08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

conflict. It is a protracted politico-military struggle designed to weaken<br />

government control and legitimacy while increasing insurgent control.<br />

Political power is the central issue in an insurgency.” 92<br />

Further, an insurgency has as its goal “to mobilize human and material<br />

resources in order to form an alternative to the state.” 93 The real hidden danger<br />

of the Internet is its high-speed connection that can spread an insurgency’s<br />

ideological and theoretical philosophy almost without time, space, or financial<br />

limitations. This offers the insurgent the capability to speed up the formation of<br />

a base of support (mobilizing those human and material resources with long<br />

inbred grievances) and to create an alternative to the state’s ideology. The<br />

Internet thus helps insurgents weaken government control and legitimacy,<br />

thereby subverting local authorities just as the definition of insurgency requires.<br />

This article describes how the Internet enables insurgents to mobilize a<br />

base of support, expand their influence, and potentially conduct guerilla warfare<br />

on the Internet. The continuing stream of insurgents flowing into Iraq today,<br />

perhaps, best reflects the Internet’s success in these areas.<br />

Context<br />

While they continue to focus on physical and barbaric actions that<br />

induce terror (such as improvised explosive devices [IEDs], car bombs,<br />

hostage-taking, etc.), today’s insurgents are also savvy and informed. They are<br />

adept at using Internet information and other media sources against us,<br />

replaying the attacks over the net to reinforce success and multiply the effects<br />

of attacks. Insurgents understand the importance of supporting virtual activities<br />

that potentially can mobilize thousands of people. For most American security<br />

specialists, the primary threat associated with the Internet remains<br />

cyberterrorism, which involves the destruction (physical action) of networks<br />

through the use of electrons or other devices. This fact is reflected in the West<br />

in the number of university and military courses dedicated to the theory of<br />

cyberterrorism. No such courses are available on cyberplanning or<br />

cybermentality or cyberexploitation of the masses.<br />

Insurgents in the Information Age are capable of overcoming most of<br />

the limiting constraints imposed by media outlets during the Industrial Age.<br />

Today, according to Gabriel Weimann of the US Institute of Peace, there are<br />

more than 4,000 insurgent and terrorist websites. 94 The huge number of<br />

92 FMI 3-07.22, Counterinsurgency Operations, August 2004, p. 1-1, used with<br />

permission of the authors.<br />

93 Ibid.<br />

94 Lawrence Wright, p. 50.<br />

47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!