Although the term "guerrilla warfare" was coined in the context of the Peninsular War in the 19th century, the tactical methods of guerrilla warfare have long been in use. In the 6th century BC, Sun Tzu proposed the use of guerrilla-style tactics in The Art of War. The 3rd century BC Roman general Quintus Fabius Maximus Verrucosus is also credited with inventing many of the tactics of guerrilla warfare through what is today called the Fabian strategy.
Guerrilla warfare has been used by various factions throughout history
and is particularly associated with revolutionary movements and popular
resistance against invading or occupying armies.
Guerrilla tactics
focus on avoiding head-on confrontations with enemy armies, typically
due to inferior arms or forces, and instead engage in limited skirmishes
with the goal of exhausting adversaries and forcing them to withdraw
(see also attrition warfare).
Organized guerrilla groups often depend on the support of either the
local population or foreign backers who sympathize with the guerrilla
group's efforts.
Etymology
The Spanish word guerrilla is the diminutive form of guerra ("war"); hence, "little war". The term became popular during the early-19th century Peninsular War, when, after the defeat of their regular armies, the Spanish and Portuguese people successfully rose against the Napoleonictroops and defeated a highly superior army using the guerrilla strategy in combination with a scorched earth policy and people's war (see also attrition warfare against Napoleon). In correct Spanish usage, a person who is a member of a guerrilla unit is a guerrillero ([geriˈʎeɾo]) if male, or a guerrillera ([geriˈʎeɾa]) if female. Arthur Wellesley adopted the term "guerrilla" into English from Spanish usage in 1809, to refer to the individual fighters (e.g., "I have recommended to set the Guerrillas to work"), and also (as in Spanish) to denote a group or band of such fighters. However, in most languages guerrilla still denotes a specific style of warfare. The use of the diminutive evokes the differences in number, scale, and scope between the guerrilla army and the formal, professional army of the state.
Prehistoric tribal warriors presumably employed guerrilla-style tactics against enemy tribes:
Primitive (and guerrilla) warfare
consists of war stripped to its essentials: the murder of enemies; the
theft or destruction of their sustenance, wealth, and essential
resources; and the inducement in them of insecurity and terror. It
conducts the basic business of war without recourse to ponderous
formations or equipment, complicated maneuvers, strict chains of
command, calculated strategies, timetables, or other civilized
embellishments.
Evidence of conventional warfare, on the other hand, did not emerge until 3100 BC in Egypt and Mesopotamia. The Chinese general and strategist Sun Tzu, in his The Art of War (6th century BC), became one of the earliest to propose the use of guerrilla warfare. This inspired developments in modern guerrilla warfare.
In the 3rd century BC, Quintus Fabius Maximus Verrucosus,
used elements of guerrilla warfare, such as the evasion of battle, the
attempt to wear down the enemy, to attack small detachments in an ambush and devised the Fabian strategy, which the Roman Republic used to great effect against Hannibal's army, see also His Excellency : George Washington: the Fabian choice.
In the medieval Roman Empire,
guerrilla warfare was frequently practiced between the eighth through
tenth centuries along the eastern frontier with the Umayyad and then
Abbasid caliphates. Tactics involved a heavy emphasis on reconnaissance
and intelligence, shadowing the enemy, evacuating threatened population
centres, and attacking when the enemy dispersed to raid. In the later tenth century this form of warfare was codified in a military manual known by its later Latin name as De velitatione bellica ('On Skirmishing') so it would not be forgotten in the future.
The Normans often made many forays into Wales, where the Welsh
used the mountainous region, which the Normans were unfamiliar with, to
spring surprise attacks upon them.
In the 17th century, Shivaji, founder of the Maratha Kingdom, pioneered the Shiva sutra or Ganimi Kava (Guerrilla Tactics) to defeat the many times larger and more powerful armies of the Mughal Empire.
Kerala Varma (Pazhassi Raja) (1753–1805) used guerrilla techniques chiefly centred in mountain forests in the Cotiote War against the British East India Company
in India between 1793 and 1806. Arthur Wellesley (in India 1797–1805)
had commanded forces assigned to defeat Pazhassi's techniques but
failed. It was the longest war waged by East India Company during their
military campaigns on the Indian subcontinent. It was one of the
bloodiest and hardest wars waged by East India Company in India with Presidency army regiments that suffered losses as high as eighty percent in 10 years of warfare.
The Dominican Restoration War was a guerrilla war between 1863 and 1865 in the Dominican Republic between nationalists and Spain, the latter of which had recolonized the country
17 years after its independence. The war resulted in the withdrawal of
Spanish forces and the establishment of a second republic in the
Dominican Republic.
The Moroccan military leader Abd el-Krim (c. 1883 – 1963) and his father unified the Moroccan tribes under their control and took up arms against the Spanish and French occupiers during the Rif War in 1920. For the first time in history, tunnel warfare was used alongside modern guerrilla tactics, which caused considerable damage to both the colonial armies in Morocco.
In the early 20th century Michael Collins and Tom Barry both developed many tactical features of guerrilla warfare during the guerrilla phase of the 1919–1921 Irish War of Independence. Collins developed mainly urban guerrilla-warfare tactics in Dublin City (the Irish capital). Operations in which small Irish Republican Army
(IRA) units (3 to 6 guerrillas) quickly attacked a target and then
disappeared into civilian crowds frustrated the British enemy. The best
example of this occurred on Bloody Sunday (21 November 1920), when Collins's assassination unit, known as "The Squad", wiped out a group of British intelligence agents ("the Cairo Gang")
early in the morning (14 were killed, six were wounded) – some regular
officers were also killed in the purge. That afternoon, a Royal Irish Constabulary force consisting of both regular RIC personnel and the Auxiliary Division took revenge, shooting into a crowd at a football match in Croke Park, killing fourteen civilians and injuring 60 others.
In West County Cork, Tom Barry was the commander of the IRA West Cork brigade.
Fighting in west Cork was rural, and the IRA fought in much larger
units than their fellows in urban areas. These units, called "flying columns", engaged British forces in large battles, usually for between 10 – 30 minutes. The Kilmichael Ambush in November 1920 and the Crossbarry Ambush in March 1921 are the most famous examples of Barry's flying columns causing large casualties to enemy forces.
The Algerian Revolution
of 1954 started with a handful of Algerian guerrillas. Primitively
armed, the guerrillas fought the French for over eight years. This
remains a prototype for modern insurgency and counterinsurgency,
terrorism, torture, and asymmetric warfare prevalent throughout the
world today. In South Africa, African National Congress (ANC) members studied the Algerian War, prior to the release and apotheosis of Nelson Mandela; in their intifada against Israel, Palestinian fighters have sought to emulate it. Additionally, the tactics of Al-Qaeda closely resemble those of the Algerians.
The Mukti Bahini (Bengali: মুক্তিবাহিনী, translates as "freedom
fighters", or liberation army), also known as the Bangladesh Forces, was
the guerrilla resistance movement consisting of the Bangladeshi
military, paramilitary and civilians during the Bangladesh Liberation War that transformed East Pakistan into Bangladesh in 1971. An earlier name Mukti Fauj was also used.
Theoretical works
The growth of guerrilla warfare was inspired in part by theoretical works on guerrilla warfare, starting with the Manual de Guerra de Guerrillas by Matías Ramón Mella written in the 19th century:
...our
troops should...fight while protected by the terrain...using small,
mobile guerrilla units to exhaust the enemy...denying them rest so that
they only control the terrain under their feet.
More recently, Mao Zedong's On Guerrilla Warfare, Che Guevara's Guerrilla Warfare, and Lenin's Guerrilla warfare,
were all written after the successful revolutions carried out by them
in China, Cuba and Russia, respectively. Those texts characterized the
tactic of guerrilla warfare as, according to Che Guevara's
text, being "used by the side which is supported by a majority but
which possesses a much smaller number of arms for use in defense against
oppression".
Why does the guerrilla fighter
fight? We must come to the inevitable conclusion that the guerrilla
fighter is a social reformer, that he takes up arms responding to the
angry protest of the people against their oppressors, and that he fights
in order to change the social system that keeps all his unarmed
brothers in ignominy and misery.
In the 1960s, the Marxist revolutionary Che Guevara developed the foco (Spanish: foquismo) theory of revolution in his book Guerrilla Warfare, based on his experiences during the 1959 Cuban Revolution. This theory was later formalised as "focal-ism" by Régis Debray. Its central principle is that vanguardism by cadres of small, fast-moving paramilitary groups can provide a focus for popular discontent against a sitting regime, and thereby lead a general insurrection. Although the original approach was to mobilize and launch attacks from rural areas, many foco ideas were adapted into urban guerrilla warfare movements.
Guerrilla warfare is a type of asymmetric warfare: competition between opponents of unequal strength. It is also a type of irregular warfare:
that is, it aims not simply to defeat an invading enemy, but to win
popular support and political influence, to the enemy's cost.
Accordingly, guerrilla strategy aims to magnify the impact of a small, mobile force on a larger, more cumbersome one. If successful, guerrillas weaken their enemy by attrition, eventually forcing them to withdraw.
Tactically, guerrillas usually avoid confrontation with large units and
formations of enemy troops but seek and attack small groups of enemy
personnel and resources to gradually deplete the opposing force while
minimizing their own losses. The guerrilla prizes mobility, secrecy, and
surprise, organizing in small units and taking advantage of terrain that is difficult for larger units to use. For example, Mao Zedong summarized basic guerrilla tactics at the beginning of the Chinese Civil War as:
"The enemy advances, we retreat; the enemy camps, we harass; the enemy tires, we attack; the enemy retreats, we pursue."
At least one author credits the ancient Chinese work The Art of War with inspiring Mao's tactics. In the 20th century, other communist leaders, including North Vietnamese Ho Chi Minh, often used and developed guerrilla warfare tactics, which provided a model for their use elsewhere, leading to the Cuban "foco" theory and the anti-SovietMujahadeen in Afghanistan.
Unconventional methods
Guerrilla groups may use improvised explosive devices and logistical
support by the local population. The opposing army may come at last to
suspect all civilians as potential guerrilla backers. The guerrillas
might get political support from foreign backers and many guerrilla
groups are adept at public persuasion through propaganda and use of force.
Some guerrilla movements today also rely heavily on children as
combatants, scouts, porters, spies, informants, and in other roles. Many governments and states also recruit children within their armed forces.
Comparison of guerrilla warfare and terrorism
No commonly accepted definition of "terrorism" has attained clear consensus. The term "terrorism" is often used as political propaganda by belligerents (most often by governments in power) to denounce opponents whose status as terrorists is disputed.
While the primary concern of guerrillas is the enemy's active military units, actual terrorists largely are concerned with non-military agents and target mostly civilians.
An insurgency is a violent, armed rebellion by small, lightly armed bands who practice guerrilla warfare against a larger authority. The key descriptive feature of insurgency is its asymmetric nature: small irregular forces face a large, well-equipped, regular military force state adversary.
Due to this asymmetry, insurgents avoid large-scale direct battles,
opting instead to blend in with the civilian population (often in rural areas) where they gradually expand territorial control and military forces. Insurgency frequently hinges on control of and collaboration with local populations.
An insurgency can be fought via counter-insurgency warfare, as well as other political, economic and social actions of various kinds.
Due to the blending of insurgents with the civilian population,
insurgencies tend to involve considerable violence against civilians (by
the state and the insurgents).
State attempts to quell insurgencies frequently lead to the infliction
of indiscriminate violence, whereas rebel control of territory
frequently involves violence against the civilian population. Insurgency sets itself apart from terrorism by aiming for political control rather than resorting to indiscriminate violence, however, it may incorporate terrorist tactics.
Where a revolt takes the form of armed rebellion, it may not be
viewed as an insurgency if a state of belligerency exists between one or
more sovereign states and rebel forces. For example, during the American Civil War, the Confederate States of America was not recognized
as a sovereign state, but it was recognized as a belligerent power, and
thus Confederate warships were given the same rights as United States
warships in foreign ports.
Sometimes there may be two or more simultaneous insurgencies (multipolar) occurring in a country. The Iraq insurgency is one example of a recognized government versus multiple groups of insurgents. Other historic insurgencies, such as the Russian Civil War, have been multipolar rather than a straightforward model made up of two sides. During the Angolan Civil War there were two main sides: MPLA and UNITA. At the same time, there was another separatist movement for the independence of the Cabinda region headed up by FLEC. Multipolarity extends the definition of insurgency to situations where there is no recognized authority, as in the Somali Civil War, especially the period from 1998 to 2006, where it broke into quasi-autonomous smaller states, fighting among one another in changing alliances.
Definition
James Fearon and David Laitin define insurgency as "a technology of
military conflict characterized by small, lightly armed bands practicing
guerrilla warfare from rural base areas."
Austin Long defines insurgency as "the use of political and military
means by irregular forces to change an existing political order. These
forces typically mingle with civilians in order to hide from the forces
defending the political order." According to Matthew Adam Kocher, Thomas Pepinsky and Stathis Kalyvas, a central objective in insurgencies is to achieve control over civilians.
To exercise control armed groups apply a variety of practices,
including different types of violence, dispute resolution, taxation,
regulation of movement, access to aid and services, and social
strictures.
Insurgency and civil wars
According to James D. Fearon,
wars have a rationalist explanation behind them, which explains why
leaders prefer to gamble in wars and avoid peaceful bargains.
Fearon states that intermediate bargains can be a problem because
countries cannot easily trade territories with the spread of
nationalism. Furthermore, wars can take the form of civil wars. In her article Why Bad Governance Leads to Civil Wars,Barbara F. Walter
has presented a theory that explains the role of strong institutions in
preventing insurgencies that can result in civil wars. Walter believes
that institutions can contribute to four goals.
Institutions are responsible for checking the government,
creating multiple peaceful routes to help the government solve problems,
making the government committed to political terms that entails
preserving peace, and creating an atmosphere where rebels do not need to
form militias.
Furthermore, Walter adds that if there is a conflict between the
government and the insurgents in the form of a civil war, that can bring
about a new government that is accountable to a wider range of people,
who have to commit to a compromise in political bargains. According to
Walter, the presence of strong influential institutions can be
beneficial to prevent the repetition of civil wars, but autocratic governments
are less likely to accept the emergence of strong institutions because
of their resulting constraint of governmental corruption and privileges.
In her book, Insurgent Collective Action and Civil War in Salvador, Elisabeth Jean Wood explains that participants in high-risk activism are very aware of the costs and benefits of engaging in civil wars. Wood suggests that "participants in the 1964 Freedom Summer campaign in the USSouth ran high risks of bodily harm in challenging the long-standing practices of racial exclusion in Mississippi."
There are many selective incentives that encourage insurgency and
violent movements against autocratic political regimes. For example, the
supply of safety as a material good can be provided by the insurgents,
which abolishes the exploitation of the government and thus forms one of
the main incentives. The revolutionary power can help manifest a
social-political network that in return provides access to political
opportunities to diverse candidates, who share a collective identity and
cultural homogeneity. Also, civil wars and insurgencies can provide
employment and access to services and resources that were once taken
over by the autocratic regimes.
Tactics
Insurgencies
differ in their use of tactics and methods. In a 2004 article, Robert
R. Tomes spoke of four elements that "typically encompass an
insurgency":
cell-networks that maintain secrecy
terrorism used to foster insecurity among the population and drive them to the insurgents for protection
multifaceted attempts to cultivate support in the general population, often by undermining the new regime
attacks against the government
Tomes' is an example of a definition that does not cover all insurgencies. For example, the French Revolution had no cell system, and in the American Revolution, little to no attempt was made to terrorize civilians. In consecutive coups
in 1977 and 1999 in Pakistan, the initial actions focused internally on
the government rather than on seeking broad support. While Tomes'
definition fits well with Mao's Phase I,
it does not deal well with larger civil wars. Mao does assume terrorism
is usually part of the early phases, but it is not always present in
revolutionary insurgency.
Tomes offers an indirect definition of insurgency, drawn from Trinquier's
definition of counterinsurgency: "an interlocking system of
actions—political, economic, psychological, military—that aims at the
[insurgents' intended] overthrow of the established authority in a
country and its replacement by another regime."
Steven Metz
observes that past models of insurgency do not perfectly fit modern
insurgency, in that current instances are far more likely to have a
multinational or transnational character than those of the past. Several
insurgencies may belong to more complex conflicts, involving "third
forces (armed groups which affect the outcome, such as militias) and
fourth forces (unarmed groups which affect the outcome, such as
international media), who may be distinct from the core insurgents and
the recognized government. While overt state sponsorship becomes less
common, sponsorship by transnational groups is more common. "The nesting
of insurgency within complex conflicts associated with state weakness
or failure..." (See the discussion of failed states below.) Metz
suggests that contemporary insurgencies have far more complex and
shifting participation than traditional wars, where discrete
belligerents seek a clear strategic victory.
Many insurgencies include terrorism. While there is no accepted definition of terrorism in international law, United Nations-sponsored working definitions include one drafted by Alex P. Schmid
for the Policy Working Group on the United Nations and Terrorism.
Reporting to the Secretary-General in 2002, the Working Group stated the
following:
Without attempting a comprehensive
definition of terrorism, it would be useful to delineate some broad
characteristics of the phenomenon. Terrorism is, in most cases,
essentially a political act. It is meant to inflict dramatic and deadly
injury on civilians and to create an atmosphere of fear, generally for a
political or ideological (whether secular or religious) purpose.
Terrorism is a criminal act, but it is more than mere criminality. To
overcome the problem of terrorism it is necessary to understand its
political nature as well as its basic criminality and psychology. The
United Nations needs to address both sides of this equation.
Yet another conflict of definitions involves insurgency versus terrorism. The winning essay of the 24th Annual United StatesChairman of the Joint Chiefs of Staff
Strategic Essay Contest, by Michael F. Morris, said [A pure terrorist
group] "may pursue political, even revolutionary, goals, but their
violence replaces rather than complements a political program."
Morris made the point that the use, or non-use, of terrorism does not
define insurgency, "but that organizational traits have traditionally
provided another means to tell the two apart. Insurgencies normally
field fighting forces orders of magnitude larger than those of terrorist
organizations." Insurgencies have a political purpose, and may provide
social services and have an overt, even legal, political wing. Their
covert wing carries out attacks on military forces with tactics such as raids and ambushes, as well as acts of terror such as attacks that cause deliberate civilian casualties.
Mao considered terrorism a basic part of his first part of the three phases of revolutionary warfare. Several insurgency models recognize that completed acts of terrorism widen the security gap; the Marxist guerrilla theoretician Carlos Marighella
specifically recommended acts of terror, as a means of accomplishing
something that fits the concept of opening the security gap. Mao considered terrorism to be part of forming a guerrilla movement.
While not every insurgency involves terror, most involve an equally
hard to define tactic, subversion. "When a country is being subverted it
is not being outfought; it is being out-administered. Subversion is
literally administration with a minus sign in front."
The exceptional cases of insurgency without subversion are those where
there is no accepted government that is providing administrative
services.
While the term "subversion" is less commonly used by current U.S.
spokesmen, that may be due to the hyperbolic way it was used in the
past, in a specifically anticommunist context. U.S. Secretary of StateDean Rusk
did in April 1962, when he declared that urgent action was required
before the "enemy's subversive politico-military teams find fertile
spawning grounds for their fish eggs."
In a Western context, Rosenau cites a British Secret Intelligence Service definition as "a generalized intention to (emphasis added) "overthrow or undermine
parliamentary democracy by political, industrial or violent means."
While insurgents do not necessarily use terror, it is hard to imagine
any insurgency meeting its goals without undermining aspects of the
legitimacy or power of the government or faction it opposes. Rosenau
mentions a more recent definition that suggests subversion includes
measures short of violence, which still serve the purposes of
insurgents. Rarely, subversion alone can change a government; this arguably happened in the liberalization of Eastern Europe. To the Communist government of Poland, Solidarity appeared subversive but not violent.
Political rhetoric, myths and models
In arguing against the term Global War on Terror, Francis Fukuyama said the United States was not fighting terrorism generically, as in Chechnya or Palestine.
Rather, he said the slogan "war on terror" is directed at "radical
Islamism, a movement that makes use of culture for political
objectives." He suggested it might be deeper than the ideological
conflict of the Cold War, but it should not be confused with Samuel Huntington's "clash of civilizations." Addressing Huntington's thesis, Fukuyama stressed that the US and its allies need to focus on specific radical groups rather than clash with global Islam.
Fukuyama argued that political means, rather than direct military
measures, are the most effective ways to defeat that insurgency. David Kilcullen
wrote "We must distinguish Al Qa'eda and the broader militant movements
it symbolises – entities that use terrorism – from the tactic of
terrorism itself."
There may be utility in examining a war not specifically on the
tactic of terror but in co-ordination among multiple national or
regional insurgencies. It may be politically infeasible to refer to a
conflict as an "insurgency" rather than by some more charged term, but
military analysts, when concepts associated with insurgency fit, should
not ignore those ideas in their planning. Additionally, the
recommendations can be applied to the strategic campaign, even if it is
politically unfeasible to use precise terminology.
Insurgent groups often struggle to maintain coherency and authority due
to their decentralized nature, and thus rely heavily upon ethnic,
religious, or ideological bounds to avoid splintering.
While it may be reasonable to consider transnational insurgency,
Anthony Cordesman points out some of the myths in trying to have a
worldwide view of terror:
Cooperation can be based on trust and common values: one man's terrorist is another man's freedom fighter.
A definition of terrorism exists that can be accepted by all.
Intelligence can be freely shared.
Other states can be counted on to keep information secure and use it to mutual advantage.
International institutions are secure and trustworthy.
Internal instability and security issues do not require compartmentation and secrecy at national level.
The "war on terrorism" creates common priorities and needs for action.
Global and regional cooperation is the natural basis for international action.
Legal systems are compatible enough for cooperation.
Human rights and rule of law differences do not limit cooperation.
Most needs are identical.
Co-operation can be separated from financial needs and resources.
Social scientists, soldiers, and sources of change have been modeling insurgency for nearly a century if one starts with Mao.
Counterinsurgency models, not mutually exclusive from one another, come
from Kilcullen, McCormick, Barnett and Eizenstat. Kilcullen describes
the "pillars" of a stable society, while Eizenstat addresses the "gaps"
that form cracks in societal stability. McCormick's model shows the
interplay among the actors: insurgents, government, population and
external organizations. Barnett discusses the relationship of the
country with the outside world, and Cordesman focuses on the specifics
of providing security.
Recent studies have tried to model the conceptual architecture of
insurgent warfare using computational and mathematical modelling. A
recent study by Juan Camilo Bohorquez, Sean Gourley, Alexander R. Dixon,
Michael Spagat, and Neil F. Johnson entitled "Common Ecology Quantifies
Human Insurgency", suggests a common structure for 9 contemporary
insurgent wars, supported on statistical data of more than 50,000
insurgent attacks. The model explains the recurrent statistical pattern found in the distribution of deaths in insurgent and terrorist events.
Kilcullen's pillars
Kilcullen describes a framework for counterinsurgency. He gives a visual overview
of the actors in his model of conflicts, which he represents as a box
containing an "ecosystem" defined by geographic, ethnic, economic,
social, cultural, and religious characteristics. Inside the box are,
among others, governments, counterinsurgent forces, insurgent leaders,
insurgent forces, and the general population, which is made up of three
groups:
those committed to the insurgents;
those committed to the counterinsurgents;
those who simply wish to get on with their lives.
Often, but not always, states or groups that aid one side or the
other are outside the box. Outside-the-box intervention has dynamics of
its own.
The counterinsurgency strategy can be described as efforts to end
the insurgency by a campaign developed in balance along three
"pillars": security, political, and economical.
"Obviously enough, you cannot command what you do not control. Therefore, unity of command
(between agencies or among government and non-government actors) means
little in this environment." Unity of command is one of the axioms of
military doctrine that change with the use of swarming. In Edwards' swarming model, as in Kilcullen's mode, unity of command becomes "unity of effort at best, and collaboration or deconfliction at least."
As in swarming, in Kilcullen's view unity of effort "depends less
on a shared command and control hierarchy, and more on a shared
diagnosis of the problem (i.e., the distributed knowledge of swarms),
platforms for collaboration, information sharing and deconfliction. Each
player must understand the others' strengths, weaknesses, capabilities
and objectives, and inter-agency teams must be structured for
versatility (the ability to perform a wide variety of tasks) and agility
(the ability to transition rapidly and smoothly between tasks)."
Eizenstat and closing gaps
Insurgencies, according to Stuart Eizenstat grow out of "gaps". To be viable, a state must be able to close three "gaps", of which the first is most important:
Security: protection "... against internal and external threats,
and preserving sovereignty over territory. If a government cannot
ensure security, rebellious armed groups or criminal nonstate actors may
use violence to exploit this security gap—as in Haiti, Nepal, and
Somalia."
Capacity: the survival needs of water, electrical power, food and
public health, closely followed by education, communications and a
working economic system.
"An inability to do so creates a capacity gap, which can lead to a loss
of public confidence and then perhaps political upheaval. In most environments, a capacity gap coexists with—or even grows out of—a security gap.
In Afghanistan and the Democratic Republic of the Congo, for example,
segments of the population are cut off from their governments because of
endemic insecurity. And in postconflict Iraq, critical capacity gaps
exist despite the country's relative wealth and strategic importance."
Legitimacy: closing the legitimacy gap is more than an incantation
of "democracy" and "elections", but a government that is perceived to
exist by the consent of the governed, has minimal corruption, and has a working law enforcement and judicial system that enforce human rights.
Note the similarity between Eizenstat's gaps and Kilcullen's three pillars.
In the table below, do not assume that a problematic state is unable to
assist less developed states while closing its own gaps.
McCormick's model
is designed as a tool for counterinsurgency (COIN), but develops a
symmetrical view of the required actions for both the Insurgent and COIN
forces to achieve success. In this way the counterinsurgency model can
demonstrate how both the insurgent and COIN forces succeed or fail. The
model's strategies and principle apply to both forces, therefore the
degree the forces follow the model should have a direct correlation to
the success or failure of either the Insurgent or COIN force.
The model depicts four key elements or players:
Insurgent force
Counterinsurgency force (i.e., the government)
Population
International community
All of these interact, and the different elements have to assess their best options in a set of actions:
Gaining support of the population
Disrupt opponent's control over the population
Direct action against opponent
Disrupt opponent's relations with the international community
Establish relationships with the international community
Barnett and connecting to the core
In Thomas Barnett's paradigm,
the world is divided into a "connected core" of nations enjoying a high
level of communications among their organizations and individuals, and
those nations that are disconnected internally and externally. In a
reasonably peaceful situation, he describes a "system administrator"
force, often multinational, which does what some call "nation-building",
but, most importantly, connects the nation to the core and empowers the
natives to communicate—that communication can be likened to swarm
coordination. If the state is occupied, or in civil war, another
paradigm comes into play: the leviathan, a first-world military force
that takes down the opposition regular forces. Leviathan is not
constituted to fight local insurgencies, but major forces. Leviathan may
use extensive swarming
at the tactical level, but its dispatch is a strategic decision that
may be made unilaterally, or by an established group of the core such as
NATO or ASEAN.
Cordesman and security
Other
than brief "Leviathan" takedowns, security building appears to need to
be regional, with logistical and other technical support from more
developed countries and alliances (e.g., ASEAN, NATO). Noncombat
military assistance in closing the security gap begins with training,
sometimes in specialized areas such as intelligence. More direct, but
still noncombat support, includes intelligence, planning, logistics and
communications.
Anthony Cordesman notes that security requirements differ by
region and state in region. Writing on the Middle East, he identified
different security needs for specific areas, as well as the US interest
in security in those areas.
In North Africa, the US focus should be on security cooperation in achieving regional stability and in counterterrorism.
In the Levant, the US must largely compartment security cooperation with Israel and cooperation with friendly Arab states like Egypt, Jordan, and Lebanon, but can improve security cooperation with all these states.
In the Persian Gulf,
the US must deal with the strategic importance of a region whose
petroleum and growing gas exports fuel key elements of the global
economy.
It is well to understand that counterterrorism, as used by Cordesman,
does not mean using terrorism against the terrorism, but an entire
spectrum of activities, nonviolent and violent, to disrupt an opposing
terrorist organization. The French general, Joseph Gallieni, observed,
while a colonial administrator in 1898,
A country is not conquered and
pacified when a military operation has decimated its inhabitants and
made all heads bow in terror; the ferments of revolt will germinate in
the mass and the rancours accumulated by the brutal action of force will
make them grow again
Both Kilcullen and Eizenstat define a more abstract goal than does
Cordesman. Kilcullen's security pillar is roughly equivalent to
Eizenstat's security gap:
Military security (securing the population from attack or intimidation by guerrillas, bandits, terrorists or other armed groups)
Police security (community policing, police intelligence or "Special Branch" activities, and paramilitary police field forces).
Human security, building a framework of human rights, civil
institutions and individual protections, public safety (fire, ambulance,
sanitation, civil defense) and population security.
This pillar most engages military
commanders' attention, but of course military means are applied across
the model, not just in the security domain, while civilian activity is
critically important in the security pillar also ... all three pillars
must develop in parallel and stay in balance, while being firmly based
in an effective information campaign.
Anthony Cordesman, while speaking of the specific situation in Iraq,
makes some points that can be generalized to other nations in turmoil. Cordesman recognizes some value in the groupings in Samuel P. Huntington's idea of the clash of civilizations,
but, rather assuming the civilizations must clash, these civilizations
simply can be recognized as actors in a multinational world. In the case
of Iraq, Cordesman observes that the burden is on the Islamic
civilization, not unilaterally the West, if for no other reason that the
civilization to which the problematic nation belongs will have cultural
and linguistic context that Western civilization cannot hope to equal.
The heart of strengthening weak nations must come from within,
and that heart will fail if they deny that the real issue is the future
of their civilization, if they tolerate religious, cultural or
separatist violence and terrorism when it strikes at unpopular targets,
or if they continue to try to export the blame for their own failures to
other nations, religions, and cultures.
Asymmetric and irregular conflicts
Asymmetric conflicts (or irregular conflicts), as the emerging type of insurgencies in recent history, is described by Berman and Matanock in their review as conflicts where "the government forces have a clear advantage over rebels in coercive capacity."
In this kind of conflicts, rebel groups can reintegrate into the
civilian population after an attack if the civilians are willing to
silently accept them. Some of the most recent examples include the
conflicts in Afghanistan and Iraq.
As the European countries intervenes in the conflicts, creating
asymmetry between the government forces and rebels, asymmetric conflict
is the most common form of subnational conflicts and the most civil
conflicts where the western countries are likely to be involved. Such
interventions and their impacts can be seen in the NATO operation in Libya in 2011 and the French-led intervention in Mali in 2013.
Berman and Matanock suggested an information-centric framework to describe asymmetric conflicts on a local level.
Three parties are involved in framework: government forces, rebels and
civilians. Government forces and rebels attack each other and may
inadvertently harm civilians whereas civilians can anonymously
share local information with government forces, which would allow
government forces to effectively use their asymmetric advantage to
target rebels. Taking the role of civilians in this framework into
consideration, the government and rebels will divert resources to
provide services to civilians so as to influence their decision about
sharing information with the government.
The framework is based on several assumptions:
The consequential action of civilians is information sharing.
Information can be shared anonymously without endangering the
civilians who do so and civilians are assumed to respond to incentives.
Neither side of government forces and rebels will actively target civilians with coercion or intimidation.
This framework leads to five major implications for counterinsurgency strategies:
The government and rebels have an incentive to provide services
to civilians, which increases with the value of the information shared.
Rebel violence may be reduced by service provision from the government.
Projects that address the needs of the civilians in the local
communities and conditioned on information sharing by the community are
more effective in reducing rebel violence. In practice, these may be
smaller projects that are developed through consultation with local
communities, which are also more easily revoked when information is not
shared.
Innovations that increase the value of projects to local civilians,
such as including development professionals in project design and
implementation, will enhance the effect of violence-reducing.
Security provided by the government and service provision (i.e. development spending) are complementary activities.
If either side of the government forces or rebels causes casualties
among civilians, civilians will reduce their support for that side.
Innovations that make anonymous tips to the government easier, of which are often technical, can reduce rebel violence.
These implications are tested by empirical evidences from conflicts
in Afghanistan, Iraq and several other subnational conflicts. Further
research on governance, rule of law, attitudes, dynamics and agency between allies are needed to better understand asymmetric conflicts and to have better informed decisions made at the tactical, strategic and public policy levels.
Before one counters an insurgency, one must understand what one is
countering. Typically the most successful counter-insurgencies have been
the British in the Malay Emergency and the Filipino government's countering of the Huk Rebellion. In the Philippine–American War,
U.S. forces successfully quelled the Filipino insurgents by 1902,
albeit with tactics considered unacceptable by the majority of modern
populations.
William Shakespeare (1564–1616) wrote sonnets
on a variety of themes. When discussing or referring to Shakespeare's
sonnets, it is almost always a reference to the 154 sonnets that were
first published all together in a quarto in 1609. However, there are six additional sonnets that Shakespeare wrote and included in the plays Romeo and Juliet, Henry V and Love's Labour's Lost. There is also a partial sonnet found in the play Edward III.
Context
Shakespeare's sonnets are considered a continuation of the sonnet tradition that swept through the Renaissance from Petrarch in 14th-century Italy and was finally introduced in 16th-century England by Thomas Wyatt and was given its rhyming metre and division into quatrains by Henry Howard. With few exceptions, Shakespeare's sonnets observe the stylistic form of the English sonnet—the rhyme scheme, the 14 lines, and the metre. But, Shakespeare's sonnets introduce significant departures of content.
Instead of expressing worshipful love for an almost goddess-like yet unobtainable female love-object, as Petrarch, Dante, and Philip Sidney had done, Shakespeare introduces a young man. He also introduces the Dark Lady. Shakespeare explores themes such as lust, homoeroticism, misogyny, infidelity, and acrimony.
The quarto of 1609
The primary source of Shakespeare's sonnets is a quarto published in 1609 titled Shake-speare's Sonnets. It contains 154 sonnets, which are followed by the long poem "A Lover's Complaint".
Thirteen copies of the quarto have survived in fairly good shape. There
is evidence in a note on the title page of one of the extant copies
that the great Elizabethan actor Edward Alleyn bought a copy in June 1609 for one shilling.
The sonnets cover such themes as the passage of time, love,
infidelity, jealousy, beauty and mortality. The first 126 are addressed
to a young man; the last 28 are either addressed to, or refer to, a
woman. (Sonnets 138 and 144 had previously been published in the 1599 miscellanyThe Passionate Pilgrim.)
The title of the quarto, Shake-speare's Sonnets, is consistent with the entry in the Stationers' Register.
The title appears in upper case lettering on the title page, where it
is followed by the phrase "Neuer before Imprinted". The title also
appears every time the quarto is opened. That the author's name in a
possessive form is part of the title sets it apart from all other sonnet
collections of the time, except for one—Sir Philip Sidney's posthumous 1591 publication that is titled, Syr. P.S. his Astrophel and Stella,
which is considered one of Shakespeare's most important models.
Sidney's title may have inspired Shakespeare, particularly if the "W.H."
of Shakespeare's dedication is Sidney's nephew and heir, William Herbert.
The idea that the persona referred to as the speaker of Shakespeare's
sonnets might be Shakespeare himself, is aggressively repudiated by
scholars; however, the title of the quarto does seem to encourage that
kind of speculation.
The first 17 poems, traditionally called the procreation sonnets,
are addressed to the young man—urging him to marry and have children in
order to immortalize his beauty by passing it to the next generation.
Other sonnets express the speaker's love for the young man; brood upon
loneliness, death, and the transience of life; seem to criticise the
young man for preferring a rival poet; express ambiguous feelings for
the speaker's mistress; and pun on the poet's name. The final two sonnets are allegorical treatments of Greek epigrams referring to the "little love-god" Cupid.
The publisher, Thomas Thorpe, entered the book in the Stationers' Register on 20 May 1609:
Tho. Thorpe. Entred for his copie under the handes of master
Wilson and master Lownes Wardenes a booke called Shakespeares sonnettes
vjd.
Whether Thorpe used an authorised manuscript from Shakespeare or an unauthorised copy is unknown. George Eld printed the quarto, and the run was divided between the booksellers William Aspley and John Wright.
Dedication
Shakespeare's Sonnets include a dedication to "Mr. W.H.":
The upper case letters and the stops that follow each word of the dedication were probably intended to resemble an ancient Romanlapidary inscription or monumental brass, perhaps accentuating the declaration in Sonnet 55 that the work would confer immortality to the subjects of the work:
Not marble, nor the gilded monuments
Of princes shall outlive this pow'rful rhyme
The initials "T.T." are taken to refer to the publisher, Thomas
Thorpe. Thorpe usually signed prefatory matter only if the author was
out of the country or dead, which suggests that Shakespeare was not in
London during the last stage of printing. However, Thorpe's entire corpus of such consists of only four dedications and three prefaces.
It has been suggested that Thorpe signing the dedication, rather than
the author, might indicate that Thorpe published the work without
obtaining Shakespeare's permission.
Though Thorpe's taking on the dedication may be explained by the great
demands of business and travel that Shakespeare was facing at this time,
which may have caused him to deal with the printing production in haste
before rushing out of town.
After all, May 1609 was an extraordinary time: That month saw a serious
outbreak of the plague, which shut down the theatres, and also caused
many to flee London. Plus Shakespeare's theatre company was on tour from
Ipswich to Oxford. In addition, Shakespeare had been away from
Stratford and in the same month, May, was being called on to tend to
family and business there, and deal with the litigation of a lawsuit in Warwickshire that involved a substantial amount of money.
Mr. W. H., the dedicatee
The identity of Mr. W.H., "the only begetter of Shakespeare's Sonnets",
is not known for certain. His identity has been the subject of a great
amount of speculation: That he was the author's patron, that he was both
patron and the "faire youth" who is addressed in the sonnets, that the
"faire youth" is based on Mr. W.H. in some sonnets but not others, and a
number of other ideas.
William Herbert, the Earl of Pembroke, is seen as perhaps the most likely identity of Mr. W.H. and the "young man". He was the dedicatee of the First Folio. Thorpe would have been unlikely to have addressed a lord as "Mr",
but there may be an explanation, perhaps that form of address came from
the author, who wanted to refer to Herbert at an earlier time—when
Herbert was a "younger man". There is a later dedication to Herbert in another quarto of verse, Ben Jonson's Epigrammes
(1616), in which the text of Jonson's dedication begins, "MY LORD,
While you cannot change your merit, I dare not change your title … "
Jonson's emphasis on Pembroke's title, and his comment, seem to be
chiding someone else who had the audacity to use the wrong title, as
perhaps is the case in Shakespeare's dedication.
William Hall, a printer who had worked with Thorpe.
It is noted that "ALL" following "MR. W. H." spells "MR. W. HALL".
Using his initials W.H., Hall had edited a collection of the poems of Robert Southwell that was printed by George Eld, the printer of the 1609 Sonnets.
Who He. It has been argued that the dedication is deliberately
ambiguous, possibly standing for "Who He", a conceit also used in a
contemporary pamphlet. It might have been created by Thorpe to encourage
speculation and discussion (and hence, sales).
Willie Hughes. The 18th-century scholar Thomas Tyrwhitt proposed "William Hughes", based on puns on the name in the sonnets (notably Sonnet 20). This idea is expressed in Oscar Wilde's short story "The Portrait of Mr. W. H.", and that the sonnets were written to a young actor who played female roles in Shakespeare's plays.
Form and structure of the sonnets
The sonnets are almost all constructed using three quatrains (four-line stanzas) followed by a final couplet. The sonnets are composed in iambic pentameter, the metre used in Shakespeare's plays.
The rhyme
scheme is ABAB CDCD EFEF GG. Sonnets using this scheme are known as
Shakespearean sonnets, or English sonnets, or Elizabethan sonnets.
Often, at the end of the third quatrain occurs the volta ("turn"), where the mood of the poem shifts, and the poet expresses a turn of thought.
The exceptions are sonnets 99, 126, and 145. Number 99 has fifteen lines. Number 126 consists of six couplets, and two blank lines marked with italic brackets; 145 is in iambic tetrameters, not pentameters. In one other variation on the standard structure, found for example in sonnet 29, the rhyme scheme is changed by repeating the second (B) rhyme of quatrain one as the second (F) rhyme of quatrain three.
Apart from rhyme, and considering only the arrangement of ideas,
and the placement of the volta, a number of sonnets maintain the
two-part organization of the Italian sonnet. In that case the term
"octave" and "sestet" are commonly used to refer to the sonnet's first
eight lines followed by the remaining six lines. There are other
line-groupings as well, as Shakespeare finds inventive ways with the
content of the fourteen-line poems.
Characters of the sonnets
When
analysed as characters, the subjects of the sonnets are usually
referred to as the Fair Youth, the Rival Poet, and the Dark Lady. The
speaker expresses admiration for the Fair Youth's beauty, and—if reading
the sonnets in chronological order as published—later has an affair
with the Dark Lady, then so does the Fair Youth. Current linguistic
analysis and historical evidence suggests, however, that the sonnets to
the Dark Lady were composed first (around 1591–95), the procreation
sonnets next, and the later sonnets to the Fair Youth last (1597–1603).
It is not known whether the poems and their characters are fiction or
autobiographical; scholars who find the sonnets to be autobiographical
have attempted to identify the characters with historical individuals.
Fair Youth
The "Fair Youth" is the unnamed young man addressed by the devoted poet in the greatest sequence of the sonnets (1–126).
The young man is handsome, self-centred, universally admired and much
sought after. The sequence begins with the poet urging the young man to
marry and father children (sonnets 1–17). It continues with the
friendship developing with the poet's loving admiration, which at times
is homoerotic in nature. Then comes a set of betrayals by the young man,
as he is seduced by the Dark Lady, and they maintain a liaison (sonnets
133, 134 & 144), all of which the poet struggles to abide. It
concludes with the poet's own act of betrayal, resulting in his
independence from the fair youth (sonnet 152).
The identity of the Fair Youth has been the subject of speculation among scholars. One popular theory is that he was Henry Wriothesley,
the 3rd Earl of Southampton; this is based in part on the idea that his
physical features, age, and personality might fairly match the young
man in the sonnets. He was both an admirer and patron of Shakespeare and was considered one of the most prominent nobles of the period. It is also noted that Shakespeare's 1593 poem Venus and Adonis
is dedicated to Southampton and, in that poem a young man, Adonis, is
encouraged by the goddess of love, Venus, to beget a child, which is a
theme in the sonnets. Here are the verses from Venus and Adonis:
Torches are made to light, jewels to wear,
Dainties to taste, fresh beauty for the use,
Herbs for their smell, and sappy plants to bear;
Things growing to themselves are growth's abuse,
Seeds spring from seeds, and beauty breedeth beauty;
Thou wast begot; to get it is thy duty.
Upon the earth's increase why shouldst thou feed,
Unless the earth with thy increase be fed?
By law of nature thou art bound to breed,
That thine may live when thou thyself art dead;
And so in spite of death thou dost survive,
In that thy likeness still is left alive.
Venus and Adonis
A problem with identifying the fair youth with Southampton is that
the most certainly datable events referred to in the Sonnets are the
fall of Essex and then the gunpowder plotters' executions in 1606, which
puts Southampton at the age of 33, and then 39 when the sonnets were
published, when he would be past the age when he would be referred to as
a "lovely boy" or "fair youth".
Authors such as Thomas Tyrwhitt and Oscar Wilde
proposed that the Fair Youth was William Hughes, a seductive young
actor who played female roles in Shakespeare's plays. Particularly,
Wilde claimed that he was the Mr. W.H. referred to in the dedication attached to the manuscript of the Sonnets.
The Dark Lady sequence (sonnets 127–152) is the most defiant of the
sonnet tradition. The sequence distinguishes itself from the Fair Youth
sequence with its overt sexuality (Sonnet 151).
The Dark Lady is so called because she has black hair and "dun" skin.
The Dark Lady suddenly appears (Sonnet 127), and she and the speaker of
the sonnets, the poet, are in a sexual relationship. She is not
aristocratic, young, beautiful, intelligent or chaste. Her complexion is
muddy, her breath "reeks", and she is ungainly when she walks. The
relationship strongly parallels Touchstone's pursuit of Audrey in As You Like It.
The Dark Lady presents an adequate receptor for male desire. She is
celebrated in cocky terms that would be offensive to her, not that she
would be able to read or understand what is said. Soon the speaker
rebukes her for enslaving his fair friend (sonnet 133). He can't abide
the triangular relationship, and it ends with him rejecting her. As with the Fair Youth, there have been many attempts to identify her with a real historical individual. Lucy Negro, Mary Fitton, Emilia Lanier, Elizabeth Wriothesley, and others have been suggested.
The Rival Poet's identity remains a mystery. If Shakespeare's patron
and friend was Pembroke, Shakespeare was not the only poet who praised
his beauty; Francis Davison did in a sonnet that is the preface to
Davison's quarto A Poetical Rhapsody (1608), which was published just before Shakespeare's Sonnets. John Davies of Hereford, Samuel Daniel, George Chapman, Christopher Marlowe, and Ben Jonson are also candidates that find support among clues in the sonnets.
It may be that the Rival Poet is a composite of several poets
through which Shakespeare explores his sense of being threatened by
competing poets.
The speaker sees the Rival Poet as competition for fame and patronage.
The sonnets most commonly identified as the Rival Poet group exist
within the Fair Youth sequence in sonnets 78–86.
"A Lover's Complaint"
"A
Lover's Complaint" is part two of the quarto published in 1609. It is
not written in the sonnet form, but is composed of 47 seven-line stanzas
written in rhyme royal.
It is an example of a normal feature of the two-part poetic form, in
which the first part expresses the male point of view, and the second
part contrasts or complements the first part with the female's point of
view. The first part of the quarto, the 154 sonnets, considers
frustrated male desire, and the second part, "A Lover's Complaint",
expresses the misery of a woman victimized by male desire. The earliest
Elizabethan example of this two-part structure is Samuel Daniel's Delia ... with the Complaint of Rosamund
(1592)—a sonnet sequence that tells the story of a woman being
threatened by a man of higher rank, followed by the woman's complaint.
This was imitated by other poets, including Shakespeare with his Rape of Lucrece, the last lines of which contain Lucrece's complaint. Other examples are found in the works of Michael Drayton, Thomas Lodge, Richard Barnfield, and others.
The young man of the sonnets and the young man of "A Lover's
Complaint" provide a thematic link between the two parts. In each part
the young man is handsome, wealthy and promiscuous, unreliable and
admired by all.
Like the sonnets, "A Lover's Complaint"
also has a possessive form in its title, which is followed by its own
assertion of the author's name. This time the possessive word,
"Lover's", refers to a woman, who becomes the primary "speaker" of the
work.
Story of "A Lover's Complaint"
"A
Lover's Complaint" begins with a young woman weeping at the edge of a
river, into which she throws torn-up letters, rings, and other tokens of
love. An old man nearby approaches her and asks the reason for her
sorrow. She responds by telling him of a former lover who pursued,
seduced, and finally abandoned her. She recounts in detail the speech
her lover gave to her which seduced her. She concludes her story by
conceding that she would fall for the young man's false charms again.
Dates
1597 – Shakespeare's tragedy Romeo and Juliet
is published. The spoken prologue to the play, and the prologue to Act
II are both written in sonnet form, and the first meeting of the
star-crossed lovers is written as a sonnet woven into the dialogue.
1598 – Love's Labour's Lost is published as a quarto; the
play's title page suggests it is a revision of an earlier version. The
comedy features the King of Navarre and his lords who express their love
in sonnet form for the Queen of France and her ladies. This play is
believed to have been performed at the Inns of Court for Queen Elizabeth
I in the mid-1590s.
1598 – Francis Meres published his quarto Palladis Tamia,
which was entered on the Stationers' Register on 7 September that year.
In it he mentions that sonnets by Shakespeare were being circulated
privately:
As the soule of Euphorbus was
thought to live in Pythagoras: so the sweete wittie soule of Ouid liues
in mellifluous & hony-tongued Shakespeare, witnes his Venus and
Adonis, his Lucrece, his sugred Sonnets among his private friends,
&c.
1599 – William Jaggard published an octavo volume called The Passionate Pilgrime. By W. Shakespeare.
It is an anthology of 20 poems. This small publication contained some
spurious content falsely ascribed to Shakespeare; it also contained four
sonnets that can be said to be by Shakespeare: Two of the four appear
to be early versions of sonnets that were later published in the 1609
quarto (numbers 138 and 144); the other two were sonnets lifted from
Shakespeare's play Love's Labour's Lost. Sonnets 138 and 144 are
anything but the sweet sonnets hinted at by Francis Meres' comment. They
are instead harshly frank, ironic and recriminative regarding the
relationship of the speaker and the Dark Lady. The two sonnets that were
taken from Love's Labour's Lost, were, in the context of the
play, written by comic characters who were intended to be seen as
amateur sonneteers. Jaggard's piracy sold well—a second printing was
quickly ordered—but it, including poetry falsely ascribed to
Shakespeare, must have been a disappointment to Shakespeare's readers.
January 1600 – an entry in the Stationers' Register is for a work
that will include "certain other sonnets by W.S." This may suggest that
Shakespeare planned to respond right away and correct the impression
left by Jaggard's book with Shakespeare's own publication, or the entry
may have been merely a "staying entry" not regarding an upcoming
publication, but intended to prevent Jaggard from publishing any more
sonnets by Shakespeare.
14 August 1600 – Shakespeare's play The Chronicle History of Henry the fifth is entered into the Register of the Stationers' Company. The spoken epilogue is written in the form of a sonnet.
20 May 1609 – The entry in the Stationers' Register announces Shakespeare's Sonnets.
The contents include a collection of 154 sonnets followed by the poem
"A Lover's Complaint". This publication was greeted with near silence in
the documentary record, especially when compared with the lively
reception that followed the publication of Venus and Adonis.
1612 – Jaggard issues an expanded edition of his piratical anthology, The Passionate Pilgrim, which had been published in 1599. Thomas Heywood protests this piracy in his Apology for Actors
(1612), writing that Shakespeare was "much offended" with Jaggard for
making "so bold with his name." Jaggard withdraws the attribution to
Shakespeare from unsold copies of the 1612 edition.
1640 – The publisher John Benson
publishes an anthology of poems; some are by Shakespeare, and about 30
are not, but all are ascribed to Shakespeare. It is titled "Poems:
Written by Wil. Shakespeare Gent". Benson is even more wildly piratical
than Jaggard. Benson draws on The Passionate Pilgrim and other sources, including Shakespeare's Sonnets
(1609), which he rewrites and rearranges. Benson imperfectly rewrites
the sonnets to make them appear to be addressing a woman—the pronoun
"he" is often replaced by "she". This edition is unfortunately
influential and resulted in confusing and confounding various critical
understanding and response for more than a century. Deliberatemisgendering
is also a feature of 17th-century commonplace books which include
Sonnet 2, the most popular sonnet to appear in such collections. In
Margaret Bellasys' commonplace book the poem appears with the
non-gendered title, 'Spes Altera'. In IA's commonplace book, the gender
of the addressee is explicitly changed with the title, 'To one that
would die a mayd'.
1780 – Edmond Malone, in his two volume supplement to the 1778 Johnson-Stevens edition of the plays, finally instates the 1609 quarto edition of Shakespeare's Sonnets as the sole authoritative text.
1986 – The New Penguin Shakespeare’s edition of the sonnets restores "A Lover's Complaint" as an integral part of Shakespeare's Sonnets.
Criticism
In
his plays, Shakespeare himself seemed to be a satiric critic of
sonnets—the allusions to them are often scornful. Then he went on to
create one of the longest sonnet-sequences of his era, a sequence that
took some sharp turns away from the tradition.
He may have been inspired out of literary ambition, and a desire
to carve new paths apart from the well-worn tradition. Or he may have
been inspired by biographical elements in his life. It is thought that
the biographical aspects have been over-explored and over-speculated on,
especially in the face of a paucity of evidence. The critical focus has turned instead (through New Criticism and by scholars such as Stephen Booth and Helen Vendler) to the text itself, which is studied and appreciated linguistically as a "highly complex structure of language and ideas".
Besides the biographic and the linguistic approaches, another way
of considering Shakespeare's sonnets is in the context of the culture
and literature that surrounds them.
Gerald Hammond, in his book The Reader and the Young Man Sonnets,
suggests that the non-expert reader, who is thoughtful and engaged,
does not need that much help in understanding the sonnets: though, he
states, the reader may often feel mystified when trying to decide, for
example, if a word or passage has a concrete meaning or an abstract
meaning; laying that kind of perplexity in the reader's path for the
reader to deal with is an essential part of reading the sonnets—the
reader doesn't always benefit from having knots untangled and
double-meanings simplified by the experts, according to Hammond.
During the eighteenth century, The Sonnets' reputation in England was relatively low; in 1805, The Critical Review credited John Milton
with the perfection of the English sonnet. Towards the end of the
nineteenth century, Shakespeare and Milton seemed to be on an equal
footing,
but critics, burdened by an over-emphasis on biographical explorations,
continued to contend with each other for decades on this point.
Editions
Like all Shakespeare's works, Shakespeare's Sonnets have been reprinted many times. Prominent editions include:
Zinman, Ira, ed. (2009). Shakespeare's Sonnets and the Bible. foreword by HRH Charles Prince of Wales. Bloomington. World Wisdom. ISBN978-1933316758
Sonnets that occur in the plays
There are sonnets written by Shakespeare that occur in his plays, and these include his earliest sonnets.
They differ from the 154 sonnets published in the 1609, because they
may lack the deep introspection, for example, and they are written to
serve the needs of a performance, exposition or narrative.
Early comedies
In Shakespeare's early comedies, the sonnets and sonnet-making of his characters are often objects of satire. In Two Gentlemen of Verona, sonnet-writing is portrayed cynically as a seduction technique. In Love's Labour's Lost, sonnets are portrayed as evidence that love can render men weak and foolish. In Much Ado About Nothing, Beatrice and Benedick each write a sonnet, which serves as proof that they have fallen in love. In All’s Well that Ends Well, a partial sonnet is read, and Bertram comments, "He shall be whipp'd through the army with this rhyme in's forehead." In Henry V, the Dauphin suggests he will compose a sonnet to his horse.
The sonnets that Shakespeare satirizes in his plays are sonnets
written in the tradition of Petrarch and Sidney, whereas Shakespeare's
sonnets published in the quarto of 1609 take a radical turn away from
that older style, and have none of the lovelorn qualities that are
mocked in the plays. The sonnets published in 1609 seem to be rebelling
against the tradition.
In the play Love's Labour's Lost,
the King and his three lords have all vowed to live like monks, to
study, to give up worldly things, and to see no women. All of them break
the last part of the vow by falling in love. The lord Longaville
expresses his love in a sonnet ("Did not the heavenly rhetoric of thine
eye…"),
and the lord Berowne does, too—a hexameter sonnet ("If love make me
forsworn, how shall I swear to love?")–a form Sidney uses in six of the
sonnets in Astrophel and Stella (Numbers 1, 6, 8, 76, and 102).
These sonnets contain comic imperfections, including awkward phrasing,
and problems with the meter. After Berowne is caught breaking his vow,
and exposed by the sonnet he composed, he passionately renounces speech
that is affected, and vows to prefer plain country speech. Ironically,
when proclaiming this he demonstrates that he can't seem to avoid rich
courtly language, and his speech happens to fall into the meter and
rhyme of a sonnet. ("O, never will I trust to speeches penned…")
Henry V
The epilogue at the end of the play Henry V is written in the form of a sonnet ("Thus far with rough, and all-unable pen…"). Formal epilogues were established as a theatrical tradition, and occur in 13 of Shakespeare's plays. In Henry V,
the character of Chorus, who has addressed the audience a few times
during the play, speaks the wide-ranging epilogue/sonnet. It begins by
allowing that the play may not have presented the story in its full
glory. It points out that the next king would be Henry VI, who was an
infant when he succeeded Henry V, and who "lost France, and made his
England bleed/ Which oft our stage hath shown." It refers to the three
parts of Henry VI and to Richard III — connecting the Lancastrian and the Yorkist cycles.
Romeo and Juliet
Three sonnets are found in Romeo and Juliet:
The prologue to the play ("Two households, both alike in dignity…"),
the prologue to the second act ("Now old desire doth in his death-bed
lie…"), and set in the form of dialogue at the moment when Romeo and
Juliet meet:
ROMEO
If I profane with my unworthiest hand
This holy shrine, the gentle fine is this:
My lips, two blushing pilgrims, ready stand
To smooth that rough touch with a tender kiss.
JULIET
Good pilgrim, you do wrong your hand too much,
Which mannerly devotion shows in this;
For saints have hands that pilgrims' hands do touch,
And palm to palm is holy palmers' kiss.
ROMEO
Have not saints lips, and holy palmers too?
JULIET
Ay, pilgrim, lips that they must use in prayer.
ROMEO
O, then, dear saint, let lips do what hands do;
They pray, grant thou, lest faith turn to despair.
JULIET
Saints do not move, though grant for prayers' sake.
ROMEO
Then move not, while my prayer's effect I take.[75]
Much Ado About Nothing
Two sonnets are mentioned in Much Ado About Nothing—sonnets
by Beatrice and Benedick—and though not committed to paper, they were
in Shakespeare's mind. The first one, revealed by Claudio, is described
as "A halting sonnet of his own pure brain/Fashion'd to Beatrice". The
second, found by Hero, was "Writ in my cousin's hand, stolen from her
pocket/Containing her affection unto Benedick".
Edward III
The play Edward III
has recently become accepted as part of Shakespeare's canon of plays.
It was considered an anonymous work, and that is how it was first
published, but in the late 1990s it began to be included in publications
of the complete works as co-authored by Shakespeare. Scholars who have supported this attribution include Jonathan Bate, Edward Capell, Eliot Slater, Eric Sams, Giorgio Melchiori, Brian Vickers,
and others. The play, printed in 1596, contains language and themes
that also appear in Shakespeare's sonnets, including the line: "Lilies
that fester smell far worse than weeds", which occurs in sonnet 94 and the phrase "scarlet ornaments", which occurs in sonnet 142.
The scene of the play that contains those quotations is a comic scene
that features a poet attempting to compose a love poem at the behest of
his king, Edward III. At the time Edward III was published, Shakespeare's sonnets were known by some, but they had not yet been published.
The king, Edward III, has fallen in love with the Countess of
Salisbury, and he tells Lodowick, his secretary, to fetch ink and paper.
Edward wants Lodowick's help in composing a poem that will sing the
praises of the countess. Lodowick has a question:
LODOWICK
Write I to a woman?
KING EDWARD
What beauty else could triumph over me,
Or who but women do our love lays greet?
What, thinkest thou I did bid thee praise a horse?
The king then expresses and dictates his passion in exuberant poetry,
and asks Lodowick to read back to him what he has been able to write
down. Lodowick reads:
LODOWICK.
'More fair and chaste'—
KING EDWARD.
I did not bid thee talk of chastity ...
When the countess enters, the poetry-writing scene is interrupted
without Lodowick having accomplished much poetry—only two lines:
More fair and chaste than is the queen of shades,
More bold in constance ... Than Judith was.