08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

material is visual as well as written and spoken. It thus appears more real and<br />

legitimate. 109<br />

The important phrase in the definition of insurgency for purposes of<br />

this article is “a protracted politico-military struggle designed to weaken<br />

government control and legitimacy while increasing insurgent control.” It is<br />

important because it may no longer be true that insurgencies are protracted in<br />

the old sense of the term. Rather, the period of time needed to wage conflict is<br />

cut, due to efficiencies offered by the Internet. The insurgency that developed<br />

in Vietnam in the 1960s took years to develop. When the US moved into<br />

Vietnam in 1964, it still took another four years for the media to really impact<br />

public opinion. When the US moved into Iraq in March 2003, it fought a<br />

totalitarian government with little to offer in the way of horizontal<br />

communications since it demanded total control. Now a year later, insurgents<br />

are attacking coalition forces at a rate of fifty or more incidents a day across<br />

Iraq, and the cause of the attack, as well as the casualty figures, are being<br />

manipulated by the insurgents at will across the Internet.<br />

The use of propaganda on the Internet strengthens an insurgent’s<br />

control over its followers and over governments by offsetting official<br />

statements through the use of pictures and mass mobilization. Insurgents<br />

request some type of action if demands are not met. Items such as photos of<br />

beheadings on the Internet grab the attention of potential combatants on both<br />

sides of the fight. Control may lie in understanding who delivered an acceptable<br />

message to the target audience first or in the most culturally appropriate way.<br />

Insurgents’ use of the Internet weakens government control by undermining the<br />

perception or position of legitimacy in regard to ruling authority. If one cannot<br />

protect its citizens, then it is not a legitimate authority in the Arab world. 110<br />

For the insurgent, the Internet allows for the mobilization of all the<br />

various members of populations around the globe with similar grievances or<br />

like causes. They are able to unite in chat rooms, exchange opinions and plans,<br />

and never meet except virtually in a relatively short period of time. The Internet<br />

also allows for Cyber Age insurgents to use their guerilla tactics in an<br />

electronic way. These techniques are at risk in the same way as past insurgent<br />

actions. Insiders or captured computer hard drives inform law enforcement<br />

officials in the same manner that covert operators or captured documents did in<br />

the past. The problem for law enforcement officials is to maintain the pace of<br />

109 The author would like to thank Dr. Jacob Kipp, FMSO, for providing this<br />

information during review of this chapter.<br />

110 The author would like to thank Dr. Cindy Ayers, US <strong>Army</strong> War College, for<br />

providing this information during review of this chapter.<br />

57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!