08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER THREE: CYBERINSURGENCY<br />

Introduction<br />

In the Industrial Age an insurgency was easily localized due to the<br />

limited means available to spread the insurgent’s ideology. Insurgents had only<br />

word of mouth, the effects of their actions, and the local media’s coverage of<br />

events to spread their ideas. A message could take days to distribute and might<br />

be limited to a few individuals. These facts severely limited command and<br />

control, recruiting, fundraising, and consequently the development of a mass<br />

insurgent base. Since mass mobilization was difficult, armed conflict became<br />

the primary means to advance a cause.<br />

Insurgencies of the Cyber Age are aimed at, and able to reach, large<br />

numbers of people. The starkest difference is the insurgent’s capability to reach<br />

disenfranchised members of a mass base in a direct manner via the Internet. As<br />

one specialist noted about Muslims in Europe “the Internet stands in for the<br />

idea of the ummah, the mythologized Muslim community.” 90 This virtual<br />

ummah “inspires people not only to love their country but to die for it.” 91<br />

Further, the Internet provides the means to conduct virtual operations according<br />

to the insurgent’s needs. Most often this results in cyberrecruiting,<br />

cyberplanning, cyberfear, cybertargeting, cyberreconnaissance, and<br />

cyberfunding operations in addition to purely offensive operations such as virus<br />

attacks. Most Western security specialists are preoccupied with cyberterrorism<br />

and cybercrime that results in a focus on cybersecurity operations. Thus the<br />

Western focus is different than the insurgent’s focus.<br />

The Internet also offers insurgents the ability to use tested guerilla<br />

techniques and operating procedures online (dead drops, anonymity, hit-andrun<br />

tactics, surprise and ambush, hostage-taking, reconnaissance, and<br />

deception). While not subscribing to all of these techniques, insurgents have<br />

adopted some of them. In addition to creating a global village, the Internet has<br />

also created an insurgent’s operational paradise. Without fancy command and<br />

control, intelligence, and surveillance equipment, insurgents can accomplish<br />

some of the same missions that these high-tech and expensive systems conduct.<br />

US army doctrine defines an insurgency as<br />

An armed political movement aimed at the overthrow of a constituted<br />

government, or separation from it, through use of subversion and armed<br />

90 Lawrence Wright, “The Terror Web,” The New Yorker, 2 August 2004, p. 49.<br />

91 Ibid.<br />

46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!