Bitskrieg. John Arquilla

Чтение книги онлайн.

Читать онлайн книгу Bitskrieg - John Arquilla страница 11

Bitskrieg - John Arquilla

Скачать книгу

The campaign unfolded in Blitzkrieg-like fashion, hewing to a playbook Heinz Guderian’s World War II-era panzer leaders would easily recognize. John Keegan made this point in his study of the campaign, noting that the invasion “was predicated on the principle of [coalition forces] advancing at the highest possible speed, brushing aside resistance and halting to fight only when absolutely necessary.”44 In the event, conventional military operations went well, but a nasty insurgency soon arose that bedeviled the occupiers for years. And, as more troops were sent, they provided more targets for improvised explosives and snipers. Large reinforcements were sent as well to Afghanistan – overturning Rumsfeld’s model – which had remained relatively quiet for four years, but then insurgents arose there, too. The Blitzkrieg playbook proved useless in both countries, where US and Allied forces soon suffered from enlisement, the term the French used when they were bogged down in Indochina.

      Lack of knowledge about enemy dispositions, movements, and intentions was the cause of the American debacle in Vietnam, where the insurgents were able to remain hidden much of the time, and had greater awareness of their opponents’ plans and maneuvers. And attempts to find the guerrillas by “dangling the bait” with small Army and Marine patrols proved costly and frustrating. As Michael Maclear summarized, “On patrol, the GIs were inviting certain ambush.”46 This problem was never adequately solved in Vietnam, and recurred in Afghanistan and Iraq when insurgencies arose in these countries after American-led invasions.

      But this aspect of cyberwar – controlling or “steering” the course of conflict by gaining and sustaining an information advantage – still has few adherents, and the dominant view of limiting cyberwar just to cyberspace-based operations prevails. It is a reason for failure to repeat the Petraeus approach in Afghanistan, where the reluctance to distribute small forces throughout the country among the friendly tribes – which worked so well there back in 2001 – allowed the Taliban insurgency to rise and expand. Sadly, even the very narrow, tech-only view of cyberwar has not been properly employed in Afghanistan, nor in broader counter-terrorism operations globally. In Afghanistan, the Taliban’s command and control system, and movement of people, goods, weapons, and finances, all rely to some degree on communication systems – locally and with leaders in Pakistan – that are hackable. That they have not been compromised is proved by the growth of the insurgency. The same is true of worldwide counter-terror efforts; cyberspace is still a “virtual haven” for terror cells. Yes, they often rely on couriers. But the Taliban locally – as well as ISIS, al Qaeda, Hezbollah and a host of other dark groups who operate more widely – would be crippled if they were to lose faith in the security of their cyber/electronic communications. And if these systems were compromised secretly, all these groups would be destroyed. Even this narrower approach to cyberwar, if employed as the lead element in the counter-terror war, would prove decisive. As yet, this has not been the case. The world is much the worse for it.

      Machines that have the power and the discretion to take human lives are politically unacceptable, morally repugnant, and should be banned by international law.48

      Around the same time that Arnold Schwarzenegger was first terrorizing humanity, scientist/novelist Michael Crichton was articulating the position that

      When the super-intelligent machine comes, we’ll survive . . . The fear that in the coming years we will be replaced by our creations – that we will live with computers as our pets live with us – suggests an extraordinary lack of faith in human beings and their enterprise. . . . Our ancestors were threatened

Скачать книгу