SlideShare a Scribd company logo
1 of 11
Presentation to the RAND Insurgency Board, June 2012
Steven Metz
U.S. Army War College Strategic Studies Institute
Enduring Nature
  A strategy of violence used by the weak against a power
  structure
  Shifts decisiveness across domains
  Core functions: survive; weaken power structure;
  strengthen self

Changing Character
  Organization
  Objectives
  Connections
  Role and form of violence
  Operational methods
Driving forces are inherent innovation and emulation
of success
   In the modern era, emulation has surpassed inherent
   innovation in importance

20th century: Maoist, proto-state model became the
gold standard
   Simultaneously strengthen selves, weaken state
   Ultimate success when insurgency had become state like

21st century: dispersed, networked, swarming,
terrorism-focused, transnational
Improved state security systems

The decline of state sponsorship

New technology and systems for using the
technology which make the dispersed,
networked, swarming, terrorism-focused,
transnational model of insurgency more viable
and effective
   Especially the Internet/new media
Technology
   Internet, laptops and tablet computers, image capture and
   editing, mobile communication, GPS
Systems
   Web pages, email, file sharing, chat, blogs, microblogs, IM,
   SMS, cloud storage
Culture
   Vastly expanded connectivity
   Creation of new communities and identities
   Anti-authoritarianism
   Depersonalization
   Blurring distinction reality and virtual
   New basis for credibility
   Wiki knowledge development
How insurgents use it
   Recruiting, network building, mobilizing support
   Training
   Intelligence collection
   Operational planning and strategy development
   Financing
   Psychological offensive operations/amplification
Why insurgents use it
   Low entry cost in terms of training and money
   Low risk
     From "amongst the people" to inside the matrix
   Facilitates a shift to the psychological domain
   Immense increase in potential audience, recruits,
   supporters, partners
The dispersed, networked, swarming, terrorism-focused,
transnational model of insurgency is more viable and effective
Dense information flows and cheap/rapid
communication facilitate networked organization and
swarming techniques
Insurgents can aggregate broad currents of anger,
frustration, and resentment
    This can spark insurrection which can be a precursor to
    insurgency, i.e. insurgents have a surge capability
    Insurgencies composed of diverse nodes may not need a
    unifying ideology
Multiple connections allow the creation of complex,
even conflicting narratives
    Survival of the fittest--reinforce the narrative that seems to
    work
Reliance on the Internet/new media propels an
insurgency toward terrorism focused methods
The commitment of online, tech savvy recruits
has a short lifespan
   Terrorism is a "use them or lose them" method
Terrorism is easier to plan and train for online or
with limited physical interaction
The Internet and new media amplify the
psychological effects of terrorism by greatly
expanding the audience and bypassing traditional
media for explanation
al Qaeda
              Egypt               2.0           Taliban



                       Libya         al Qaeda
                                        1.0
                                                Traditional, proto-state
"Pure" Internet/new media                       insurgencies which
based insurgencies                              adopt the Internet/new
                                                media as an applique
The bad news: dispersed, networked, swarming,
terrorism-focused, transnational insurgencies are very
hard to eradicate
   Because they are transnational and virtual based, they can
   pop up somewhere else if quashed in one place
   It's nearly impossible to eradicate anger, frustration, and
   anti-authoritarianism
The good news: dispersed, networked, swarming,
terrorism-focused, transnational insurgencies are
unlikely to attain decisive success in the absence of
major outside intervention if the initial insurrection
fails
Much of what we think we know about insurgency may
be approaching obsolescence
   The universality of the Maoist, proto-state model
   The concepts of legitimacy, building state capacity, winning
   popular support
   The ability of states to succeed at creating and sustaining a
   viable counterinsurgent narrative
   The ability of states to destroy networks

More Related Content

What's hot

Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
 
Misinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and librariesMisinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and librariesDr Trivedi
 
New Media Activism - A Literature Review
New Media Activism - A Literature ReviewNew Media Activism - A Literature Review
New Media Activism - A Literature ReviewComDevGroup5
 
Critical thinking in an age of disinformation and fake news oct 2019
Critical thinking in an age of disinformation and fake news   oct 2019Critical thinking in an age of disinformation and fake news   oct 2019
Critical thinking in an age of disinformation and fake news oct 2019InformAll
 
Social media intelligence
Social media intelligenceSocial media intelligence
Social media intelligenceFrank Smilda
 
How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?Jan Schmidt
 
VF New presentation authority & trust online
VF New presentation authority & trust onlineVF New presentation authority & trust online
VF New presentation authority & trust onlineWK5Slides
 
120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slides120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slidesCraig Thomler
 
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power - Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power - Paolo Cirio
 
Fake news and fake politics March 2017
Fake news and fake politics March 2017Fake news and fake politics March 2017
Fake news and fake politics March 2017POLIS LSE
 
New presentation authority and trust online
New presentation authority and trust onlineNew presentation authority and trust online
New presentation authority and trust onlineWK5Slides
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
SocialmediapublicsavetyFrank Smilda
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASCDavid Sweigert
 
Tsfati & weimann www.terrorism.com
Tsfati & weimann www.terrorism.comTsfati & weimann www.terrorism.com
Tsfati & weimann www.terrorism.comTwittercrisis
 
My second homework for communication class
My second homework for communication classMy second homework for communication class
My second homework for communication classKrishna Subedi
 

What's hot (19)

Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
Opening minds, reaching out
Opening minds, reaching outOpening minds, reaching out
Opening minds, reaching out
 
Misinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and librariesMisinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and libraries
 
New Media Activism - A Literature Review
New Media Activism - A Literature ReviewNew Media Activism - A Literature Review
New Media Activism - A Literature Review
 
Critical thinking in an age of disinformation and fake news oct 2019
Critical thinking in an age of disinformation and fake news   oct 2019Critical thinking in an age of disinformation and fake news   oct 2019
Critical thinking in an age of disinformation and fake news oct 2019
 
Social media intelligence
Social media intelligenceSocial media intelligence
Social media intelligence
 
How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?
 
Role of New Media in Democratization
Role of New Media in Democratization Role of New Media in Democratization
Role of New Media in Democratization
 
VF New presentation authority & trust online
VF New presentation authority & trust onlineVF New presentation authority & trust online
VF New presentation authority & trust online
 
Social networking
Social networkingSocial networking
Social networking
 
120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slides120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slides
 
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power - Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
 
130 01 intro
130 01 intro130 01 intro
130 01 intro
 
Fake news and fake politics March 2017
Fake news and fake politics March 2017Fake news and fake politics March 2017
Fake news and fake politics March 2017
 
New presentation authority and trust online
New presentation authority and trust onlineNew presentation authority and trust online
New presentation authority and trust online
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
Tsfati & weimann www.terrorism.com
Tsfati & weimann www.terrorism.comTsfati & weimann www.terrorism.com
Tsfati & weimann www.terrorism.com
 
My second homework for communication class
My second homework for communication classMy second homework for communication class
My second homework for communication class
 

Viewers also liked

Social Media for Social Good
Social Media for Social GoodSocial Media for Social Good
Social Media for Social GoodThe New School
 
Indicators of insurgency(m)
Indicators of insurgency(m)Indicators of insurgency(m)
Indicators of insurgency(m)manoj kumar sood
 
Muslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencyMuslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencySARON MESSEMBE OBIA
 
Isaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 DecIsaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 DecClaes Krantz
 
Indicators Of Insurgency
Indicators Of InsurgencyIndicators Of Insurgency
Indicators Of InsurgencyKrishan Lal
 
Gender inequality presentation
Gender inequality presentationGender inequality presentation
Gender inequality presentationtonyacsi
 

Viewers also liked (10)

Baloch insurgency
Baloch insurgency Baloch insurgency
Baloch insurgency
 
Social Media for Social Good
Social Media for Social GoodSocial Media for Social Good
Social Media for Social Good
 
Indicators of insurgency(m)
Indicators of insurgency(m)Indicators of insurgency(m)
Indicators of insurgency(m)
 
Muslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencyMuslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And Insurgency
 
Isaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 DecIsaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 Dec
 
Counter Guerrilla Warfare
Counter Guerrilla WarfareCounter Guerrilla Warfare
Counter Guerrilla Warfare
 
Insurgency(m)
Insurgency(m)Insurgency(m)
Insurgency(m)
 
Indicators Of Insurgency
Indicators Of InsurgencyIndicators Of Insurgency
Indicators Of Insurgency
 
Gender inequality presentation
Gender inequality presentationGender inequality presentation
Gender inequality presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Information in insurgency

communication and media.pptx
communication and media.pptxcommunication and media.pptx
communication and media.pptxRinaJuwita3
 
the final frontier?
the final frontier?the final frontier?
the final frontier?FJWU
 
Pharma and Social Media: What's the New Normal?
Pharma and Social Media: What's the New Normal?Pharma and Social Media: What's the New Normal?
Pharma and Social Media: What's the New Normal?Steve Woodruff
 
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptxMEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptxLOVELITAFERNANDO
 
Collective action under autocracies
Collective action under autocraciesCollective action under autocracies
Collective action under autocraciesZeynep Tufekci
 
Chapter 1 - Mass Communication and Its Digital Transformation
Chapter 1 - Mass Communication and Its Digital TransformationChapter 1 - Mass Communication and Its Digital Transformation
Chapter 1 - Mass Communication and Its Digital Transformationjbraun128
 
Networked communications: The New Normal
Networked communications: The New NormalNetworked communications: The New Normal
Networked communications: The New NormalSteve Woodruff
 
Impact of social media on youth
Impact of social media on youthImpact of social media on youth
Impact of social media on youthAnkit Ranjan
 
Debunking sm revolution
Debunking sm revolutionDebunking sm revolution
Debunking sm revolutionyus121
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity Johannes Meier
 
Mycelia Impact.pdf
Mycelia Impact.pdfMycelia Impact.pdf
Mycelia Impact.pdfMycelia1
 
Digital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasDigital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasnelliesk
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentationNewMediaActivism
 
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxWeb 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxdavieec5f
 

Similar to Information in insurgency (20)

communication and media.pptx
communication and media.pptxcommunication and media.pptx
communication and media.pptx
 
the final frontier?
the final frontier?the final frontier?
the final frontier?
 
Pharma and Social Media: What's the New Normal?
Pharma and Social Media: What's the New Normal?Pharma and Social Media: What's the New Normal?
Pharma and Social Media: What's the New Normal?
 
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptxMEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
 
3.2. Terrorism Quiz
3.2. Terrorism Quiz3.2. Terrorism Quiz
3.2. Terrorism Quiz
 
Collective action under autocracies
Collective action under autocraciesCollective action under autocracies
Collective action under autocracies
 
Small Ideas for ICRC
Small Ideas for ICRCSmall Ideas for ICRC
Small Ideas for ICRC
 
How wewin2016
How wewin2016How wewin2016
How wewin2016
 
Chapter 1 - Mass Communication and Its Digital Transformation
Chapter 1 - Mass Communication and Its Digital TransformationChapter 1 - Mass Communication and Its Digital Transformation
Chapter 1 - Mass Communication and Its Digital Transformation
 
Networked communications: The New Normal
Networked communications: The New NormalNetworked communications: The New Normal
Networked communications: The New Normal
 
Zeynep pdf
Zeynep pdfZeynep pdf
Zeynep pdf
 
Social Media for the Meta-Leader
Social Media for the Meta-LeaderSocial Media for the Meta-Leader
Social Media for the Meta-Leader
 
Impact of social media on youth
Impact of social media on youthImpact of social media on youth
Impact of social media on youth
 
Debunking sm revolution
Debunking sm revolutionDebunking sm revolution
Debunking sm revolution
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity
 
Mycelia Impact.pdf
Mycelia Impact.pdfMycelia Impact.pdf
Mycelia Impact.pdf
 
Digital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasDigital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideas
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentation
 
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxWeb 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
 
In his 2000 work
In his 2000 workIn his 2000 work
In his 2000 work
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Information in insurgency

  • 1. Presentation to the RAND Insurgency Board, June 2012 Steven Metz U.S. Army War College Strategic Studies Institute
  • 2. Enduring Nature A strategy of violence used by the weak against a power structure Shifts decisiveness across domains Core functions: survive; weaken power structure; strengthen self Changing Character Organization Objectives Connections Role and form of violence Operational methods
  • 3. Driving forces are inherent innovation and emulation of success In the modern era, emulation has surpassed inherent innovation in importance 20th century: Maoist, proto-state model became the gold standard Simultaneously strengthen selves, weaken state Ultimate success when insurgency had become state like 21st century: dispersed, networked, swarming, terrorism-focused, transnational
  • 4. Improved state security systems The decline of state sponsorship New technology and systems for using the technology which make the dispersed, networked, swarming, terrorism-focused, transnational model of insurgency more viable and effective Especially the Internet/new media
  • 5. Technology Internet, laptops and tablet computers, image capture and editing, mobile communication, GPS Systems Web pages, email, file sharing, chat, blogs, microblogs, IM, SMS, cloud storage Culture Vastly expanded connectivity Creation of new communities and identities Anti-authoritarianism Depersonalization Blurring distinction reality and virtual New basis for credibility Wiki knowledge development
  • 6. How insurgents use it Recruiting, network building, mobilizing support Training Intelligence collection Operational planning and strategy development Financing Psychological offensive operations/amplification Why insurgents use it Low entry cost in terms of training and money Low risk From "amongst the people" to inside the matrix Facilitates a shift to the psychological domain Immense increase in potential audience, recruits, supporters, partners
  • 7. The dispersed, networked, swarming, terrorism-focused, transnational model of insurgency is more viable and effective Dense information flows and cheap/rapid communication facilitate networked organization and swarming techniques Insurgents can aggregate broad currents of anger, frustration, and resentment This can spark insurrection which can be a precursor to insurgency, i.e. insurgents have a surge capability Insurgencies composed of diverse nodes may not need a unifying ideology Multiple connections allow the creation of complex, even conflicting narratives Survival of the fittest--reinforce the narrative that seems to work
  • 8. Reliance on the Internet/new media propels an insurgency toward terrorism focused methods The commitment of online, tech savvy recruits has a short lifespan Terrorism is a "use them or lose them" method Terrorism is easier to plan and train for online or with limited physical interaction The Internet and new media amplify the psychological effects of terrorism by greatly expanding the audience and bypassing traditional media for explanation
  • 9. al Qaeda Egypt 2.0 Taliban Libya al Qaeda 1.0 Traditional, proto-state "Pure" Internet/new media insurgencies which based insurgencies adopt the Internet/new media as an applique
  • 10. The bad news: dispersed, networked, swarming, terrorism-focused, transnational insurgencies are very hard to eradicate Because they are transnational and virtual based, they can pop up somewhere else if quashed in one place It's nearly impossible to eradicate anger, frustration, and anti-authoritarianism The good news: dispersed, networked, swarming, terrorism-focused, transnational insurgencies are unlikely to attain decisive success in the absence of major outside intervention if the initial insurrection fails
  • 11. Much of what we think we know about insurgency may be approaching obsolescence The universality of the Maoist, proto-state model The concepts of legitimacy, building state capacity, winning popular support The ability of states to succeed at creating and sustaining a viable counterinsurgent narrative The ability of states to destroy networks