MarketInsurgency
Company Profile

Insurgency

An insurgency is a violent, armed rebellion by small, lightly armed bands who practice guerrilla warfare against a larger authority. The key descriptive feature of insurgency is its asymmetric nature: small irregular forces face a large, well-equipped, regular military force state adversary. Due to this asymmetry, insurgents avoid large-scale direct battles, opting instead to blend in with the civilian population where they gradually expand territorial control and military forces. Insurgency frequently hinges on control of and collaboration with local populations.

Definition
'' were armed anti-Habsburg rebels in Royal Hungary between 1671 and 1711. James Fearon and David Laitin define insurgency as "a technology of military conflict characterized by small, lightly armed bands practicing guerrilla warfare from rural base areas." Austin Long defines insurgency as "the use of political and military means by irregular forces to change an existing political order. These forces typically mingle with civilians in order to hide from the forces defending the political order." According to Matthew Adam Kocher, Thomas Pepinsky and Stathis Kalyvas, a central objective in insurgencies is to achieve control over civilians. == Insurgency and civil wars ==
Insurgency and civil wars
According to James D. Fearon, wars have a rationalist explanation behind them, which explains why leaders prefer to gamble in wars and avoid peaceful bargains. Fearon states that intermediate bargains can be a problem because countries cannot easily trade territories with the spread of nationalism. Institutions are responsible for checking the government, creating multiple peaceful routes to help the government solve problems, making the government committed to political terms that entails preserving peace, and creating an atmosphere where rebels do not need to form militias. Wood suggests that "participants in the 1964 Freedom Summer campaign in the US South ran high risks of bodily harm in challenging the long-standing practices of racial exclusion in Mississippi." There are many selective incentives that encourage insurgency and violent movements against autocratic political regimes. For example, insurgents can provide the supply of safety as a material good, which abolishes the exploitation of the government and thus forms one of insurgency's main incentives. The revolutionary power can help manifest a social-political network that in return provides access to political opportunities to diverse candidates, who share a collective identity and cultural homogeneity. Also, civil wars and insurgencies can provide employment and access to services and resources that were once taken over by the autocratic regimes. ==Tactics==
Tactics
Insurgencies differ in their use of tactics and methods. In a 2004 article, Robert R. Tomes spoke of four elements that "typically encompass an insurgency": • cell-networks that maintain secrecy • terrorism used to foster insecurity among the population and drive them to the insurgents for protection • multifaceted attempts to cultivate support in the general population, often by undermining the new regime • attacks against the government Tomes' is an example of a definition that does not cover all insurgencies. For example, the French Revolution had no cell system, and in the American Revolution, little to no attempt was made to terrorize civilians. In consecutive coups in 1977 and 1999 in Pakistan, the initial actions focused internally on the government rather than on seeking broad support. While Tomes' definition fits well with Mao's Phase I, Steven Metz observes that past models of insurgency do not perfectly fit modern insurgency, in that current instances are far more likely to have a multinational or transnational character than those of the past. Several insurgencies may belong to more complex conflicts, involving "third forces (armed groups which affect the outcome, such as militias) and fourth forces (unarmed groups which affect the outcome, such as international media)," who may be distinct from the core insurgents and the recognized government. While overt state sponsorship becomes less common, sponsorship by transnational groups is more common. "The nesting of insurgency within complex conflicts associated with state weakness or failure..." (See the discussion of failed states below.) Metz suggests that contemporary insurgencies have far more complex and shifting participation than traditional wars, where discrete belligerents seek a clear strategic victory. Terrorism Many insurgencies include terrorism. While there is no accepted definition of terrorism in international law, United Nations-sponsored working definitions include one drafted by Alex P. Schmid for the Policy Working Group on the United Nations and Terrorism. Reporting to the Secretary-General in 2002, the Working Group stated the following: {{Blockquote|Without attempting a comprehensive definition of terrorism, it would be useful to delineate some broad characteristics of the phenomenon. Terrorism is, in most cases, essentially a political act. It is meant to inflict dramatic and deadly injury on civilians and to create an atmosphere of fear, generally for a political or ideological (whether secular or religious) purpose. Terrorism is a criminal act, but it is more than mere criminality. To overcome the problem of terrorism it is necessary to understand its political nature as well as its basic criminality and psychology. The United Nations needs to address both sides of this equation. Morris made the point that the use, or non-use, of terrorism does not define insurgency, "but that organizational traits have traditionally provided another means to tell the two apart. Insurgencies normally field fighting forces orders of magnitude larger than those of terrorist organizations." Insurgencies have a political purpose, and may provide social services and have an overt, even legal, political wing. Their covert wing carries out attacks on military forces with tactics such as raids and ambushes, as well as acts of terror such as attacks that cause deliberate civilian casualties. Mao considered terrorism both a basic part of his first part of the three phases of revolutionary warfare and a component of forming a guerilla movement. Subversion While not every insurgency involves terror, most involve an equally hard to define tactic, subversion. "When a country is being subverted it is not being outfought; it is being out-administered. Subversion is literally administration with a minus sign in front." The exceptional cases of insurgency without subversion are those where there is no accepted government that is providing administrative services. While the term "subversion" is less commonly used by current U.S. spokesmen, that may be due to the hyperbolic way it was used in the past, in a specifically anticommunist context. U.S. Secretary of State Dean Rusk used it this way in April 1962, when he declared that urgent action was required before the "enemy's subversive politico-military teams find fertile spawning grounds for their fish eggs."{{citation In a Western context, Rosenau cites a British Secret Intelligence Service definition as "a generalized intention to (emphasis added) "overthrow or undermine parliamentary democracy by political, industrial or violent means." While insurgents do not necessarily use terror, it is hard to imagine any insurgency meeting its goals without undermining aspects of the legitimacy or power of the government or faction it opposes. Rosenau mentions a more recent definition that suggests subversion includes measures short of violence, which still serve the purposes of insurgents. Rarely, subversion alone can change a government; this arguably happened in the liberalization of Eastern Europe. To the Communist government of Poland, Solidarity appeared subversive but not violent. ==Political rhetoric, myths and models==
Political rhetoric, myths and models
In arguing against the term "global war on terror", Francis Fukuyama said the United States was not fighting terrorism generically, as in Chechnya or Palestine. Rather, he said the slogan "war on terror" is directed at "radical Islamism, a movement that makes use of culture for political objectives." He suggested it might be deeper than the ideological conflict of the Cold War, but it should not be confused with Samuel Huntington's "clash of civilizations." Addressing Huntington's thesis, David Kilcullen wrote "We must distinguish Al Qa'eda and the broader militant movements it symbolises – entities that use terrorism – from the tactic of terrorism itself." There may be utility in examining a war not specifically on the tactic of terror but in co-ordination among multiple national or regional insurgencies. It may be politically infeasible to refer to a conflict as an "insurgency" rather than by some more charged term, but military analysts, when concepts associated with insurgency fit, should not ignore those ideas in their planning. Additionally, the recommendations can be applied to the strategic campaign, even if it is politically unfeasible to use precise terminology. Insurgent groups often struggle to maintain coherency and authority due to their decentralized nature, and thus rely heavily upon ethnic, religious, or ideological bounds to avoid splintering. While it may be reasonable to consider transnational insurgency, Anthony Cordesman points out some of the myths in trying to have a worldwide view of terror: Counterinsurgency models, not mutually exclusive from one another, come from Kilcullen, McCormick, Barnett and Eizenstat. Kilcullen describes the "pillars" of a stable society, while Eizenstat addresses the "gaps" that form cracks in societal stability. McCormick's model shows the interplay among the actors: insurgents, government, population and external organizations. Barnett discusses the relationship of the country with the outside world, and Cordesman focuses on the specifics of providing security. Recent studies have tried to model the conceptual architecture of insurgent warfare using computational and mathematical modelling. A recent study by Juan Camilo Bohorquez, Sean Gourley, Alexander R. Dixon, Michael Spagat, and Neil F. Johnson, entitled "Common Ecology Quantifies Human Insurgency", suggests a common structure for 9 contemporary insurgent wars, supported by statistical data of more than 50,000 insurgent attacks. The model explains the recurrent statistical pattern found in the distribution of deaths in insurgent and terrorist events. Kilcullen's pillars model, as in Kilcullen's mode, unity of command becomes "unity of effort at best, and collaboration or deconfliction at least." To be viable, a state must be able to close three "gaps", of which the first is most important: • Security: protection "... against internal and external threats, and preserving sovereignty over territory. If a government cannot ensure security, rebellious armed groups or criminal nonstate actors may use violence to exploit this security gap—as in Haiti, Nepal, and Somalia." • Capacity: the survival needs of water, electrical power, food and public health, closely followed by education, communications and a working economic system. "An inability to do so creates a capacity gap, which can lead to a loss of public confidence and then perhaps political upheaval. In most environments, a capacity gap coexists with—or even grows out of—a security gap. In Afghanistan and the Democratic Republic of the Congo, for example, segments of the population are cut off from their governments because of endemic insecurity. And in postconflict Iraq, critical capacity gaps exist despite the country's relative wealth and strategic importance." • Legitimacy: closing the legitimacy gap is more than an incantation of "democracy" and "elections", but a government that is perceived to exist by the consent of the governed, has minimal corruption, and has a working law enforcement and judicial system that enforce human rights. Note the similarity between Eizenstat's gaps and Kilcullen's three pillars. is designed as a tool for counterinsurgency (COIN), but develops a symmetrical view of the required actions for both the Insurgent and COIN forces to achieve success. In this way the counterinsurgency model can demonstrate how both the insurgent and COIN forces succeed or fail. The model's strategies and principle apply to both forces, therefore the degree the forces follow the model should have a direct correlation to the success or failure of either the Insurgent or COIN force. The model depicts four key elements or players: • Insurgent force • Counterinsurgency force (i.e., the government) • Population • International community All of these interact, and the different elements have to assess their best options in a set of actions: • Gaining support of the population • Disrupt opponent's control over the population • Direct action against opponent • Disrupt opponent's relations with the international community • Establish relationships with the international community Barnett and connecting to the core In Thomas Barnett's paradigm, the world is divided into a "connected core" of nations enjoying a high level of communications among their organizations and individuals, and those nations that are disconnected internally and externally. In a reasonably peaceful situation, he describes a "system administrator" force, often multinational, which does what some call "nation-building", but, most importantly, connects the nation to the core and empowers the natives to communicate—in other words, communication can be likened to swarm coordination. If the state is occupied, or in civil war, another paradigm comes into play: the leviathan, a first-world military force that takes down the opposition regular forces. Leviathan is constituted to fight major forces, not local insurgencies. Leviathan may use extensive swarming at the tactical level, but its dispatch is a strategic decision that may be made unilaterally, or by an established group of the core such as NATO or ASEAN. Cordesman and security Other than brief "Leviathan" takedowns, security building appears to need to be regional, with logistical and other technical support from more developed countries and alliances (e.g., ASEAN, NATO). Noncombat military assistance in closing the security gap begins with training, sometimes in specialized areas such as intelligence. More direct, but still noncombat support, includes intelligence, planning, logistics and communications. Anthony Cordesman notes that security requirements differ by region and state in region. Writing on the Middle East, he identified different security needs for specific areas, as well as the US interest in security in those areas. • In North Africa, the US focus should be on security cooperation in achieving regional stability and in counterterrorism. • In the Levant, the US must largely compartment security cooperation with Israel and cooperation with friendly Arab states like Egypt, Jordan, and Lebanon, but can improve security cooperation with all these states. • In the Persian Gulf, the US must deal with the strategic importance of a region whose petroleum and growing gas exports fuel key elements of the global economy. It is well to understand that counterterrorism, as used by Cordesman, does not mean using terrorism against the terrorism, but an entire spectrum of activities, nonviolent and violent, to disrupt an opposing terrorist organization. The French general, Joseph Gallieni, observed, while a colonial administrator in 1898, Both Kilcullen and Eizenstat define a more abstract goal than does Cordesman. Kilcullen's security pillar is roughly equivalent to Eizenstat's security gap: • Military security (securing the population from attack or intimidation by guerrillas, bandits, terrorists or other armed groups). • Police security (community policing, police intelligence or "Special Branch" activities, and paramilitary police field forces). • Human security, building a framework of human rights, civil institutions and individual protections, public safety (fire, ambulance, sanitation, civil defense) and population security. Anthony Cordesman, while speaking of the specific situation in Iraq, makes some points that can be generalized to other nations in turmoil. Cordesman recognizes some value in the groupings in Samuel P. Huntington's idea of the clash of civilizations, but, rather assuming the civilizations must clash, these civilizations simply can be recognized as actors in a multinational world. In the case of Iraq, Cordesman observes that the burden is on Islamic civilization, not unilaterally the West, if for no other reason that the civilization to which the problematic nation belongs will have cultural and linguistic context that Western civilization cannot hope to equal. The heart of strengthening weak nations must come from within, and that heart will fail if they deny that the real issue is the future of their civilization, if they tolerate religious, cultural or separatist violence and terrorism when it strikes at unpopular targets, or if they continue to try to export the blame for their own failures to other nations, religions, and cultures. Asymmetric and irregular conflicts Asymmetric conflicts (or irregular conflicts), as the emerging type of insurgencies in recent history, is described by Berman and Matanock in their review as conflicts where "the government forces have a clear advantage over rebels in coercive capacity." In this kind of conflict, rebel groups can reintegrate into the civilian population after an attack if the civilians are willing to silently accept them. Some of the most recent examples include the conflicts in Afghanistan and Iraq. As European countries intervene in the conflict, creating asymmetry between the government forces and rebels, asymmetric conflict has become the most common form of subnational conflict and civil conflict where western countries are likely to be involved. Such interventions and their impacts can be seen in the NATO operation in Libya in 2011 and the French-led intervention in Mali in 2013. Berman and Matanock suggested an information-centric framework to describe asymmetric conflicts on a local level. Three parties are involved in framework: government forces, rebels and civilians. Government forces and rebels attack each other and may inadvertently harm civilians, whereas civilians can anonymously share local information with government forces, which would allow government forces to effectively use their asymmetric advantage to target rebels. Taking the role of civilians in this framework into consideration, the government and the rebels will divert resources to provide services to civilians so as to influence their decision about sharing information with the government. This framework is based on several assumptions: • The consequential action of civilians is information sharing. • Information can be shared anonymously without endangering the civilians who do so, and civilians are assumed to respond to incentives. • Neither government forces or the rebels will actively target civilians with coercion or intimidation. This framework leads to five major implications for counterinsurgency strategies: • The government and rebels have an incentive to provide services to civilians, which increases with the value of the information shared. • Rebel violence may be reduced by service provision from the government. • Projects that address the needs of the civilians in the local communities and conditioned on information sharing by the community are more effective in reducing rebel violence. In practice, these may be smaller projects that are developed through consultation with local communities, which are also more easily revoked when information is not shared. • Innovations that increase the value of projects to local civilians, such as including development professionals in project design and implementation, will enhance the effect of violence-reducing. • Security provided by the government and service provision (i.e. development spending) are complementary activities. • If either side of the conflict (government forces or rebels) causes casualties among civilians, civilians will reduce their support for that side. • Innovations that make anonymous tips to the government easier, which are often technical, can reduce rebel violence. These implications are tested by empirical evidences from conflicts in Afghanistan, Iraq and several other subnational conflicts. Further research on governance, rule of law, attitudes, dynamics and agency between allies are needed to better understand asymmetric conflicts and to have better informed decisions made at the tactical, strategic and public policy levels. ==Counter-insurgency==
Counter-insurgency
counterinsurgency forces demonstrating tactics used against Boko Haram, 2016 Before one counters an insurgency, one must understand what one is countering. Typically the most successful counter-insurgencies have been the British in the Malay Emergency and the Filipino government's countering of the Hukbalahap rebellion. In the Philippine–American War, U.S. forces successfully quelled the Filipino insurgents by 1902, albeit with tactics considered unacceptable by the majority of modern populations. ==See also==
tickerdossier.comtickerdossier.substack.com