Accesso libero

On proxy war: A multipurpose tool for a multipolar world

   | 11 mar 2024
INFORMAZIONI SU QUESTO ARTICOLO

Cita

Introduction

Today’s international system is the womb in which obfuscated wars are fought. Leading proxy war theorist Andrew Mumford asserts that, ‘Proxy wars are the indirect engagement in a conflict by third parties wishing to influence its strategic outcome’.1 Although a useful starting point, this definition, and those that rely on the idea of indirectness fall short of fully illuminating the form, character and utility of proxy war.

Instead of indirectness, proxy wars rely on one actor directly involving itself in a conflict through varying degrees of obfuscation. Obfuscated methods in proxy wars may take several forms – from manufactured insurgencies and irregular warfare to technology diffusion and financial support. Nevertheless, proxy war is one of the most prolific and profitable forms of obfuscated war today. Furthermore, unlike insurgencies, proxy war is versatile because it straddles the spectrum of conflict. Proxy strategies provide policymakers with a useful tool by decreasing political and domestic risk at home through abstruse involvement. Proxies also provide policymakers with a useful tool because operating through an intermediary offloads strategic and tactical risk (i.e., the preponderance of death and dying that accompanies warfighting) to an intermediary. Moreover, proxy force employment can span the spectrum of conflict – from competition to crisis, which then leads to armed conflict. Simultaneously, proxy force employment can support operations from policing to large-scale combat operations – the aggressor’s capabilities and intentions are the primary limiting factors.

The Cold War dominated the post-World War II (WWII) international system until the Soviet Union’s demise in 1991. A brief period of American unipolar dominance ruled the international system following the Cold War, resulting in some theorists asserting that Western liberal democracy had won out.2 Other more astute observers cautioned against such naivety and warned that as technology brings the world closer together, a new era of strategic competition would likely emerge.3 Within international relations theories, Al Qaeda’s 11 September 2001 (9/11) attacks on the United States proved the Realists more right than wrong, and the Liberals, like Fukuyama, more wrong than right. Further, 9/11 close the book on American unipolarity and ushered in a fresh period of multipolar strategic competition which reverberates today.

Accordingly, today’s international system is in a protracted period of fluctuation as a small collection of strategic actors’ jockey for primacy with one another. China and Russia are actively working to upend the United States as the leader in international affairs.4 On the other hand, transnational terrorism, which became a strategic boogeyman following 9/11, significantly cut into America’s reputation abroad and reduced its standing in the international community, both from a practical and moral position.5

The post-9/11 increase in polarity effects uncertainty within the international system. Fewer poles create more certainty and stability within the system, whereas more poles decrease certainty and stability therein.6 During the Cold War, for instance, American policy focused on the containment of the Soviet Union and the expansion of liberal, democratic and capitalistic values.7 The Soviet Union, on the other hand, focused on growing its brand and principles across the globe, while denying the expansion of Western values.8

In today’s contested strategic space, two primary themes frame the environment in which actors operate to advance their self-interest. First, today’s international community values stability, that is, the absence of international armed conflict, because of the resulting economic and domestic benefits.9 Consequently, the international community, directly and indirectly, shuns the use of war for territorial conquest, regime change or coercion. Second, as international relations theorist Charles Glaser comments, ‘Nuclear weapons enhance deterrence, thereby moderating competition and reducing the probability of war between states’.10 However, more to the point of this paper, international relations scholar Kenneth Waltz states that nuclear weapons are not war’s great neutraliser, but rather, the impetus for war to move from traditional approaches to alternative means.11 These two factors are the prime motivation for war moving from an overt use of brute force in pursuit of policy objectives, to something more discrete, limited and obfuscated.

War, for its part, has shifted alongside the evolution of the two factors mentioned above. War has become more limited and obfuscated. The increase of the fait accompli and proxies in armed conflict reflects this strategic shift. Scholar Dan Altman writes that since the end of WWII faits accompli are the primary method of territorial conquest because of the international community’s reluctance to embrace overt war as it did in the past.12 Altman further suggests that today’s faits accompli, i.e., attempting to make policy gains while operating below the threshold of quick detection and large-scale war, follows a simple pattern. According to Altman, the aggressor obtains a small piece of enemy territory before the opponent realises that it happened.13 Next, the aggressor demonstrates that attempting to retake the territory will be too costly for the opponent, which is done through posturing and signalling.14 Finally, the aggressor holds the territory and staves off war through deterrence and manipulating the international system’s rules and norms.15 Russia’s annexation of Crimea, coming on the heels of the 2014 Winter Olympics in Sochi, Russia, immediately followed by the annexation of large portions of Ukraine’s Donets River Basin (Donbas), are modern examples of the role of faits accompli in modern war.

A proxy war is the other primary method in which nation-states vigorously pursue their respective self-interests in a strategic environment that outwardly shuns and deters war. Indeed, proxy war in the post-Cold War strategic space is gaining considerable ground for policymakers interested in continuing to compete for primacy, resources and influence in an increasingly connected world.16 Proxy war’s presence is even more alarming when the proxy relationships are articulated because doing so illuminates many proxy wars hidden behind misleading language (Figure 1).

Fig. 1:

Sampling of Modern Proxy Wars.

Methods and limitations

In this paper, I explain how proxy wars fit within today’s international environment and I provide a further refinement to the concept’s ontological framework. I used process tracing to identify causal mechanisms in principal-proxy relationships, which is used to construct a set of five relationship models between principals and proxies. Each model comes with a set of considerations and expectations based on the relationship between the proxy and the variables upon which they are measured. The variables include regulatory ties, regulatory bonds, the solidity of the bond, agency cost, time and the balance of risk.

Following explaining the structure of proxy war and principal-proxy relations, I survey the five basic relationship models in proxy war – coerced, exploited, transactional, contractual, and cultural – to details the pros and cons of each of those relationships and how agency cost and risk both supports and works against the relationship. I conclude the paper with a set of assumptions and principles of proxy war which can serve as a guide for anyone attempting to study or use proxy war.

I rely predominately on secondary sources for this paper, which can be seen as a limitation. The primary reason for the use of secondary sources is that most primary source material relating to the case studies and models in this paper remains locked in secrecy with their respective governments. Further, many publicly released government documents contribute to the problems of misdirection regarding proxy war through the use of flowery language, instead of relying on straightforward definitions and terms. Nevertheless, I have done my best to parse the true meanings and intentions of relationships in armed conflict by illuminating the distinctions between alliances, coalitions and proxy relationships, as well as by offering a detailed set of definitions and frameworks to offset those limitations.

Mapping the proxy environment
Differentiating alliances, coalitions and proxy relationships

To better understand proxy war, one must first understand a proxy environment and proxy relationships because those two factors, beyond the policy decision to operate through an intermediary, are the foundation upon which proxy wars operate. The first thing to understand about a proxy environment is that alliances and coalitions are not proxy relationships. Russian strategist Alexander Svechin helps with this distinction by stating that partners in war are either allies by interest (i.e., coalition or alliance members), or allies by duty (i.e., surrogates to which the work of warfighting is off-loaded).17 Risk and agency are at the heart of the differentiation between alliances, coalitions and proxies.

The structure of alliances and coalitions more equitably distributes risk amongst partners based on each actor’s capabilities and political caveats. This results from the fact that alliances and coalitions are arrangements in which all participants are willing contributors to a common set of aims. In turn, the agency costs (i.e., the suboptimisation that follows outsourcing work to another actor) in alliances and coalitions are relatively low.

In proxy arrangements, however, the principal (Actor A) offloads high degrees of tactical risk (i.e., the human and material costs of warfighting) to a surrogate (Actor B) to limit the impact of strategic risk (i.e., the political costs of war) on its pursuit of self-interest. In most instances, Actor A is stronger than Actor B and therefore Actor A uses various levers of power to manipulate Actor B to fulfill its objectives. This arrangement creates a principal-agent relationship between the two actors and this defining feature is what sharply distinguishes alliances and coalitions from proxy arrangements.

The distribution and use of resources are other noticeable distinctions between alliances and coalitions and proxy relationships. For proxy force utilisation, an actor must generally enable its surrogate. This is done in several ways, including providing the proxy with a host of resources such as personnel, weapons, equipment and advisors. Alliances or coalitions operate much differently. In those configurations, resources are pooled, or a member is assigned roles under its inherent resources. Furthermore, in alliances and coalitions, advisors give way to liaisons, whose focus is on facilitation, coordination, and communication. Meanwhile, in many cases fully integrated headquarters are the norm for alliances and coalitions, whereas proxies receive a centralised approach to command and control. Organisations such as the North Atlantic Treaty Organization (NATO) typify alliances. At the same time, formations such as the Combined Joint Task Force-Operation Inherent Resolve (CJTF-OIR) and Combined Joint Force Land Component Command-Operation Inherent Resolve (CJFCC-OIR) are typical reflections of a coalition. On the other hand, Russia’s command of its proxies in Ukraine’s Donbas and its command of the 4th and 5th Syrian Assault Corps during the ongoing Syrian civil war are exemplars of this point.18

Proxy war 2.0

Cold War-era proxy wars are sometimes conflated with modern proxy wars. In fact, it is common to hear senior policymakers and military officers suggest that the West understood proxy war during the Cold War and fought it well, despite extremely poor showings in Korea and Vietnam. Nevertheless, Cold War proxy wars, ostensibly between the United States and the Soviet Union, focused on containment and denying the other power’s ability to inject its political and economic ideology, whether directly or indirectly, into a weaker actor.

When differentiating between today’s proxy wars and those of the past it is also important to dispel a couple of myths. First, proxy wars are not linked to one type or form of war. For instance, many discussions suggest that proxy wars are insurgencies or counter-insurgency strategies, but this is not the case. As the fierce, conventional battles of Russia’s war with Ukraine during the proxy-laden 2014–2015 Donbas campaign demonstrate, proxy wars host bloody battles of attrition just as easy as insurgencies and other forms of irregular war.19

The role of irregular forces and non-state actors is often miscategorised in proxy wars. This is also a common misconception that can be attributed to how Cold War proxy wars were fought. That form of proxy war was characterised by a state actor and non-state actor aligned to combat either a state actor or a non-state actor. That traditional proxy war arrangement is no longer valid. Traditional irregular forces – patched together bands of fighters, existing militias and manufactured armies, to name a few – are common fodder for proxy force generation. It is also important to mention that private military companies, like Russia’s Wagner Group or the American Academi (formerly known as Blackwater) are non-state actors. In all, incorporating the two pairings already listed in this paragraph demonstrates that six basic parings exist in proxy war (Figure 2).

Fig. 2:

State Actors and Non-State Actors in Proxy War.

To close this section, it is important to reflect on definitions. Undeniably, proxy war is a hotly debated concept and the concept maintains a bevy of both supporters and detractors. Nevertheless, proxy war lacks an accepted proprietor, a common framework, and an accepted set of terms, definitions and concepts. Despite many theorists and analysts’ contemporary work on proxy war, none have achieved an authoritative status on the subject. As a result, this paper introduces its own concepts, definitions and terms within the proxy war banner with the expressed purpose of filling in existing conceptual gaps and improving the language and concepts within the proxy war.

Overcoming obfuscation in proxy war
Agency theory and proxy dyads

A clear understanding of the relationship amongst actors in proxy war is a critical factor in understanding the purpose, utility and benefits of proxy relationships, and thus, why they are so relevant in war. Agency theory and principal-agent relationships are the building blocks in understanding proxy relationships. This is because agency theory provides the basic shape, function and rules for proxy relationships.

Agency relationships exist when one actor (i.e., the principal) delegates or outsources work to another actor (i.e., the agent).20 In proxy war situations, the principal is typically the stronger, more powerful actor, whereas the agent is the proxy. Nevertheless, it is dangerous to assume that a principal holds the upper hand in principal-agent relationships.21 Information asymmetries between the principal and agent result in the agent maintaining hidden information, which keeps the principal in the dark regarding the agent’s intentions, capabilities, risk tolerance and commitment.22 As a result of those asymmetries, principals cede varying degrees of power to the agent, which manifests in agency costs.23 Risk is another word for agency costs. Risk in principal-agent dyads often includes:

suboptimised performance;

an agent acting against the principal’s welfare to offset tactical and strategic risk, or general risk aversion;

an agent acting under its own self-interest at the expense of the principal’s interest;

difficulty regulating agent behaviour;

an agent’s vulnerability to being swayed by other strategic competitors;

an agent utilising information as a commodity to gain or retain power concerning its principal24

In sum, agents are not necessarily innocent bystanders in principal-agent dyads, but often possess asymmetries of power for which principals must account.

Principals, on the other hand, offset agency costs through a variety of means, including incentive alignment, investment and compensation, and agent monitoring.25 Agent monitoring in proxy war situations is vital and manifests in the principal’s use of advisors to manage its surrogacy and their associated agency costs. In fact, the use of advisors in war is a primary indicator of a proxy relationship, as is the use of phrases such as train, advise, assist, build partner capacity, and partnered security forces.

The more that agency costs, or risk, impedes mission accomplishment, the more agent monitoring is a focal point for the principal. In strong-bonded principal proxy relationships, agent monitoring is minimal. In loosely bonded relationships, agent monitoring is high and often coupled with efforts to increase the agent’s capacity. From an American perspective, the combat advisors used in Afghanistan, Iraq and Syria during Operations Enduring Freedom, Iraqi Freedom and Inherent Resolve are exemplars of this point. Russia’s use of embedded advisors and using Russian officers to command proxy forces within the Donetsk People’s Army (DPA) and Luhansk People’s Army (LPA) is how Russia managed agency costs throughout its 2014–2015 Donbas campaign.26 Beyond Ukraine, Russia continues this practice in its support of Syrian President Bashar Al Assad, as the deaths of Russian generals Valery Asapov and Vyacheslav Gladkikh attest.27 Both men were leading proxy armies in Syria at the time of their respective deaths. In practice, therefore, principal-agent relationships are exercises in risk manipulation and management.28

In proxy dyads, a tie (or bond) is the product of the exercise of agency and power between actors, and they are measured on a scale from weak to strong. The stronger the bond between the principal and agent, the lower the agency costs, and therefore, the principal does not require a high degree of oversight of the agent.29 Conversely, the weaker the bond between the principal and agent, the closer the principal must monitor and regulate the agent’s behaviour because the relationship’s agency costs are greater.30

Furthermore, when a principal-agent dyad completes its unifying mission the relationship will collapse, especially when neither actor was significantly invested in the other, or if promising alternatives to a continued relationship exist.31 Regardless of the strength of the bond, proxy relationships, unlike alliances or coalitions, exist in a finite world because the relationship is operating against a clock with a fixed amount of time. As a result, principal-agent days will terminate shortly after mission accomplishment or, depending on the degree of power the principal holds concerning the proxy, when the proxy is no longer willing to support the principal, regardless of mission accomplishment.32

Moreover, outside actors can accelerate the relationship’s fracture or suboptimisation by strategically targeting the proxy’s vital interests, causing it to discontinue or pause its relationship with the principal. Turkey’s attack on Syrian Kurd territory during the height of America’s counter-Islamic State of Iraq and Syria (ISIS) proxy war is instructive. Turkey, growing weary of Syrian Kurdish strength and legitimacy because of their relationship with the United States, threatened Kurdish regional hegemony and the Kurds therein.33 The purpose of Turkey’s aggression, known as Operation Olive Branch, was to lure Syrian Kurds away from the counter-ISIS campaign and into battle with the Turks so that Turkey could use the battle to neuter Kurdish strength and legitimacy. The trap worked and the Kurds broke with their American principal in Syria’s eastern desert to return home and defend their ancestral lands and people.34 Regular Turkish assaults, in turn, drove multiple operational pauses during the US counter-ISIS proxy war as the Kurds returned home.35 Turkey clearly understood the principal-agent challenges and agency costs between the Americans and its Syrian-Kurd proxy force and exploited that juncture to advance its own agenda within a much broader regional war.

Power and proxy dyads

Philosopher Bertrand Russell offers what should be accepted as one of the proxy relationship’s central tenets. Russell states that ‘The laws of social dynamics are only capable of being stated in terms of power in its various forms’.36 In proxy relationships, where mutual interest is often unsatisfactory at maintaining an agent’s focus on the principal’s objectives, power fills the motivation vacuum to harmonise the two actor’s activities.

Political scientist Robert Dahl provides a celebrated theorem for power which posits that one actor has power over another actor insofar as the former can make the latter do what it would otherwise not do.37 Bases of power are critical to Dahl’s theory of applied power because they provide the tools and resources that an actor has at their disposal to exert power over another actor.38 Put another way, an actor cannot exercise power over another actor without a base, or bases, of power. Furthermore, a relationship must exist between two actors for one actor to exert power over another.39 This is important because if a relationship does not exist between principal and agent, then prescriptive and coercive power is often the technique needed to motivate an agent, whereas in strong, transactional principal-agent relationships, power is less coercive, and the principal provides the proxy increased freedom of action and self-governance.

Power moderates relationships through one of five forms. These forms of power are attraction, expertise, reward, coercion and legitimacy.40 Attraction power is a situation in which Actor A relies on Actor B’s fondness for the latter to mediate the conduct and collaboration between the two actors.41 Expert power results from Actor A leveraging Actor B’s faith that the latter possesses superior knowledge and information, and thus willingly submitting itself to surrogacy on Actor A’s behalf.42 Reward power is the ability for Actor A to levy rewards to Actor B in exchange for services rendered, or to incentivise Actor B to work as a surrogate on the latter’s behalf.43 Coercive power is Actor A’s ability to dole out punishment to Actor B to cajole Actor B to work on Actor A’s behalf.44 Legitimate power, like expert power, results from Actor B’s belief that Actor A possesses the authority to direct their behavior.45 As this theory of power is juxtaposed with proxy war and principal-agent relationships, Actor A serves as the principal, and Actor B serves as the proxy. In proxy dyads, a blend of coercive and reward power is most often used to motivate agents and offset agency costs. This carrot-and-stick strategy is common in weak-bonded relationships. In strong bonded relationships, reward power mediates the activities between the principal and proxy because the agent does not require high degrees of external motivation or accountability.

Time

As noted during the discussion of agency and power, time preserves an authoritative grip on proxy relationships – in effect, finality characterises proxy relationships. Proxy relationships are objective- or tasked-based arrangements which means that as soon as the relationship is joined, the relationship’s longevity begins to diminish. As a result, in many cases, military success accelerates disunion.46

When territory is in question, as it often is in war, the dynamic changes behavior. Terrain retention (a positive aim) and terrain denial (a negative aim), similar but distinct behaviors, are the two conditions of territorial issues. Russia’s retention of the annexed Crimea and portions of the Donbas are exemplars of terrain retention. On the other hand, the American-led effort to wrest land from ISIS in Syria and Iraq through aggressive joint warfare demonstrates the basic process of brute force terrain denial.

In both cases, the principal finds a way to extend the principal-proxy dependency beyond that of just accomplishing a finite military objective. This tends to occur through the use of euphemistic terms that seek to abstruse the relationship’s character and instead make the arrangement sound more like an agreement. As the post-9/11 wars in Afghanistan and Iraq offer, the phrase build partner capacity is the guise often used to obfuscate the true goal of access, influence, and territorial control.

Iran provides another example of this situation. Since the ousting of Saddam Hussein as the head of state of Iraq in 2003, Iran has maintained a stable of reliable, political and military proxies in Iraq to advance its own interests, and to counter those of the United States.47 An array of Shia militia groups, supported by the Iranian Revolutionary Guards Corps’ Islamic Revolutionary Guard Corps (IRGC) Quds Force, are the primary thorn on America’s side, inhibiting tactical and strategic advancement in the post-Saddam Hussein strategic space.48 The IRGC’s supported militias, most notably Kata’ib Hezbollah and Kata’ib Sayyid al-Shuhada, continue to operate on behalf of Iran in Iraq at the expense of Iraq’s national stability, Iraqi strategic interests, and American interests in the region. Undeniably, the siege of the US Embassy in Baghdad in December 2019, the subsequent assassination of Quds Force commander, Major General Qasem Soleimani, and the ongoing exchange of rocket and missile strikes in Syria and Iraq between both parties highlight the US and Iran’s long-running, tit-for-tat proxy war.49

Taken collectively, agency, power, and bonding generates five basic proxy relationships. Risk is the underlying feature that separates one relationship from the next, but outwardly this manifests in principal-provided freedom of action.

Five models of relationship in proxy war

The amalgamation of agency theory, theories of power, and time yields five basic relationship types in a proxy war. These relationships are not an end unto themselves, but instead a heuristic to generate an understanding of actor dynamics in proxy wars. The five models rest on two primary variables: a) the tasks to be completed on behalf of the principal, and b) the method of power that the principal uses to manage agency costs and counterbalance agency risk. The first two relationship models – exploited and coerced – blend coercive and reward power, which are basically two sides of a coin. The other three models make sure of other forms of power, which are highlighted in each model’s section. All models are explained in greater detail in the following sub-sections.

Coerced model

Applied power is at the heart of the coerced model. International relations theorist John Mearsheimer asserts, ‘Power itself matters greatly in dealings among groups, because possessing superior power allows a group to get its way when it is at odds with another group’.50 Mearsheimer’s proposition serves as a good starting point for understanding the coerced model.

The coerced model results from Actor A (i.e., the principal) impressing an unwilling or reluctant actor (Actor B) to work on its behalf, thereby making Actor B its agent or proxy. Coerced proxies tend to arise from a situation in which a conquering power has toppled an extant ruling body, but then enlists the previous regime’s security apparatus – either external, internal, or both – to advance its own ends.51

Borrowing from network theory, the coerced model is an event-type tie between the principal and the proxy held together through coercive power. Coercive power, as previously noted, is power derived from Actor A’s ability to mediate power against Actor B to make the latter do what it would not otherwise do.52 Event-type ties, on the other hand, are bonds based upon transitory task completion, as opposed to state-type ties, which are the result of relationships, familiarity or preference.53 Event-type ties result in weak bonds between the principal and the proxy. Weak bonds, in turn, result in high agency costs. The high agency costs cause the principal to employ several measures to account for these costs and keep the coerced proxy on the path toward mission accomplishment. High agency costs reflect a general lack of commitment to the principal and its objectives, resulting in coerced proxies that are unwilling to share high amounts of existential, strategic or tactical risk. In many cases, it is often only the principal’s physical presence that keeps a coerced proxy working on the principal’s behalf.

The US military’s use of a rebuilt and reluctant Afghan force to combat non-government forces during the US’s twenty-year occupation of Afghanistan shows all the signs and symptoms associated with a coerced proxy. The Afghan’s suboptimal performance from 2003 to 2021 highlights the extreme agency costs experienced between the United States and the Afghan forces. For instance, by 2018 – three years before the United States ended its mission in Afghanistan and after 15 years of America-NATO-Afghan security efforts – the Taliban controlled upwards of 65% of Afghanistan.54 American President Joe Biden, shortly after his election to president, announced that the US’s war in Afghanistan was over and he was withdrawing US forces from the conflict no later than September 2021.55 By June 2021, the Taliban controlled 84% of Afghanistan’s territory.56 US Army General Scott Miller, the final commander of US forces in Afghanistan, went on record in his final days in command to state that he fears that the country will fall into civil war once the United States and its NATO allies depart Afghanistan.57

Shortly after the United States withdrew from the country, the Taliban deftly moved back in and retook control of the county. The collapse of Afghan security forces in the wake of a dedicated twenty-year proxy relationship with the United States clearly demonstrates the relationship’s weak foundation, as well as the limitations of a coerced proxy as it relates to a principal’s policy objectives in a foreign land.58

Furthermore, a large disparity in casualties indicates a coerced proxy. In true partnerships, the associates share tactical risks. In coerced proxy relationships, tactical risk (i.e., the fighting and dying associated with military missions) falls more squarely on the proxy. In Afghanistan, the Americans lost 2,312 service members in its proxy war against the Taliban, al Qaeda, and other non-state actors.59 NATO partners suffered an additional 1,145 killed in action.60 Afghans, often referred to as a partner, and not a proxy, suffered 73,253 killed in action during the same time.61 The massive chasm between Americans and Afghans killed in action does not represent a partnership but instead, it represents a coerced actor working on behalf of a risk-reluctant principal.

Assassinations also define coerced proxy relationships. To be sure, assassinations are a salient component of Moscow’s strategy to use coercive power to manage its Donbas proxies early in the Russo-Ukrainian War.62 Assassinations rely on fear and intimidation to keep a proxy subjugated to the principal. Eliminating popular leaders is a common approach for implementing a strategy of coercion vis-à-vis a proxy and one that Russia commonly relies on in Ukraine. For example, in October 2016, Russian operatives killed Arsen Pavlov, commander of the DPA’s prominent and successful Sparta Battalion, in his Donetsk apartment building.63 Russian operatives also eliminated Mikhail Tolstykh, commander of the Somali Battalion, in February 2017.64 On the political side of coercive power, Russian operatives assassinated DPR Prime Minister Alexander Zakharchenko in a Donetsk café bombing in August 2018.65 These three examples, a small sampling of the assassinations inflicted by Russia’s proxies in the Donbas, highlight the ends to which coercive power can be used to regulate agency costs and manage risk in proxy wars.

Lastly, a coerced proxy’s inherent weakness makes it an enticing tool for a full range of activities. Yet, given its high agency costs, weak commitment and the resulting need for extensive advising and sustainment support in both combat and non-combat environments, coerced proxies are best for short-duration, task-oriented surrogacy. As the American-Afghan dyad in Afghanistan demonstrates, coerced proxies should not be used for long-term, complicated surrogacy that is oriented on such challenging endeavors as nation-building or recasting a nation-state in foreign form.

Exploited model

The exploited model arises from a principle seeking out and enlisting a weaker actor to serve as its proxy. However, unlike the coerced model, in which the principal plays a heavy-handed role in offsetting agency costs, the exploited model reflects a principal’s reliance on a trusted actor. This springs from the proxy being a more conciliatory participant than the surrogates found in coerced relationships. In many cases, this is due to a host-parasite arrangement between the two actors, in which the principal provides the proxy with what it needs to survive. Nevertheless, in keeping with the ethos of agency theory, the proxy also possesses power concerning the principal. Exploited proxies, like Russia’s DPA and LPA, often maintain a commanding position in a principal’s strategy. Accordingly, the principal will do what it must to prevent its agent from faltering, failing or being physically destroyed. Russia’s rescue of the DPA and LPA during the influential battles at Ilovaisk, Second Donetsk Airport, and Debal’tseve illuminate this point.66

Parallel to the coerced model, event-type ties govern exploitative relationships. Occasionally, however, exploitative relationships can be state-type ties, the distinction is a result of the actor selected to serve as a proxy. State-type ties, unlike task-oriented event-type ties, are based on kinship, roles-based relationships, or sentimentality.67 Moreover, agency theory asserts that power is not a binary distinction in relationships but is instead a combination of two or more types of power.68 Exploitative relationships fit into this qualification because the exercise of power in this model is dependent upon the trustworthiness of the actor serving as the proxy. When a cultural facsimile, or close parallel, is the surrogate, such as Russia and the DPA and LPA, or Iran’s surrogates in Iraq, then the principal moves beyond coercive power and employs additional types of power to manage its proxy. Legitimate and reward power are the most common alternative forms of power used in this situation.

Exploitative relationships, as the name implies, are based on the principal’s self-interest. Because of this, the principal seeks to terminate the relationship when either the unifying mission is accomplished, the agent is no longer able to maintain positive gains towards those ends, or the agent is no longer useful.69 Beyond terminating the relationship, assassinations are also used in exploitative relationships to maintain status quo power dynamics and to keep the proxy subservient to the principal.

Exploited proxies come with high agency costs. Coerced proxies tend to demonstrate weak commitment to the principal and its mission, requiring exceedingly high oversite. However, when a culturally similar proxy is used, commitment tends to increase, and oversite decreases. Nevertheless, culturally similar coerced proxies, like Russia’s DPA and LPA, become overzealous, which comes with its own risk. To be sure, the DPA’s downing of Malaysian Airliner MH17, with a Russian-provided surface-to-air missile system in July 2014, hammers this point home.

Exploited proxies are also best suited for short-term, task-oriented work. Yet, if their goal is destructive, as opposed to growth-based, like the DPA and LPA’s mission in the Donbas between 2014–2022, then exploited proxies are a useful option.70

Transactional model

The transactional model of proxy relationship proves challenging to discern because it is often confused with a coalition-type partnership. In effect, the transactional model represents a business deal between state actors in which both actors agree to a common strategic objective, such as the defeat of a mutual enemy. This concept is not new. Writing in the early nineteenth century, Prussian theorist Carl von Clausewitz recorded that:

But even when both states are in earnest about making war upon the third, they do not always say, ‘we must treat this country as our common enemy and destroy it, or we shall be destroyed ourselves’.’ Far from it: The affair is more often like a business deal.71

However, unlike an alliance or coalition in which actors more equitably distribute risk amongst participants, transactional proxy relationships are defined by the inequitable burden sharing and distribution of risk.

In this arrangement, Actor A (i.e., the principal) takes a backseat role, providing tools to support the proxy – drone surveillance, precision-guided munitions and combat advisors, among other things – while Actor B (i.e., the proxy) provides the preponderance of force that does the true fighting and dying in battle. These relationships are often misleadingly referred to as partnerships, but as the imbalance in burden sharing and assumption of physical risk indicates, they are proxy relationships. The US’s post-February 2022 relationship with Ukraine fits into this category.72

Expert power and a transaction-oriented event-type tie govern the relationship.73 The transactional character of the event-type tie further emphasises the point that the relationship cannot be open-ended and is not suited for mission creep because the proxy, a willing participant, maintains significant agency over its own policy and affairs.

Beyond the United States-Ukraine proxy war against Russia, the US and Iraqi relationship against the Islamic State (ISIS) in Iraq provides an expressive illustration of this model. Iraq sought help from the international community to stem ISIS’s advance in Iraq in late 2014.74 The United States and the international community answered the call and formed a multinational task force, CJTF-OIR, to combat ISIS across Iraq and Syria.75 CJTF-OIR also established a land component (CJFLCC-OIR) specifically focused on Iraq.76 The United States and the government of Iraq established the policy objectives, parameters, and strategy to combat ISIS. The combination of Iraqi military commands, CJTF-OIR, and CJFLCC-OIR, in consultation with each nation’s department or ministry of defense, established the operational level military objectives and campaign plan to defeat ISIS in Iraq.

Tactically, however, the proxy nature of things came to the fore. The United States and coalition fought the war by, with, and through the Iraqis, while providing warfighting capabilities beyond those that exist within the Iraqi military. By, with, and through, as already noted, is a euphemism often used to cloak proxy relationships beneath the veneer of partnership. Nonetheless, the Iraqi security forces paid the butchers bill to defeat ISIS in Iraq. In the battle for Mosul, for example, the Iraqi security forces lost over 1,200 soldiers, including fourteen battalion commanders within the elite Counter Terrorism Service (CTS).77 The Iraqi army, which procured 140 M1 Abrams tanks following the 2011 American withdrawal from Iraq, had only a dozen tanks left the following combat in Mosul while losing control of several others to Iranian-backed militias.78 On the other hand, the United States and the coalition lost only a handful of soldiers and very little equipment during the battle.79

Time is also an important component of transactional relationships. Mutual interest in a fixed problem, like defeating ISIS in Iraq, brings like-minded actors together. However, because the problem is finite, and the proxy’s interest in the principal decreases at a comparable rate to the accomplishment of the actors’ mutual interest, the resulting principal-proxy relationship is also finite. Therefore, transactional relationships are subject to a running clock, which in turn erodes the relationship’s longevity with the accumulation of tactical success and the passage of time. Resultantly, the relationship has a fixed duration, and that duration shortens once the battle is joined.

The political-military arrangement between the Iraqi and American governments illustrates this point. Following Mosul, and ISIS’s inability to muster significant resistance thereafter, the government of Iraq realised that ISIS was strategically defeated. The government of Iraq, riding the wave of victory, no longer needed the same degree of US or coalition military support and thus began to distance itself from the United States and the coalition.80 Key indicators of Iraq’s disassociation from the United States and coalition included its military campaign to squelch Kurdish independence in October 2017, Prime Minister Haider Abadi’s formal declaration of victory over ISIS in December 2017, and Abadi’s advocacy to reduce American forces in Iraq in the intervening period.81 (Knights 2017; Mehta 2017).

To summarise the transactional relationship, this model tends to be confused as a coalition arrangement. However, it is not because risk sharing is not equitably distributed, as is the case in coalitions and alliances. Transactional proxies are the result of a strategic business deal between two actors (A and B). At the operational and tactical levels, Actor A advises and supports Actor B as Actor B methodically advances both actors’ strategic objectives. The bond, an event-type tie, is strong, but given the relationship’s transactional nature, the relationship is necessarily short-term. Therefore, transactional proxies can be counted on for missions requiring significant risk, but they should not be counted on for long-term missions.

Contractual model

The contractual model is the result of a principal seeking a professional, non-state actor solution to the military component of a political problem. Contractual proxies include mercenaries, private military companies and any other non-state actor willing and capable of accepting a contract to conduct combat or combat-related activities. The work of contractual proxies is often obfuscated through the use of politically sensitive phrases, including integrated security, risk management and mission support. Contractual proxies are an enticing option for state actors looking to distance themselves and their populations from the horrors of war, and in turn, decrease political and domestic risk.82

Like the coerced, exploited and transactional proxy, the contractual proxy is the byproduct of a transactional event-type tie with the principal. The principal offsets agency costs with a contractual proxy by using reward power.83 Because of the contractual arrangement between both actors, proxies contractual assume high degrees of risk on the principal’s behalf.

Yet, on the other side of the token, if a contractual proxy jeopardises the principal’s strategic objectives, then the principal often resorts to curtailing the relationship ahead of schedule. American mercenary firm, Blackwater, now referred to as Academi, and its haphazard killing of over 20 Iraqis in Baghdad’s Mansour District in 2007 is a useful data point that supports this assertion. Following Blackwater’s Mansour District incident, the United States began to publicly distance itself from the company.84

Russia’s Wagner Group is today’s most eminent contractual proxy. Wagner works on behalf of the Kremlin, and in lieu of Russian land forces, in Ukraine, Syria and South America. Wagner plays an important role in Moscow’s post-February 2022 invasion of Ukraine.85 Wagner proxies are noted for their work alongside the DPA and LPA in the Donbas, as well as a significant clash with American forces in the Dier ez Zor region of Syria in February 2017, which resulted in the death of over 300 Wagner proxies.86 Furthermore, thirty-three Wagner contractors were arrested in Belarus in July 2020, at the height of the political chaos, which demonstrates Wagner’s hidden reach that is not outwardly apparent to most onlookers.87

Russia also employs contractual proxies, like the Wagner Group, in Africa, most notably in the Central African Republic.88 In this case, proxies facilitate Russia’s strategic position on the continent without high overhead costs.89 To be sure, Moscow uses contractual proxies to lessen the burden on Russia’s armed forces, to offset the political and domestic risk associated with potential troop deployments to the continent, and to offset the strategic risk associated with proxy tactical activities.90

To summarise the contractual results from a state actor outsourcing combat or combat-related activities to a corporate organisation that can accomplish military solutions to political problems. Like the transactional model, the contractual model possesses a strong bond between each member of the relationship. The relationship’s duration and risk tolerance are captured within the legal documents that govern the affiliation. Contractual proxies can be counted on for risky missions, but their ability to conduct complicated, long-term missions remain to be seen.

Cultural model

Historian John Keegan provides sage counsel for understanding cultural proxies. Submitting an alternative view of war to Clausewitz’s dictum that war is a continuation of politics by other means, Keegan focuses on the intersection of war and culture. Keegan argues that ‘War embraces much more than politics: that it is always an expression of culture, often a determinant of cultural form, in some societies the culture itself’.91 Keegan is not alone in this outlook on culture. Mearsheimer posits that culture is what holds groups together.92 Because culture is fixed in self-identification, cultural links in proxy wars are powerful and result in stalwart, rugged principal-agent relationships.

Principals often cull cultural proxies from areas in which culture’s major features – religion, ethnicity, and language – bleed across the boundaries of the political map.93 Cultural proxies are state-type ties fueled by kinship, and measured by strength, intensity, and duration. Thanks to the strong reliance on shared identity, cultural proxies come with the lowest agency cost of any of the five proxy relationships, which means that the principal can augment cultural proxies with capabilities and give them complex missions, instead of devoting attention and resources to ensure the proxy’s fidelity. Principals govern cultural proxy relationships through legitimate power, or Actor B’s (i.e., the proxy) belief that Actor A (i.e., the principal) has a right to prescribe its behavior or opinions on Actor B.94 In addition to legitimate power, the principal uses the power of attraction to influence a cultural surrogate. Consequently, a vigorous link connects the principal and proxy, which in turn results in a high degree of risk sharing between the two.

Iran is the undisputed leader in today’s proxy war arena. Iran structured its Quds Force, an elite element within its Islamic Revolutionary Guard Corps (IRGC), for proxy force development, integration, maintenance, support, and combat advising. Iran, the IRGC, and the Quds Forces deftly leverage culture, most commonly Shiite Islam, to build and maintain proxy armies in the Middle East.95 Hezbollah in Lebanon and Kata’ib Hezbollah in Iraq are today’s most prominent Iranian proxies. At the same time, it supports Houthi rebels in Yemen, Hamas, and many other Shia militia groups in Syria and Iraq.

Kata’ib Hezbollah, Iran’s go-to proxy force in Iraq, is a good example of a cultural proxy. Established in the wake of the 2003 American-led toppling of Saddam Hussein’s regime, Kata’ib Hezbollah, a force of approximately 7,500, spearheads Iranian political-military objectives in Iraq.96 During the 2003–2011 war in Iraq, Kata’ib Hezbollah, among other Iranian-sponsored actors, came to light because of their deadly employment of sophisticated and potent roadside bombs, known as Explosively Formed Penetrator (EFPs), or explosively formed penetrators.97 The group resurfaced during Iraq’s war against ISIS because the Iraqi military’s need for personnel exceeded its capacity to recruit, train, and retain combat forces.98 Since the cessation of major combat against ISIS in December 2017, Kata’ib Hezbollah has been at the center of several serious provocations with the United States. These events include but are not limited to December 2019’s rocket attack at Kirkuk airbase, which killed an American contractor, the December 2019–January 2020 siege of the US Embassy in Baghdad, the American strike that killed Qasem Soleimani in January 2020, and a running exchange of rocket and missile attacks that continue to today.99 The point is that Kata’ib Hezbollah, Iran’s cultural proxy in Iraq, and to a lesser degree in Syria, continually absorbs inordinate levels of risk, including the assassination of its leaders, alongside those of its Iranian principal to advance the principal’s ambitions.100

Of the five models discussed within this paper, cultural proxies possess the tightest, most stalwart relationship with their principal because of the kinship ties that anneal the two into a near seamless dyad of common interest. For principals looking to conduct any sort of significant, dangerous (i.e., high degrees of strategic and tactical risk), and long-term proxy activities, cultural proxies are the most useful implement because of the stalwart solidarity they maintain with their principal. Figure 3 provides a graphical summary of the five models of strategic relationships in proxy wars.

Fig. 3:

Summary of Five Models.

Risk in proxy war

As highlighted throughout this paper, each of the relationships in proxy war possesses a unique risk profile. These profiles are important for the student and practitioner of war to understand because they provide a guideline for analysis and operations in proxy wars. Targeting risk can expedite the collapse of proxy relationships, and consequently, collapse the strategy of an actor applying that form of war to achieve its policy objectives. Targeting risk provides a useful alternative to attempting to meet and overcome a principal-proxy dyad head-on.

Risk in proxy war is akin to Napoleon Bonaparte’s strategy of central position, which the general used to great effect during the Napoleonic Wars. According to Bonaparte’s strategy, an actor (C) seeks to separate two aligned actors (A and B) along the seam in which those forces are cojoined or where they are attempting to link up. Actor C attacks this position to make the battle more manageable by facing each combatant separately.101 In those cases, in which two (or more) actors have not yet joined, Bonaparte’s strategy seeks to prevent their unification by Actor C thrusting itself between the convergence of Actors B and C, thus denying those two actors’ ability to reap the benefits of unification (see Figure 4).102 Network theory provides a similar strategy by arguing that denying coordination and amalgamation accelerates a network’s defeat.103

Fig. 4:

Risk and Proxy War.

Applying Bonaparte’s strategy of central position, as well as network theory’s literature on defeating networks, to proxy war provides a useful heuristic for defeating principal-agent dyads in war. Instead of a headlong attack against a principal-proxy dyad, the non-proxy actor (C) can attack A and B’s seam through risk manipulation. The goal of risk manipulation is to dissolve the bond between principal and proxy and subsequently advance its own interest in war.

Coerced and exploited proxies possess the lowest tolerance for risk and are therefore the most susceptible to suboptimisation and disunion through risk manipulation. On the other than, contractual and cultural proxies maintain the highest tolerance for risk and hence are the most challenging proxies to combat. Transactional proxies, on the other hand, fit between the previous two groupings. Transactional proxy relationships, like that of the United States and Iraq during the counter-ISIS campaign of 2014–2018, or that of the United States and Ukraine in today’s ongoing Russo-Ukrainian War, are balanced against a swiftly moving clock. The quicker the proxy dyad moves towards victory the sooner the relationship dissolves. Yet, as the hard slog throughout the battle of Mosul (from October 2016 to July 2017) illustrates, a transactional proxy will also shoulder extremely high degrees of tactical risk in support of its principal. As a result, the risk is not quite as important in transactional arrangements as in other relationships. Overcoming a transactional proxy relationship, aside from a frontal attack, then results from accelerating the relationship to its decoupling point or increasing the material costs to the point that the proxy is strategically exhausted and can no longer put a fighting force on the field of battle.

Based upon the synthesis of the five models of proxy relationships, the dynamics therein, and how risk influences proxy relationships, a series of baseline generalisations can be made about proxy environments. These assumptions, although not laws, are sufficiently rigorous to be applied in a universal sense when examining proxy war. The assumptions are:

Despite the language used to characterise the relationship, proxy environments are driven by cynical self-interest, and not altruism; therefore, self-interest forms the basis of any military partnership in proxy wars;

Principal-agent relationships in proxy war are bound by power dynamics; nevertheless, agency costs give the proxy asymmetric power over the principal;

Power is not static; power can shift if the proxy grows strong enough to stand on its own, or if the proxy generates and maintains support from external actors;

Proxy relations fall within one of five basic models, each of which possesses unique characteristics that guide the nature of the relationship;

All proxy relationships are of limited duration;

Not all political, strategic, and operational decisions in proxy war generate noticeable or direct change at the tactical level;

Battles won accelerates divergence amongst principal and agent, whereas battles lost weaken the bond between both actors;

A proxy war is not exclusive to one type of war but operates anywhere along the continuum of conflict.

The environmental assumptions summarised above provide the basis for a set of basic principles of a proxy war that apply in all proxy war scenarios. Those principles of proxy war are annotated below:

All actors in a proxy war, regardless of their degree of fidelity to its principal, will act in a manner that supports their own self-interest;

Agency costs will suboptimise any proxy relationships; therefore the principal should anticipate falling short of its actual aims, working with a proxy that is not as effective as the principal would like, and that principal-sponsored capability improvement programs will fail to bring the proxy to the level of the principal’s ambition;

Proxy relationships will expire; therefore, responsible principals must identify their own termination criteria and transition plan in accordance with the relationship’s forecasted expiration date;

It is better to face one opponent at a time than two; therefore, an actor will seek to dislocate proxies from principals to simplify how it fights in a proxy environment;

Smart actors will fracture principal-agent relationships by attacking their bond or by increasing the tactical or strategic risk beyond one of both actor’s level of acceptability;

Coerced and exploited proxies are of little utility for requirements greater than short-term, menial task completion, or for problems in which mass and attrition are the answer;

Cultural proxies are most useful for long-term, high-stakes commitments;

Contractual proxies are most useful for operations that require deniability or when the political environment necessitates secrecy.

Conclusion

Proxy war, often mascaraed as coalition warfare, irregular warfare or counterinsurgency, is more distinct than generally understood. A proxy war is not an alliance or coalition warfighting, but a standalone form of war that possesses its own characters and relationships. Furthermore, proxy war is not beholden to one type of environment but instead operates along the spectrum of conflict; the determining factor being the capabilities, policy aims and sensitives of its combatants.

Proxy relationships are not one-size-fits-all in which a stronger actor dictates their wishes to a surrogate and then manages task completion. Instead, proxy relationships are unique because of the personalities of the principal and proxy, but also because of how agency and network theory, power dynamics, and time affect the characteristics of each actor within a given dyad. Agency costs dictate that a proxy’s work will not measure up to the expected outcome of the principal and that this phenomenon will grow at scale based on the proxy’s commitment, or lack thereof, to its principal. As a result, given weaker bonds, a principal must dedicate more energy and resource to more reluctant proxies, whereas those with strong commitments require less oversight. To put it another way, proxies that require coercive power as motivation are far less productive and useful than proxies that require legitimate or expert power.

In the end, given today’s security environment and the corresponding international system, proxy wars will continue to play a significant role in armed conflict for years to come. It offers a cheap and low-risk way for state actors to wage wars that they would not otherwise be able to wage. They can modulate political and domestic risk to almost non-existent levels by offloading the death, destruction, and human cost to actors that cannot generally say no. Resultantly, by keeping populations at home unaffected by bloody strife abroad, policymakers will continue to turn to proxy war’s attractive solutions to modern policy problems, because as Svechin reminds the student and practitioner of war, ‘During a war the political life of the countries waging it continues rather than grinds to a halt’.104

eISSN:
1799-3350
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
History, Topics in History, Military History, Social Sciences, Political Science, Military Policy