Bitskrieg. John Arquilla

Чтение книги онлайн.

Читать онлайн книгу Bitskrieg - John Arquilla страница 10

Bitskrieg - John Arquilla

Скачать книгу

of digital data that flowed incessantly.34

      In the wake of my work on Desert Storm, I brought insights from this experience to my colleague David Ronfeldt, appearing at his office door one afternoon to say, “I have one word for you, David: ‘Cyberwar.’” And so we were off to the races, striving to make the case for truly revolutionary change in military affairs.

      We found a few defense intellectuals who accepted our logic about the concrete value of having an information edge. A useful analogy was the thought experiment I suggested about a chess game between two players of equal strength, but with one side limited in vision to seeing only his or her own pieces. An opposing piece would reveal itself only in making a capture or when a friendly piece stumbled upon it. In such a situation, could the side with the information edge win with fewer pieces? If so, how many fewer? Invariably, the answers were that the fully sighted side could do without much of the traditional full complement of pieces. Thus, the issue of assessing the material value of an information edge began to come into focus as a matter of serious enquiry.

      The most important early advocates of this way of thinking about cyberwar came from the communities of experts in nuclear strategy and air power; naturally, their habits of mind led them to conceive of cyberspace-based operations as a form of strategic attack on a nation’s cities and critical infrastructures. Much as they had played a significant role in parsing the complexities of nuclear strategy and air power for generations, RAND experts now came to the fore in developing these much more limited views of cyber strategy as well – most notably in the team led by Roger Molander, whose study Strategic Information Warfare and the table-top wargame exercises developed therefrom proved highly influential.35

      Klaatu aside – in the original film, it’s not clear that his demonstration of disruptive power would work to gain humanity’s compliance with his demand that Earthmen not bring their violent ways into space – Ronfeldt and I have always bristled at the evolving emphasis on cyberwar as simply a strategic “weapon of mass disruption.” This manifestation of cyberwar has none of the horror that attends nuclear conflict – a threatened holocaust that has led to deterrence stability under the rubric of “mutual assured destruction” (MAD). And to the extent to which this “strategic” view of cyberwar is associated with the notion of victory through conventional aerial bombing, it only needs to be noted that very few air campaigns – if any – have ever achieved their aims politically, militarily, or psychologically.37 Instead, as Ronfeldt and I have argued for decades, the notion that cyberwar is key to a new “strategic attack paradigm” – the term introduced by James Adams38 – will ultimately prove to be a grave error, engendering ruinous costs for little results. We strove to make an alternate case, favoring far more tactical-level uses of information systems to empower forces in the field, at sea, and in the aerospace environment, to enable them to make the shift to Bitskrieg.

      They soon linked up with friendly Afghans of the Northern Alliance, a group that had been previously beaten quite soundly by the Taliban, losing roughly 95 percent of the country to those fundamentalist zealots. But with the leavening of those few Americans, who were highly networked with air assets, they managed to defeat al Qaeda and drive the Taliban from power in very short order.42 This, Ronfeldt and I believed, was a true demonstration of the power of being able to employ a major information advantage that would allow far smaller forces to defeat much greater enemy armies. And to win even when indigenous allies’ forces are of a far lesser quality, man for man, than the enemy they face. Thus, the defeated, demoralized fighters of the Northern Alliance reemerged victorious – because the handful of American specialists who fought alongside them on horseback were uplinked to ISR and attack aircraft that allowed them to monitor enemy movements in real time and to call in strikes from the air, in minutes, from the steady and unending stream of fighter-bomber pilots who maintained constant coverage above the battlespace. Then-Secretary of Defense Donald Rumsfeld, who had unleashed the Green Berets over the objections of many senior generals, saw in this campaign the singular opportunity to catalyze what he came to call “military transformation.”43

Скачать книгу