Скачать книгу

to share our thoughts publicly about the path that we believed should be followed in future military campaigns.41 And we didn’t have to wait too long to see a much more fully realized version of our concept put into practice. In the wake of the 9/11 attacks on America, it was quickly determined that al Qaeda had perpetrated them, and that the Taliban government of Afghanistan was providing that terrorist group with a physical haven. There was no time to muster a large ground force; and arranging to send big units to that land-locked country swiftly, then supplying them, would have been nightmarish. So, instead, only 11 “A-teams” of Green Berets went to Afghanistan in late 2001 – just under 200 soldiers.

      They soon linked up with friendly Afghans of the Northern Alliance, a group that had been previously beaten quite soundly by the Taliban, losing roughly 95 percent of the country to those fundamentalist zealots. But with the leavening of those few Americans, who were highly networked with air assets, they managed to defeat al Qaeda and drive the Taliban from power in very short order.42 This, Ronfeldt and I believed, was a true demonstration of the power of being able to employ a major information advantage that would allow far smaller forces to defeat much greater enemy armies. And to win even when indigenous allies’ forces are of a far lesser quality, man for man, than the enemy they face. Thus, the defeated, demoralized fighters of the Northern Alliance reemerged victorious – because the handful of American specialists who fought alongside them on horseback were uplinked to ISR and attack aircraft that allowed them to monitor enemy movements in real time and to call in strikes from the air, in minutes, from the steady and unending stream of fighter-bomber pilots who maintained constant coverage above the battlespace. Then-Secretary of Defense Donald Rumsfeld, who had unleashed the Green Berets over the objections of many senior generals, saw in this campaign the singular opportunity to catalyze what he came to call “military transformation.”43

      Lack of knowledge about enemy dispositions, movements, and intentions was the cause of the American debacle in Vietnam, where the insurgents were able to remain hidden much of the time, and had greater awareness of their opponents’ plans and maneuvers. And attempts to find the guerrillas by “dangling the bait” with small Army and Marine patrols proved costly and frustrating. As Michael Maclear summarized, “On patrol, the GIs were inviting certain ambush.”46 This problem was never adequately solved in Vietnam, and recurred in Afghanistan and Iraq when insurgencies arose in these countries after American-led invasions.

      But this aspect of cyberwar – controlling or “steering” the course of conflict by gaining and sustaining an information advantage – still has few adherents, and the dominant view of limiting cyberwar just to cyberspace-based operations prevails. It is a reason for failure to repeat the Petraeus approach in Afghanistan, where the reluctance to distribute small forces throughout the country among the friendly tribes – which worked so well there back in 2001 – allowed the Taliban insurgency to rise and expand. Sadly, even the very narrow, tech-only view of cyberwar has not been properly employed in Afghanistan, nor in broader counter-terrorism operations globally. In Afghanistan, the Taliban’s command and control system, and movement of people, goods, weapons, and finances, all rely to some degree on communication systems – locally and with leaders in Pakistan – that are hackable. That they have not been compromised is proved by the growth of the insurgency. The same is true of worldwide counter-terror efforts; cyberspace is still a “virtual haven” for terror cells. Yes, they often rely on couriers. But the Taliban locally – as well as ISIS, al Qaeda, Hezbollah and a host of other dark groups who operate more widely – would be crippled if they were to lose faith in the security of their cyber/electronic communications. And if these systems were compromised secretly, all these groups would be destroyed. Even this narrower approach to cyberwar, if employed as the lead element in the counter-terror war, would prove decisive. As yet, this has not been the case. The world is much the worse for it.

Скачать книгу