In the 21st century, warfare has evolved into a challenge that many countries are ill prepared to face. In contrast to the warfare of yesterday, victory is not defined by defeating an opposing military force, but rather defeating their ability to pursue political objectives by violent, often unconventional, means. Increasingly, these unconventional means are based on asymmetries between the two opposing forces.
A plethora of definitions for the term ‘asymmetric conflict’ exist, but they can largely be summarized by a general idea that one side in a conflict, due to its own failings or its opponents’ strength, is unable to achieve its political aims through conventional (i.e. symmetric) military means. Because of this, the weaker side uses new ideas, weapons and tactics in a manner that is not expected, exploiting surprise to undermine the relative strength(s) of their opponent (Lele, 2014). The character of contemporary asymmetric threats can be analyzed through a framework of several key characteristics, which will be described in this paper. Understanding this framework, particularly in light of the horizontal transfer of technology, tactics, organization structure and procedures between emerging asymmetric threats may contribute to better understanding of such threats.
If the inline PDF is not rendering correctly, you can download the PDF file here.
Black J. 2016. Insurgency and Counterinsurgency: A Global History. Rowman and Littlefield Publishing Group: Maryland.
Brzica N. 2017. Potential Adherents of Radical Islam in Europe: methods of Recruitment and the Age of Perpetrators in Acts of Terror. Politička misao: časopis za politologiju 54(4) 161-184.
CACI International 2017. Global Snapshot April 2017. Available on www.asymmetricthreat.net
Cunningham W. 2001. Violent Conflict in Northern Ireland: Complex Life at the Edge of Chaos. George Mason University: Fairfax Virginia.
Dawoody A. R. 2016. Eradicating Terrorism from the Middle East. Policy and Administrative Approach. Springer International Publishing: Switzerland.
Forno R. and Joshi A. 2016. America is Dropping Cyberbombs-but how do they work? Available on: https://scroll.in/article/807965/america-is-dropping-cyberbombs-but-how-do-they-work [accessed 12 June 2018].
Frampton M. Fisher A. and Prucha N. 2017. The New Netwar. Policy Exchange: Westminster London.
Fredholm M. 2017. Transnational Organized Crime and Jihadist Terrorism. Russian-Speaking Networks in Western Europe. Routhledge: New York.
Galula D. 1964. Counterinsurgency Warefare – theory and practice. Praeger Security International: Westport CT.
Gunarathna Rohan. 2003. Inside Al Qaeda. Berkley Books: New York.
Hampsey R. 2010. Rediscovering the Art of Psychological Operations in the Afghan Counterinsurgency. Small Wars Journal.
Harris M. 2010. The use oft he Security Professionals in Counterinsurgency Operations. Available on: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA480183
Hartley D. 2017. Descriptions of Unconventional Conflict. In: Unconventional Conflict. Understanding Complex Systems. Springer: Cham.
Hartman W. 2002. Globalization and Asymmetrical Warfare. US Army. Maxwell Air Force Base Alabama. Available on: www.dtic.mil [accessed 17 December 2017].
Hayoun M. and Goldstein S. 2017. EMS Weapons of Mass Destruction and Related Injury. Einstein Healthcare Network October 06 2017.
Huba W. 2006. Traditional and Irregular War. US Army War College.
Katzman K. and Thomas C. 2017. Afghanistan: Post-Taliban Governance Security and U.S. Policy. Congressional Research Service Report. Available on: www.fas.org. [accessed 29 December 2017].
Landinfo. 2017. Report Afghanistan: Recruitment to Taliban. Available on: https://landinfo.no/asset/3588/1/3588_1.pdf
Lele A. 2014. Asymmetric Warfare: A State vs Non-State Conflict. OASIS 20 97-111.
Military Review. 2014. Command and General Staff School.
Miller M. 2014. Momentary Memorials: Political Posters of Lebanese Civil War and Hezbollah. University of Colorado.
Najetović Dž. 2011. Globalni terorizam i njegove implikacije na međunarodne odnose. Anali Pravnog Fakulteta u Zenici 215-227. Available on: https://www.scribd.com/document/92074745/Terorizam
Neumann P. 2008. Joining Al Qaeda: jihadist Recruitment in Europe. International Instutite for Strategic Studies: London.
Ravlić S. 2001. Politička ideologija preispitivanje pojma. Politička misao. 38(4):146-160.
Rynegeart C. 2017. Non-state Actors in International Law: A Rejoinder to Professor Thirlway. Netherlands International Law. April 2017 Vol.66/1 64: 155-162.
Shuck G. 2015. Online Jihadism. Global Security Studies. Baltimore Maryland. Available on: https://jscholarship.library.jhu.edu/bitstream/handle/1774.2/39436/SHUCK-THESIS-2015.pdf?sequence=1&isAllowed=y
Smit T. 2017. Multilateral Peace Operations and the Challenges od Terrorism and Violent Extremism. SIPRI Background Paper. November 2017. Available on: www.sipri.org.
Sokolsky R. 2017. The New NATO/Russia Military Balance. Implications for European Security. 17 March 2017. Carnegie Institute. Available on: http://carnegieendowment.org/2017/03/13/new-nato-russia-military-balance-implications-for-european-security-pub-68222. [accessed 17 January 2018].
Springer N. 2008. Implementing Population Centric COIN. Small Wars Journal 2008/6.
Stradiotto G. and Guo S. 2014. Democratic Transitions: Modes and Outcomes. Routledge: New York.
Telley C. 2018. A Coint for the Tsar: The Two Disruptive Sides of Cryptocurrency. The Smallwars Journal. January 15 2018. Available on: http://smallwarsjournal.com/jrnl/art/a-coin-for-the-tsar-the-two-disruptive-sides-of-cryptocurrency [accessed 20 January 2018].
Violence and Terrorism. 2004. 6th Ed. McGraw – Hill. New York.
Vukasović B. 2009. Nacionalna sigurnost i terorizam. Ministarstvo obrane RH. Zagreb. Vojno učilište «Petar Zrinski».
Winter C. 2017. Media Jihad: The Islamic State’s Doctrine for Information Warfare. The International Center for the Study of Radicalization and Political Violence. Institute for Strategic Dialogue.