11 September 2022

UKRAINE AND PROXY WAR: IMPROVING ONTOLOGICAL SHORTCOMINGS IN MILITARY THINKING


INTRODUCTION

Proxy war is an underappreciated component of warfare. In many cases, proxy war is omitted from discussions of international armed conflict, relegated to non-international armed conflict and the realm of non-state actors. This taxonomy is incorrect because it overlooks the ways in which state actors use other state actors, in addition to non-state actors, to engage in proxy war.

Further, Western militaries and pundits alike tend to place proxy war in a category outside the bounds of acceptable practice. Instead, they often label proxy war a nefarious activity conducted by cynical strategic actors.1 To be sure, a quick scan of U.S. Army doctrine, for instance, yields scant mention of proxy war, and when proxy war is mentioned, it is applied to non-state actors and to how an adversary operates.2 This is also an incorrect categorization of proxy war.

These two ontological misconceptions are the primary factors derailing a clear understanding of how proxy war fits both within warfare and within war as a whole. The ongoing Russo-Ukrainian War provides the defense and security studies communities a ripe opportunity to review their understanding of proxy war and to rectify ontological incongruencies.

The Russo-Ukrainian War demonstrates that proxy wars are not solely the action of cynical, revanchist actors operating through non-state actors. Rather, it is a striking example of how state actors fight proxy wars through other state actors. To that end, multiple Western nations are engaged in a proxy war against Russia to support and defend democratic ideals, the rule of law and the international system.3 However, to see beyond proxy war’s ontological misgivings, and square the circle, a solid theoretical foundation is required. This paper, building on existing proxy war literature, seeks to provide that foundation by introducing two forms of proxy war: the traditional model and the technology diffusion model. This paper builds on those two forms of proxy war and asserts that each form contains two subcategories: state actor and non-state actor. In short, this paper adds to the existing literature on proxy war by injecting four new named and categorized subjects into the field’s taxonomy to overcome the ontological shortcomings of proxy war.

PROXY WARS—A TAXONOMY

A proxy war is armed conflict, whether international or non-international, in which one side (or more) uses an intermediary as its primary combat force to achieve its strategic aims.4 Within proxy wars, five basic strategic relationships exist: coercive, exploitative, transactional, cultural or contractual.5 Those relationships guide the interaction between principal and proxy (see Figure 1). Further, the unique structure of each strategic relationship governs what a principal can expect from, and accomplish with, its proxy. These five relationships come to life in proxy war’s two basic forms—the traditional and technology diffusion models (see Figure 2).

 
Figure 1: Five Models of Proxy War (Enlarge)

Figure 2: Two Forms of Proxy War

TRADITIONAL MODEL

Proxy war’s traditional model results from a principal actor using a proxy for the day-to-day rigors of combat against an enemy. This is the most common form of proxy war and what most people envision when “proxy war” is mentioned. The use of combat advisors, especially at the tactical level, is one of the primary indicators of this form of proxy war. Iran’s use of Iraq-based Shia militia groups to combat the U.S. military during Operation Iraqi Freedom and Operation Inherent Resolve are recent examples of this form of proxy war, something the U.S. military can easily relate to.6

Two subcategories exist within the traditional model. The first subcategory occurs when a state actor uses a non-state actor as its proxy. This category aligns with the Iranian model described in the previous paragraph and is the most recognizable form of proxy war.

The second subcategory is less common than the previous, but still pervasive. The second subcategory results from a state actor enlisting another state actor as its proxy, whether explicitly or implicitly, to fight against a common foe. Although it is easy to confuse this subcategory as a coalition or an alliance, it differs in that the principal does not fight alongside the proxy; instead, it provides the proxy with combat support. Combat support often comes in the form of planning, intelligence, surveillance and reconnaissance (ISR), targeting, strike and logistics. This category is also characterized by the use of combat advisors, although many of those combat advisors are far closer to the front or fulfill a dual role, both advising and carrying out combat support.

As David Lake notes in a contemporary work on proxy war, the United States’ support to the post-Saddam government of Iraq typifies this subcategory.7 In post-Saddam Iraq, the United States developed, financed, equipped and trained the Iraqi security forces.8 The United States then used the Iraqi security forces to combat Iranian interference in Iraq and to lead the U.S. effort to snuff out the growing post-Saddam insurgency.9 The Iraqi security forces fought alongside and, later, in front of U.S. forces during this war.10 That is not to say that the U.S. military did not conduct unilateral operations, because it did. However, as the war progressed, the U.S. military relied more on the Iraqis for combat operations and took a back seat, offering advice, training and logistical support.11

Operation Inherent Resolve, on the other hand, also provides an example of the traditional model’s state actor/state actor subcategory. Despite being outfitted with friendly terms and phrases such as “partner” and “advise and assist,” the United States’ operational and tactical level reliance on the Iraqi security forces to combat the Islamic State meets the definitional requirements of a proxy war.12 U.S. forces provided combat advisors and planning and logistics advisors, and they covered discrete capability gaps for the Iraqis, to include ISR, targeting and precision strike. All of these factors combine to meet the standard for a traditional principal-proxy relationship.13

To reiterate, the traditional model is the most common form of proxy war. Within this model, two subcategories exist—one in which a state actor fights through a non-state actor, and the other in which a state actor fights through a state actor. It is important to remember that the state actor/non-state actor subcategory can be mistaken as a coalition or an alliance, but proxy relationships are discernible by the degree to which participants share tactical and existential risk.14 In situations in which the risk is offloaded to one actor, and the other actor (or actors) remain(s) relatively clear of harm’s way, the situation is likely a proxy war and not a coalition or an alliance.15

TECHNOLOGY DIFFUSION MODEL

The technology diffusion model is proxy war’s second form. This model results from the principal providing its agent with financing, weapons, training and equipment instead of indirectly fighting through the proxy. This model is often a third-party actor’s pragmatic response to the actions of an aggressor state against a weaker actor. Further, this form of proxy war is useful for opportunistic principals interested in seeing an adversarial state actor fail in a third-party conflict. The technology diffusion model is often indicated by operational and strategic combat advising, but also by the use of technical advisors. Technical advisors often operate in third-party countries and train and educate the proxy on the use of foreign-supplied equipment and weapons. The technology diffusion model also has two subcategories.

The first subcategory is the result of a principal providing a non-state actor with financing, weapons, training and other equipment to combat an enemy, but not taking an active role in the fighting itself. This subcategory is fairly common. The United States’ support for the mujahideen during the Soviet-Afghan War (1979–1989) is perhaps one of the best-known examples of this model.16 The U.S. Stinger missile came to be seen as a meme of U.S. involvement in that war, as the Stinger missile decidedly assisted the mujahideen defeat of the Soviet Union. Moreover, Russia’s support to the Taliban and its affiliates during the U.S. war in Afghanistan (2001–2021) is another example of this proxy arrangement.17

On the other hand, the second subcategory results from the principal providing another state actor with financing, weapons, training and other equipment to combat an enemy, but not taking an active role in fighting. From a historical standpoint, the United States’ support for Iraq during the Iran-Iraq War (1980–1988) is an example of this situation.18 However, the ongoing Russo-Ukrainian War is a more tangible illustration of this subcategory.

From a technology diffusion standpoint, the United States has provided Ukraine with military aid exceeding $4.6 billion since February 2022.19 As recently as 31 May 2022, President Biden reiterated the United States’ commitment to Ukraine’s survival and, conversely, the thwarting of Moscow’s policy aims in Ukraine.20 The most recent aid package, valued at $700 million, includes High Mobility Artillery Rocket Systems (HIMARS), towed 155 millimeter artillery, a panoply of unmanned aerial systems and a wide variety of other weapons and related equipment.21 Furthermore, American combat advisors trained Ukrainian soldiers in Germany on the use and upkeep of the U.S.-provided combat equipment, to include its towed artillery.22

It is important to note that the donation of money, equipment and weapons does not necessarily equate to an actor engaging in proxy war. Stated or unstated, an actor’s involvement meets proxy war criteria mainly based on the intent behind its contributions and the degree of its support. It is also important to remember that press releases, open-source documents and doctrines often obfuscate intent and methods and instead focus on communicating a narrative. To that end, because a state actor is not using the phrase “proxy war” does not mean that they are not engaged in that activity. In both cases, resource commitment and intent—not words—are the surest way to discern if an actor has committed to a proxy war or if it is just providing a needy international actor with support.

CONCLUSION

Proxy wars must always be at the fore of warfare studies because they dominate both international and non-international armed conflict. Further, proxy war’s nuance is important to understand because misunderstandings can cue missteps, from the policy level all the way to the tactical level of war. Providing a clear taxonomy for proxy war, as this paper does, helps overcome ontological shortcomings that also contribute to poor showings in proxy war.

Looking to the future, as the international system continues to rely on a rules-based international order, the student of warfare should expect to see a few trends in future war. First, in cases in which maligned state actors attempt territorial conquest vis-à-vis another state, one should anticipate a pragmatic response from third-party actors. If the third party elects a proxy war strategy, one should expect it to employ the traditional model against adversaries that it expects to defeat relatively soon. However, if the third party assesses a longer, more costly war, but goes with a proxy strategy, one should anticipate the technology diffusion model (see Figure 3).

Figure 3: Anticipated Applications

Second, the method of identifying a proxy is less a selection process than it is assessing the available actors and evaluating one’s capacity to create a proxy from the groups of fighters, partisans or like-minded people, then being able to transition it into a coherent force that can be put in the field to combat an adversary. In most cases, proxy selection is pragmatic and dynamic based on how available resources allow for the quickest solution.

Finally, the student of warfare must expect proxy wars to continue at a regular clip in the cycle of violence that permeates the modern world. Proxy war provides policymakers, strategists and practitioners with quick, relatively cheap and low-risk (to oneself) options for the continuation of policy aims. The flexibility of proxy war strategies means that they will remain at the fore of international and non-international armed conflict for the foreseeable future.

No comments: