Jump to ContentJump to Main Navigation
Secret Wars$
Users without a subscription are not able to see the full content.

Austin Carson

Print publication date: 2018

Print ISBN-13: 9780691181769

Published to Princeton Scholarship Online: May 2019

DOI: 10.23943/princeton/9780691181769.001.0001

Show Summary Details
Page of

PRINTED FROM PRINCETON SCHOLARSHIP ONLINE (www.princeton.universitypressscholarship.com). (c) Copyright Princeton University Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in PRSO for personal use.date: 28 June 2022

Conclusion

Conclusion

Chapter:
(p.283) 8 Conclusion
Source:
Secret Wars
Author(s):

Austin Carson

Publisher:
Princeton University Press
DOI:10.23943/princeton/9780691181769.003.0008

This chapter summarizes the key empirical findings and address extension of the basic argument to cyberconflict and violence within states (i.e., civil wars, terrorism). A consistent theme of the book is that the backstage of war sometimes features direct combat encounters by outside powers that were publicly understood to have avoided such entanglements. The chapter then presents a brief case study of a post-Cold War conflict: the Iranian covert weapons supply program during the U.S. occupation of Iraq (2003–2011). The U.S. occupation of Iraq and the Iranian covert intervention that followed suggest the links between limited war, covertness, and collusion continue to be relevant. Though conclusions about the case are necessarily preliminary, the chapter reviews this conflict to illustrate how the claims of the theory travel to a more recent case. It also addresses questions about the initial choice to intervene, mistakes and exploitation, and the possible implications of social media and leaks in the contemporary era. It concludes by discussing the implications of secrecy's role in escalation control for policy and scholarship.

Keywords:   cyberconflict, violence, civil wars, terrorism, direct combat, Iranian covert intervention, Iraq occupation, social media, secrecy, covertness, post-Cold War conflict

Princeton Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us.