinsurgents must be trained to a point of high professionalism and discipline such that they will exercise discrimination and restraint. Through such discrimination and restraint, the counterinsurgents do not alienate members of the populace besides those already fighting them, while delaying
9701-401: The objective of destroying the insurgents. Finally, a state can discriminate between combatants and non-combatants while killing insurgents, but only by increasing the risks for its own troops, because often insurgents will hide behind civilians, or appear to be civilians. So a country must choose two out of three goals and develop a strategy that can successfully accomplish them while sacrificing
9810-402: The outcome, such as militias) and fourth forces (unarmed groups which affect the outcome, such as international media), who may be distinct from the core insurgents and the recognized government. While overt state sponsorship becomes less common, sponsorship by transnational groups is more common. "The nesting of insurgency within complex conflicts associated with state weakness or failure..." (See
9919-472: The overall system to normality — noting that 'normality' in one society may look different from normality in another. In each case, we seek not only to establish control, but also to consolidate that control and then transfer it to permanent, effective, and legitimate institutions." Military historian Martin van Creveld , noting that almost all attempts to deal with insurgency have ended in failure, advises: The first, and absolutely indispensable, thing to do
10028-488: The real issue is the future of their civilization, if they tolerate religious, cultural or separatist violence and terrorism when it strikes at unpopular targets, or if they continue to try to export the blame for their own failures to other nations, religions, and cultures. Asymmetric conflicts (or irregular conflicts ), as the emerging type of insurgencies in recent history, is described by Berman and Matanock in their review as conflicts where "the government forces have
10137-635: The rebels, and in the end, their strength and morale were so sapped that when Wellington was finally able to challenge French forces in the field, the French had almost no choice but to abandon the situation. Counterinsurgency efforts may be successful, especially when the insurgents are unpopular. The Philippine–American War , the Shining Path in Peru, and the Malayan Emergency have been
10246-537: The regime again and, van Creveld argues, the massacre most likely saved the regime and prevented a bloody civil war . Van Creveld condenses al-Assad's strategy into five rules while noting that they could easily have been written by Niccolò Machiavelli : In "Counterinsurgency's Impossible Trilemma", Dr. Lorenzo Zambernardi, an Italian academic now working in the United States, clarifies the tradeoffs involved in counterinsurgency operations. He argues that counterinsurgency involves three main goals, but in real practice,
10355-682: The role of civilians in this framework into consideration, the government and rebels will divert resources to provide services to civilians so as to influence their decision about sharing information with the government. The framework is based on several assumptions: This framework leads to five major implications for counterinsurgency strategies: These implications are tested by empirical evidences from conflicts in Afghanistan, Iraq and several other subnational conflicts. Further research on governance , rule of law , attitudes, dynamics and agency between allies are needed to better understand asymmetric conflicts and to have better informed decisions made at
10464-541: The second method exemplified by the Hama massacre . In 1982, the regime of Syrian president Hafez al-Assad was on the point of being overwhelmed by the countrywide insurgency of the Muslim Brotherhood . Al-Assad sent a Syrian Army division under his brother Rifaat to the city of Hama , known to be the center of the resistance. Following a counterattack by the Brotherhood, Rifaat used his heavy artillery to demolish
10573-494: The security gap begins with training, sometimes in specialized areas such as intelligence. More direct, but still noncombat support, includes intelligence, planning, logistics and communications. Anthony Cordesman notes that security requirements differ by region and state in region. Writing on the Middle East, he identified different security needs for specific areas, as well as the US interest in security in those areas. It
10682-634: The sites of failed insurgencies. Hart also points to the experiences of T. E. Lawrence and the Arab Revolt during World War I as another example of the power of the rebel/insurgent. Though the Ottomans often had advantages in manpower of more than 100 to 1, the Arabs ' ability to materialize out of the desert, strike, and disappear again often left the Turks reeling and paralyzed, creating an opportunity for regular British forces to sweep in and finish
10791-408: The softs and the incompetents, give full support to the active leaders. Organize self-defense units. 7. Group and educate the leaders in a national political movement. 8. Win over or suppress the last insurgent remnants. According to Galula, some of these steps can be skipped in areas that are only partially under insurgent control, and most of them are unnecessary in areas already controlled by
10900-413: The strategic campaign, even if it is politically unfeasible to use precise terminology. Insurgent groups often struggle to maintain coherency and authority due to their decentralized nature, and thus rely heavily upon ethnic, religious, or ideological bounds to avoid splintering. While it may be reasonable to consider transnational insurgency, Anthony Cordesman points out some of the myths in trying to have
11009-680: The struggle in Northern Ireland had cost the United Kingdom three thousand fatal casualties. Of the three thousand, about seventeen hundred were civilians...of the remaining, a thousand were British soldiers. No more than three hundred were terrorists, a ratio of three to one. If the prerequisites for the first method – excellent intelligence, superbly trained and disciplined soldiers and police, and an iron will to avoid being provoked into lashing out – are lacking, van Creveld posits that counterinsurgents who still want to win must use
11118-399: The tactical level, but its dispatch is a strategic decision that may be made unilaterally, or by an established group of the core such as NATO or ASEAN . Other than brief "Leviathan" takedowns, security building appears to need to be regional, with logistical and other technical support from more developed countries and alliances (e.g., ASEAN, NATO). Noncombat military assistance in closing
11227-687: The tactical, strategic and public policy levels. Before one counters an insurgency, one must understand what one is countering. Typically the most successful counter-insurgencies have been the British in the Malay Emergency and the Filipino government's countering of the Huk Rebellion . In the Philippine–American War , U.S. forces successfully quelled the Filipino insurgents by 1902, albeit with tactics considered unacceptable by
11336-477: The term "subversion" is less commonly used by current U.S. spokesmen, that may be due to the hyperbolic way it was used in the past, in a specifically anticommunist context. U.S. Secretary of State Dean Rusk did in April 1962, when he declared that urgent action was required before the "enemy's subversive politico-military teams find fertile spawning grounds for their fish eggs." In a Western context, Rosenau cites
11445-462: The third objective. Zambernardi's theory posits that to protect populations, which is necessary to defeat insurgencies and to physically destroy an insurgency, the counterinsurgent's military forces must be sacrificed, risking the loss of domestic political support. Another writer who explores a trio of features relevant to understanding counterinsurgency is Akali Omeni. Within the contemporary context, COIN warfare by African militaries tends to be at
11554-461: The time when the counterinsurgents become disgusted by their own actions and demoralized. General Patrick Walters, the British commander of troops in Northern Ireland, explicitly stated that his objective was not to kill as many terrorists as possible but to ensure that as few people on both sides were killed. In the vast majority of counterinsurgencies, the "forces of order" kill far more people than they lose. In contrast and using very rough figures,
11663-457: The two apart. Insurgencies normally field fighting forces orders of magnitude larger than those of terrorist organizations." Insurgencies have a political purpose, and may provide social services and have an overt, even legal, political wing. Their covert wing carries out attacks on military forces with tactics such as raids and ambushes , as well as acts of terror such as attacks that cause deliberate civilian casualties. Mao considered terrorism
11772-405: The two cases of El Salvador and South Africa to argue that the process of democratization can be prompted by alliances of workers and impoverished people who confront established elites . In Forcing Democracy from Below , Wood studies the conditions in which this sort of democratization process can be successful. Wood's second book, Insurgent Collective Action and Civil War in El Salvador ,
11881-432: Was published in 2003. Wood studies the cooperation of rural people and agricultural cooperatives with a political insurgency in El Salvador, arguing that many individuals overcame the collective action problem to participate in a dangerous insurgency because of a combination of beliefs that the insurgency would have positive effects, a desire to express defiance, and the pleasure of expressing individual agency. In reviewing
#584415