This book analyzes U.S. pro-insurgency paramilitary operations (PMOs) or U.S. proxy warfare from the beginning of the Cold War to the present and explains why many of these operations either failed entirely to achieve their objective, or why they produced negative consequences that greatly diminished their benefits. The chapters cover important aspects of what PMOs are, the history of U.S. PMOs, how they function, the dilemmas of secrecy and accountability, the issues of control, criminal conduct, and disposal of proxies, as well as newer developments that may change PMOs in the future. The author argues that the general approach of conducting PMOs as covert operations is inherently flawed since it tends to undermine many possibilities for control over proxies in a situation where the interests of sponsors and proxies necessarily diverge on key issues.
Frequently asked questions
Simply head over to the account section in settings and click on âCancel Subscriptionâ - itâs as simple as that. After you cancel, your membership will stay active for the remainder of the time youâve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoâs features. The only differences are the price and subscription period: With the annual plan youâll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weâve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Why Paramilitary Operations Fail by Armin Krishnan in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & National Security. We have over one million books available in our catalogue for you to explore.
Department of Political Science, East Carolina University, Greenville, NC, USA
End Abstract
Paramilitary operations (PMOs), which are the manner in which to conduct proxy wars, can be best defined as âsecret war-like activitiesâ (Johnson 2012, 481). They typically consist of providing money, training, weapons, other materials, intelligence, leadership support, and sometimes additional fighters to nonstate proxy forces that are irregular, such as âspecific paramilitary forces, contractors, individuals, businesses, foreign political organizations, resistance or insurgent organizations, expatriates, transnational terrorism adversaries, disillusioned transnational terrorism members, black marketers, and other social or political âundesirablesââ in an effort to initiate or manipulate an (internal) armed conflict, or to achieve some other political, military, or economic objective (US DoD 2008, 1â3). According to Kennedy and Johnson administration National Security Advisor McGeorge Bundy,
a paramilitary operation is considered to be one which by its tactics and its requirements in military-type personnel, equipment and training, approximates a conventional military operation. It may be undertaken in support of an existing government friendly to the US or in support of a rebel group seeking to overthrow a government hostile to us. The US may render assistance to such operations overtly, covertly or by a combination of both methods. The small operations will often fall completely within the normal capability of one agency; the larger ones may affect State, Defense, CIA, USIA and possibly other departments and agencies. (US NSC 1961)
As indicated in this definition, PMOs can be used in both a pro-insurgency context (support to revolutionary or separatist movements) and in a counterinsurgency/counterterrorism context (support to an allied government/host nation to suppress an insurgency).1 Once PMOs reach a certain size, they would be typically supported by indirect nonmilitary US government activities (diplomatic pressure, propaganda , economic pressure, etc.), as well as possibly direct military intervention on behalf of a supported paramilitary group. Furthermore, PMOs may be tightly controlled by the sponsor recruiting and operationally leading indigenous fighters, or they may be autonomous operations, where âthe CIA would extend financial aid and a minimum of advice and guidanceâ so that the âleadership [of the resistance group] would possess a degree of operational self-determinationâ (US NSC 1964).
Covert Action and Special Operations
It is important to distinguish PMOs that are CIA/Pentagon covert actions from âspecial operationsâ or âclandestine operationsâ undertaken by uniformed US military personnel, although there has always been some overlap. Covert action is part of what is termed more broadly âspecial activities ,â which are defined in Executive Order 12333 as âactivities conducted in support of national foreign policy objectives abroad which are planned and executed so that the role of the United States Government is not apparent or acknowledged publiclyâ (US White House 1981, Art. 3.4, Para h). Special activities include actions such as âthe training of foreign military, security, and intelligence services; the provision of intelligence materials or special support to foreign governments; field support to operational counternarcotics and counterterrorism forces of a nation; exfiltration by sea or air of a sensitive defector; or rendering inert a cache of terrorist explosivesâ (Daugherty 2004, 15). Covert action includes the following types of activities: propaganda , political activity, economic activity sabotage, coups, PMOs, and cyber warfare.2 PMOs are therefore usually a specific type of covert action (unless they are part of a conventional military operation in which case proxies would only be considered to be auxiliaries). Since PMOs are âthe largest, most violent, and most dangerous covert actions,â they are undertaken less frequently than other types of covert action (Lowenthal 2013, 237). The Senate Select Committee report that investigated covert action in 1976 even suggested that âparamilitary activitiesâŠare an anomaly, if not an aberration, of covert action â (US Senate 1976, 1:154).
In contrast, the US DoD defines âspecial operationsâ as âoperations conducted in hostile, denied, politically sensitive environments to achieve military, diplomatic, and/or economic objectives employing military capabilities for which there is no broad conventional force requirement,â while âparamilitary forcesâ are defined as âforces or groups distinct from the regular armed forces of any country, but resembling them in organization, equipment, training or missionâ (Best and Feickert 2009, 1). Paramilitary operations are not supposed âto involve the use of oneâs own uniformed military personnel as combatantsâ since this would amount to an act of war (Lowenthal 2013, 238). However, in practice there can be some overlap as US military and paramilitary intelligence personnel is sometimes embedded in rebel or guerrilla groups and may get into situations where they have to directly participate in hostilities.3
Support to paramilitary organizations can include the following: funding, training, weapons, other materials (e.g. uniforms, trucks, supplies, etc.), advice and intelligence, operational leadership, and even supplying additional fighters (mercenaries, foreign fighters). Personnel planning and implementing paramilitary operations include CIA paramilitary officers, US military personnel seconded to the CIA, contract employees (e.g. security contractors), and foreign national personnel who are engaged in military-like activities (Clark 2015, 10â11). The Pentagon typically relies on Joint Special Operations Command (JSOC) and its attached clandestine military units (Seal Team 6, Intelligence Support Activity, Delta Force, etc.) to provide personnel for unacknowledged or clandestine operations (also known as âblack opsâ), such as PMOs.4 Typically, indigenous paramilitary groups would have only a few CIA or SOF personnel embedded to serve as advisors and liaison to US forces or other allied forces.
There are some important legal, operational, and oversight differences between covert action and special operations. CIA covert action is governed by Title 50 of the US Code and âspecialâ or âclandestine operationsâ of the US military are governed under Title 10 of the US Code (Wall 2011). âCovertâ refers here to the secrecy of the sponsor, while âclandestineâ refers to the secrecy of the operation itselfâcovert operations are expected to produce visible results, while clandestine operations are expected to remain completely secret (Kibbe 2007, 57). Whether an operation falls under Title 50 vs. Title 10 affects command authority, oversight, and budgeting with special operations generally being subject to less congressional oversight (Kibbe 2007, 57).
More recently, it has been pointed out that special operations and covert action have become blurred in the War on Terror (Kibbe 2007). However, this overlap of special operations and covert action is nothing new. The CIAâs predecessor organization OSS was a military organization operating under the command of the Joint Chiefs of Staff and specializing in espionage and covert warfare, working with guerrillas and resistance movements in occupied territories.5 After the war, SOF and covert action capability were formally separated. In practice, the Pentagon has frequently provided equipment and personnel to CIA-run PMOs, especially in the early Cold War when the CIA clearly lacked a stand-alone paramilitary capability.6 Sometimes the CIA and the Pentagon ran PMOs in parallel in the same theater, supporting different paramilitary groups (Table 1.1 and Diagram 1.1).7
Table 1.1
Unconventional warfare/foreign internal defense
From US DoD 2014. âFM 3â18: Special Forces Operations.â Department of the Army (May), pp. 3â8
Selection of Cases
For many reasons, it can be quite difficult to determine whether actually a US covert action has occurred since the activity itself may have been undertaken by an agency other than the CIA, may have been carried out by an ally or a private entity with tacit US government consent, or may have been limited to US ânonlethalâ or intelligence support. In order to clarify this important issue, the US Senate suggested in an investigative report:
If US government officials are simply told that some government intends to take a certain action and the US has played, or plays in the future, absolutely no further role in the matter, it has not engaged in covert action. If, on the other hand, US government officials instigate, facilitate and otherwise play a significant executory role in the action, even though it is carried out by entities other than the US government, their conduct approaches, if not crosses, the line into covert action. (Quoted from Hicks 2005, 253)
This means that for an activity to be characterized as a US covert action it requires that the US has instigated the activity, which may be carried out âby entities other...