zenpundit.com » national security

Archive for the ‘national security’ Category

Vandergriff on Bacevich’s Strategic Critique

Thursday, July 17th, 2008

Maj. Don Vandergirff has the extended remarks of Col. Bacevich before Congress.

Dr. Andrew Bacevich was also featured recently by Jeremy Young over at Progressive Historians

The Nuclear Blog Tank Posts

Thursday, July 17th, 2008

Cheryl Rofer called for national security/ foreign policy/defense bloggers to think hard regarding the strategic calculus of a state possessing just a few nuclear weapons:

What strategies are available to a country with fissionable material sufficient for 1-5 nuclear weapons, some of which may be assembled? Take into account probable responses, and assume some sort of rationality on the holders of these weapons and material. You may specifically refer to Iran and North Korea, or any other nation, or make the scenario(s) more general. Flesh out the scenario with some support

Many have answered the call ( I am still working on my response) and here they are with key excerpts:

Wizards of Oz

….Therefore, we will pursue a four-fold strategy we call “Deterrence Light”:

1. INTERNAL SECURITY: Ensure the secrecy of our fissile material. Maximize employment of decoys and spoofs so as to preserve this material should it ever be needed….

2. EXTERNAL AWARENESS: Inform the world of our technological accomplishment — and embed in our announcements disinformation regarding the exact disposition of our research establishment and weapons complexes….

Hidden Unities

….Yesterday, the Iraqi Kurds announced the formation of a Kurdish confederation, minutes after introducing shocked IAEA officials inspecting Turkish nuclear facilities to a mountain bunker where two nuclear warheads (one loaded on a hybrid American-Israeli missile) were housed. Iraqi Kurdistan leaders informed the Iraqi government they were joining a Kurdish confederation but were not (as of this moment) interested in seceding entirely from Iraq. Revenues would continue to be shared as previously agreed and Kurdish units would be available to defend Iraq against Iranian aggression. Iranian Kurdish leaders explained their position to the Supreme Leader of Iran and noted targeting of Tehran and Iranian oil fields by several nuclear devices was existent. The Syrians were equally appraised of their own prime real estate being targeted

Armchair Generalist

….Next, I will want to develop an indigenous capability. I won’t let any Proliferation Security Initiatives stop valuable material shipments. My engineers and scientists will train in the best universities overseas as I develop my “nuclear technology” program, which will have the purpose of supplying my people with limitless, inexpensive electricity to power their homes. Now the United States and European nations will offer me low-enriched uranium, and that will do – for starters. Once I get the nuclear technology program, I’ll build a second reactor and centrifuges for the HEU processing.

Dreaming 5GW (Arherring)

…. The 5GW Strategy: Ironically, even though the 4GW Operation benefits from more weapons being available, the 5GW strategy only requires one (and with the proper preparation you might even be able to get away with none, but that’s an advanced class). Essentially, the objective is to prove the potential of multiple weapons by openly displaying the existence of at least one weapon. Should you possess only two, one should be test-detonated and the other should be openly displayed to an authority that can realiably vouch for its authenticity. This very controlled transparency is a 5GW affect on observation that triggers existing assumptions, rule-sets and responses both in countries that are targeted and in countries that are merely in the audience

Nuclear Blog Tank

Saturday, July 12th, 2008

Cheryl Rofer of Whirledview has called for a blog tank on the strategic question of countries with just a few nuclear weapons:

Blog Tank: National Strategy for a Few Nuclear Weapons

Herman Kahn worked out the strategies for massive nuclear exchanges between the United States and the Soviet Union.

Both the United States and Russia are now disassembling their nuclear weapons, rather than building more. The nations that have tens or hundreds of nuclear weapons are looking fairly peaceful lately; even India and Pakistan seem to have achieved their own version of the balance of terror. Terrorists don’t seem to have any nukes hidden away yet.

So the danger is that a nation will break out of the Nuclear Nonproliferation Treaty with a few nukes. This is a very different problem from the one Kahn addressed.

The last country to face an analogous situation was the United States at the end of World War II. By the time it had tested an implosion device at Alamogordo, New Mexico, and dropped weapons on Hiroshima and Nagasaki, it was out of atomic bombs and fissionable materials. Truman bluffed for the several years it took to build some tens of nuclear weapons.

That was, of course, when no other nations had nuclear weapons.

Andy at Nuclear Mangoes reminded me over the weekend of my irritation that nobody has addressed the strategy of one to a few nuclear weapons. That’s a different problem than something in the range of 5-10, which is a different problem from a higher number. None of these have been addressed systematically for today’s world.

So let’s have a blog tank. Anyone who wants to participate should post a scenario (or scenarios) on their blog or, if you don’t have a blog, in the comments to this post. Here is the problem I want to address:

What strategies are available to a country with fissionable material sufficient for 1-5 nuclear weapons, some of which may be assembled? Take into account probable responses, and assume some sort of rationality on the holders of these weapons and material. You may specifically refer to Iran and North Korea, or any other nation, or make the scenario(s) more general. Flesh out the scenario with some support.

I envision a next step after the scenarios have been presented, perhaps a mutual critique, but I am open to suggestions on that next step. Let’s keep this first round to scenario development.

I’ll pull things together, as I did the last time around. I won’t try to reconcile one scenario with another, although I may note similarities.

Deadline for scenarios: July 18.

This is a great idea. I see that Shane has already responded but I will look more closely at his post here on Sunday.

Wass de Czege on Irregular Warfare and the Writing of Doctrine

Tuesday, July 8th, 2008

While I was away, the SWJ Blog ran a thoughtful essay by General  Huba Wass de Czege on the new military doctrine on irregular warfare. Not only is he good on the substance, Wass de Czege demonstrates how one needs to begin with clear thinking when attempting to formulate and apply usefuyl concepts:

A Reflection on the Illogic of New Military Concepts

What is it about the US Military that tends to produce sound, pragmatic, and common sense ideas about the concrete present, and tends toward illogic, faddish paradigms and hyperbole when dealing with the abstract future? Joint Operating Concepts for dealing with post cold war security problems have proven difficult to “get right.” This is because they begin from the wrong logical starting point and thus define the problem incorrectly. It is also because of inattention to historical fact, definitional subtlety and the theoretical logic within which military forces must operate. This inattention overlooks key logical inconsistencies in such documents crafted more to “sell” to constituencies within the Washington “Beltway” the capabilities and programs championed by one military interest group or another rather than to inform current decisions in the field.

….”Beltway” constituencies have been educated to think according to the attractive new paradigms military professionals have used to buttress their budget arguments.

Read the rest here.

Nerds of Jihad and the Virtual Worlds Evolution

Tuesday, July 1st, 2008

Tim Stevens of Ubiwar had a very intriguing post Thoughts on Countering Online Radicalisation that deals with Islamist “cyberterrorism”  but also the evolution and state of online life and the challenges these pose to CI, CT and law enforcement . You should go read it in full because I am going to comment upon particular snippets:

Terrorists know their actions are reported instantaneously through a multitude of television channels, radio stations, websites, blogs and newsgroups. If the effectiveness of a violent act relies on being able to broadcast it as swiftly as possible to as many people as possible, then the contemporary global communications environment is as near perfect a tool as has yet been invented.

The media environment is at saturation point for “early adapter” elite Westerners by the saturation is fractured. A good visual analogy of the total media picture would be the social media “ripple effect” diagram by David Armano  – including all forms of media would greatly increase the complexity by orders of magnitude but the logic of the effect would remain the same ( the memetic velocity of each form of media differs but they all interact nonetheless). The message of Islamist terrorism like any other meme in a highly competitive, complex adaptive media system must follow the rules of an attention economy or languish to little effect. There must be psychological “hooks” in the message and content, delivery and the multiplicity of audiences must be considered strategically.

Reams of newsprint, untold hours of televisual hyperbole and a thousand academic articles have been expended on this subject, but it remains of critical importance. How do we adjust our Western liberal mores to account for the fact that every violent sub- or non-state actor knows the internet is a tool and, like ‘us’, knows how to use it? The time has long passed when we should be surprised by this, although articles crop up regularly in provincial newspapers and magazines, and occasionally in national dailies, somehow expressing surprise that terrorists use the internet for their own ends, and that something-must-be-done. We wrestle with the First Amendment, the spectre of censorship looms, militaries worry about operational security, and politicians tack with the prevailing wind, dispensing legislation and initiatives like sticking plasters in a bucket of razor blades.

But what is the fuss all about? Do commentators on the subject actually know what happens on the internet? The videos of IEDs in Iraq, or of Juba the Baghdad Sniper, or viral 9/11 videos, might just be the thin end of the wedge. Terrorists and insurgents leverage the tools of new media to broadcast violent propaganda, but why? What lies beneath?

The substrate below the spectacular image factory is a world that most readers of this blog well recognise. Websites, blogs, chatrooms, social networking sites, discussion fora, mailing lists, internet relay chat, massively multiplayer online role-playing games, virtual worlds, email, instant messaging, video sharing, file sharing, torrenting, and a host of other spaces where people – fundamentally – interact.

At this point here it would be profitable for non-geeks and enjoyable for the geeks to detour to Metaverse Roadmap Overview to get a better look at the part of the iceberg of the future that will be beneath the surface of the water. The cognitive power of games should not be underestimated as a learning modality or community-building tool. Virtuality tools drastically lower the transaction costs and risk for experimenting with challenging the social contract and these tools are in the hands of far more more socially alienated people than ever before, not merely unemployed, hiphop listening, Islamist wannabes in Marseilles unhappy with French public housing. The next generation of Ted Kacyznskis might be a superempowered scale free network like “Anonymous“.

Comprehension is critical. All movements congregate around a message, a coherent narrative understood by all, a rallying cry. Extremist propaganda serves this function, and discriminates amongst different audiences. In the court of international public opinion it aims to create either fear or a broad sense of sympathy. When aimed at the enemy, whether military or civilian, the intention is to create fear and uncertainty, and to undermine morale. Different emphases can be placed on the message distributed to extant supporters of an extremist organisation – corroboration, encouragement, reinforcement, righteousness. The fourth audience is the population in whose interest extremists claim to act. Propaganda mobilises public support, constructs bottom-up legitimacy, and affirms credibility through action. Within this population lies the most important group of all: the next generation of extremists.

What would John Boyd have said here ?

“Shape or influence events so that we not only amplify our spirit and strength (while isolating our adversaries and undermining their resolve and drive) but also influence the uncommitted or potential adversaries so that they are drawn toward our philosophy and are empathetic toward our success. – Patterns of Conflict

I would also add that the potential radical online is also drawn in by the same psychological process that occurs with cults – acceptance, affirmation of identity, certainty, an emotive connection that is continually reinforced and provides a neurophysical stimulus. A good book to pick up here would be Eric Hoffer’s classic The True Believer: Thoughts on the Nature of Mass Movements (Perennial Classics). The mad gleam in the eye of the ranting Islamist has been seen before in SS diehards, Maoist Red Guards, anarchists of the 19th century People’s Will and innumerable others.

Extremism itself is not the problem and nor is radical thinking, but violence against innocent individuals – becoming ‘kinetic’ in military parlance – is not acceptable in modern liberal society. Although its role is sometimes overstated online radicalisation is very real. It cannot be viewed in isolation from the societies in which it occurs but there are targeted approaches available to mitigate its worst excesses. Testimonies of violent extremists of every ilk highlight the role of the internet in radicalisation, either of themselves or of others, and we are obliged to pay attention.

Prior to the 1960’s, liberal societies and liberals themselves did not have problems accepting the fact that the open society had blood enemies and treating them as such. Liberals volunteered to go to Spain to fight fascism and were enthusiastic advocates for the crusade to destroy Nazism in WWII. Social Democrats and trade unionists fought to kick Stalinists out of unions and democratic-Left organizations and so on.  They had a moral center and argued for a “vital center” against extremism, at home or abroad.

Unfortunately, ever since the Vietnam War, liberals have been unable to effectively answer the anti-Western, anti-democratic, illiberal critique posed by New Left radicals, deconstructionists, multiculturalists, gender feminists and various forms of au courant intellectual nihilism. Instead, the democratic Left have accepted the undemocratic extremists as political allies in good standing against the Right, are loath to criticize them and implicitly accepted the moral legitimacy of their crypto-Marxist jeremiad, if not their policy recommendations or often inane political advice. While a general cultural trend, this effect is most acute in the baby boom generation, particularly the ’68’ers and New Right oponents who are at their zenith of systemic responsibility as managing editors, CEO’s, political leaders, intellectuals and bureaucrats.

 A generation still torn by the cultural civil war of their youth make ineffective defenders of a civilization. “The Long War” will be long in part because our leadership is badly divided and on occasion, blind and grossly incompetent.


Switch to our mobile site