SlideShare a Scribd company logo
Presentation to the RAND Insurgency Board, June 2012
Steven Metz
U.S. Army War College Strategic Studies Institute
Enduring Nature
  A strategy of violence used by the weak against a power
  structure
  Shifts decisiveness across domains
  Core functions: survive; weaken power structure;
  strengthen self

Changing Character
  Organization
  Objectives
  Connections
  Role and form of violence
  Operational methods
Driving forces are inherent innovation and emulation
of success
   In the modern era, emulation has surpassed inherent
   innovation in importance

20th century: Maoist, proto-state model became the
gold standard
   Simultaneously strengthen selves, weaken state
   Ultimate success when insurgency had become state like

21st century: dispersed, networked, swarming,
terrorism-focused, transnational
Improved state security systems

The decline of state sponsorship

New technology and systems for using the
technology which make the dispersed,
networked, swarming, terrorism-focused,
transnational model of insurgency more viable
and effective
   Especially the Internet/new media
Technology
   Internet, laptops and tablet computers, image capture and
   editing, mobile communication, GPS
Systems
   Web pages, email, file sharing, chat, blogs, microblogs, IM,
   SMS, cloud storage
Culture
   Vastly expanded connectivity
   Creation of new communities and identities
   Anti-authoritarianism
   Depersonalization
   Blurring distinction reality and virtual
   New basis for credibility
   Wiki knowledge development
How insurgents use it
   Recruiting, network building, mobilizing support
   Training
   Intelligence collection
   Operational planning and strategy development
   Financing
   Psychological offensive operations/amplification
Why insurgents use it
   Low entry cost in terms of training and money
   Low risk
     From "amongst the people" to inside the matrix
   Facilitates a shift to the psychological domain
   Immense increase in potential audience, recruits,
   supporters, partners
The dispersed, networked, swarming, terrorism-focused,
transnational model of insurgency is more viable and effective
Dense information flows and cheap/rapid
communication facilitate networked organization and
swarming techniques
Insurgents can aggregate broad currents of anger,
frustration, and resentment
    This can spark insurrection which can be a precursor to
    insurgency, i.e. insurgents have a surge capability
    Insurgencies composed of diverse nodes may not need a
    unifying ideology
Multiple connections allow the creation of complex,
even conflicting narratives
    Survival of the fittest--reinforce the narrative that seems to
    work
Reliance on the Internet/new media propels an
insurgency toward terrorism focused methods
The commitment of online, tech savvy recruits
has a short lifespan
   Terrorism is a "use them or lose them" method
Terrorism is easier to plan and train for online or
with limited physical interaction
The Internet and new media amplify the
psychological effects of terrorism by greatly
expanding the audience and bypassing traditional
media for explanation
al Qaeda
              Egypt               2.0           Taliban



                       Libya         al Qaeda
                                        1.0
                                                Traditional, proto-state
"Pure" Internet/new media                       insurgencies which
based insurgencies                              adopt the Internet/new
                                                media as an applique
The bad news: dispersed, networked, swarming,
terrorism-focused, transnational insurgencies are very
hard to eradicate
   Because they are transnational and virtual based, they can
   pop up somewhere else if quashed in one place
   It's nearly impossible to eradicate anger, frustration, and
   anti-authoritarianism
The good news: dispersed, networked, swarming,
terrorism-focused, transnational insurgencies are
unlikely to attain decisive success in the absence of
major outside intervention if the initial insurrection
fails
Much of what we think we know about insurgency may
be approaching obsolescence
   The universality of the Maoist, proto-state model
   The concepts of legitimacy, building state capacity, winning
   popular support
   The ability of states to succeed at creating and sustaining a
   viable counterinsurgent narrative
   The ability of states to destroy networks

More Related Content

What's hot

Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
Cameron Banks
 
Opening minds, reaching out
Opening minds, reaching outOpening minds, reaching out
Opening minds, reaching out
Sanjana Hattotuwa
 
Misinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and librariesMisinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and libraries
Dr Trivedi
 
New Media Activism - A Literature Review
New Media Activism - A Literature ReviewNew Media Activism - A Literature Review
New Media Activism - A Literature Review
ComDevGroup5
 
Critical thinking in an age of disinformation and fake news oct 2019
Critical thinking in an age of disinformation and fake news   oct 2019Critical thinking in an age of disinformation and fake news   oct 2019
Critical thinking in an age of disinformation and fake news oct 2019
InformAll
 
Social media intelligence
Social media intelligenceSocial media intelligence
Social media intelligence
Frank Smilda
 
How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?
Jan Schmidt
 
Role of New Media in Democratization
Role of New Media in Democratization Role of New Media in Democratization
Role of New Media in Democratization
Bhaswati Guha Majumder
 
VF New presentation authority & trust online
VF New presentation authority & trust onlineVF New presentation authority & trust online
VF New presentation authority & trust online
WK5Slides
 
Social networking
Social networkingSocial networking
Social networking
Himanshu Rathoria
 
120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slides120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slides
Craig Thomler
 
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power - Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
Paolo Cirio
 
130 01 intro
130 01 intro130 01 intro
130 01 intro
MdArifHussain4
 
Fake news and fake politics March 2017
Fake news and fake politics March 2017Fake news and fake politics March 2017
Fake news and fake politics March 2017
POLIS LSE
 
New presentation authority and trust online
New presentation authority and trust onlineNew presentation authority and trust online
New presentation authority and trust online
WK5Slides
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
Frank Smilda
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
David Sweigert
 
Tsfati & weimann www.terrorism.com
Tsfati & weimann www.terrorism.comTsfati & weimann www.terrorism.com
Tsfati & weimann www.terrorism.com
Twittercrisis
 
My second homework for communication class
My second homework for communication classMy second homework for communication class
My second homework for communication class
Krishna Subedi
 

What's hot (19)

Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
Opening minds, reaching out
Opening minds, reaching outOpening minds, reaching out
Opening minds, reaching out
 
Misinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and librariesMisinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and libraries
 
New Media Activism - A Literature Review
New Media Activism - A Literature ReviewNew Media Activism - A Literature Review
New Media Activism - A Literature Review
 
Critical thinking in an age of disinformation and fake news oct 2019
Critical thinking in an age of disinformation and fake news   oct 2019Critical thinking in an age of disinformation and fake news   oct 2019
Critical thinking in an age of disinformation and fake news oct 2019
 
Social media intelligence
Social media intelligenceSocial media intelligence
Social media intelligence
 
How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?
 
Role of New Media in Democratization
Role of New Media in Democratization Role of New Media in Democratization
Role of New Media in Democratization
 
VF New presentation authority & trust online
VF New presentation authority & trust onlineVF New presentation authority & trust online
VF New presentation authority & trust online
 
Social networking
Social networkingSocial networking
Social networking
 
120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slides120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slides
 
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power - Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
Slides - Paolo Cirio's Artworks - Art Performances with Information's Power -
 
130 01 intro
130 01 intro130 01 intro
130 01 intro
 
Fake news and fake politics March 2017
Fake news and fake politics March 2017Fake news and fake politics March 2017
Fake news and fake politics March 2017
 
New presentation authority and trust online
New presentation authority and trust onlineNew presentation authority and trust online
New presentation authority and trust online
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
Tsfati & weimann www.terrorism.com
Tsfati & weimann www.terrorism.comTsfati & weimann www.terrorism.com
Tsfati & weimann www.terrorism.com
 
My second homework for communication class
My second homework for communication classMy second homework for communication class
My second homework for communication class
 

Viewers also liked

Baloch insurgency
Baloch insurgency Baloch insurgency
Baloch insurgency
Asalan Ahmed Malik
 
Indicators of insurgency(m)
Indicators of insurgency(m)Indicators of insurgency(m)
Indicators of insurgency(m)
manoj kumar sood
 
Muslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencyMuslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And Insurgency
SARON MESSEMBE OBIA
 
Isaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 DecIsaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 Dec
Claes Krantz
 
Counter Guerrilla Warfare
Counter Guerrilla WarfareCounter Guerrilla Warfare
Counter Guerrilla Warfare
Manjula Pradeep Gunathilake
 
Insurgency(m)
Insurgency(m)Insurgency(m)
Insurgency(m)
manoj kumar sood
 
Indicators Of Insurgency
Indicators Of InsurgencyIndicators Of Insurgency
Indicators Of Insurgency
Krishan Lal
 
Gender inequality presentation
Gender inequality presentationGender inequality presentation
Gender inequality presentation
tonyacsi
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
Mandy Suzanne
 

Viewers also liked (9)

Baloch insurgency
Baloch insurgency Baloch insurgency
Baloch insurgency
 
Indicators of insurgency(m)
Indicators of insurgency(m)Indicators of insurgency(m)
Indicators of insurgency(m)
 
Muslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencyMuslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And Insurgency
 
Isaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 DecIsaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 Dec
 
Counter Guerrilla Warfare
Counter Guerrilla WarfareCounter Guerrilla Warfare
Counter Guerrilla Warfare
 
Insurgency(m)
Insurgency(m)Insurgency(m)
Insurgency(m)
 
Indicators Of Insurgency
Indicators Of InsurgencyIndicators Of Insurgency
Indicators Of Insurgency
 
Gender inequality presentation
Gender inequality presentationGender inequality presentation
Gender inequality presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Information in insurgency

communication and media.pptx
communication and media.pptxcommunication and media.pptx
communication and media.pptx
RinaJuwita3
 
the final frontier?
the final frontier?the final frontier?
the final frontier?
FJWU
 
Pharma and Social Media: What's the New Normal?
Pharma and Social Media: What's the New Normal?Pharma and Social Media: What's the New Normal?
Pharma and Social Media: What's the New Normal?
Steve Woodruff
 
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptxMEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
LOVELITAFERNANDO
 
3.2. Terrorism Quiz
3.2. Terrorism Quiz3.2. Terrorism Quiz
3.2. Terrorism Quiz
Øyvind Kalnes
 
Collective action under autocracies
Collective action under autocraciesCollective action under autocracies
Collective action under autocracies
Zeynep Tufekci
 
Small Ideas for ICRC
Small Ideas for ICRCSmall Ideas for ICRC
Small Ideas for ICRC
Sanjana Hattotuwa
 
How wewin2016
How wewin2016How wewin2016
How wewin2016
Kathleen Schassler
 
Chapter 1 - Mass Communication and Its Digital Transformation
Chapter 1 - Mass Communication and Its Digital TransformationChapter 1 - Mass Communication and Its Digital Transformation
Chapter 1 - Mass Communication and Its Digital Transformation
jbraun128
 
Networked communications: The New Normal
Networked communications: The New NormalNetworked communications: The New Normal
Networked communications: The New Normal
Steve Woodruff
 
Zeynep pdf
Zeynep pdfZeynep pdf
Zeynep pdf
Zeynep Tufekci
 
Social Media for the Meta-Leader
Social Media for the Meta-LeaderSocial Media for the Meta-Leader
Social Media for the Meta-Leader
Taha Kass-Hout, MD, MS
 
Impact of social media on youth
Impact of social media on youthImpact of social media on youth
Impact of social media on youth
Ankit Ranjan
 
Debunking sm revolution
Debunking sm revolutionDebunking sm revolution
Debunking sm revolution
yus121
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity
Johannes Meier
 
Mycelia Impact.pdf
Mycelia Impact.pdfMycelia Impact.pdf
Mycelia Impact.pdf
Mycelia1
 
Digital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasDigital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideas
nelliesk
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentation
NewMediaActivism
 
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxWeb 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
davieec5f
 
In his 2000 work
In his 2000 workIn his 2000 work
In his 2000 work
photographyatharlow
 

Similar to Information in insurgency (20)

communication and media.pptx
communication and media.pptxcommunication and media.pptx
communication and media.pptx
 
the final frontier?
the final frontier?the final frontier?
the final frontier?
 
Pharma and Social Media: What's the New Normal?
Pharma and Social Media: What's the New Normal?Pharma and Social Media: What's the New Normal?
Pharma and Social Media: What's the New Normal?
 
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptxMEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
 
3.2. Terrorism Quiz
3.2. Terrorism Quiz3.2. Terrorism Quiz
3.2. Terrorism Quiz
 
Collective action under autocracies
Collective action under autocraciesCollective action under autocracies
Collective action under autocracies
 
Small Ideas for ICRC
Small Ideas for ICRCSmall Ideas for ICRC
Small Ideas for ICRC
 
How wewin2016
How wewin2016How wewin2016
How wewin2016
 
Chapter 1 - Mass Communication and Its Digital Transformation
Chapter 1 - Mass Communication and Its Digital TransformationChapter 1 - Mass Communication and Its Digital Transformation
Chapter 1 - Mass Communication and Its Digital Transformation
 
Networked communications: The New Normal
Networked communications: The New NormalNetworked communications: The New Normal
Networked communications: The New Normal
 
Zeynep pdf
Zeynep pdfZeynep pdf
Zeynep pdf
 
Social Media for the Meta-Leader
Social Media for the Meta-LeaderSocial Media for the Meta-Leader
Social Media for the Meta-Leader
 
Impact of social media on youth
Impact of social media on youthImpact of social media on youth
Impact of social media on youth
 
Debunking sm revolution
Debunking sm revolutionDebunking sm revolution
Debunking sm revolution
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity
 
Mycelia Impact.pdf
Mycelia Impact.pdfMycelia Impact.pdf
Mycelia Impact.pdf
 
Digital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasDigital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideas
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentation
 
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxWeb 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
 
In his 2000 work
In his 2000 workIn his 2000 work
In his 2000 work
 

Recently uploaded

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 

Recently uploaded (20)

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 

Information in insurgency

  • 1. Presentation to the RAND Insurgency Board, June 2012 Steven Metz U.S. Army War College Strategic Studies Institute
  • 2. Enduring Nature A strategy of violence used by the weak against a power structure Shifts decisiveness across domains Core functions: survive; weaken power structure; strengthen self Changing Character Organization Objectives Connections Role and form of violence Operational methods
  • 3. Driving forces are inherent innovation and emulation of success In the modern era, emulation has surpassed inherent innovation in importance 20th century: Maoist, proto-state model became the gold standard Simultaneously strengthen selves, weaken state Ultimate success when insurgency had become state like 21st century: dispersed, networked, swarming, terrorism-focused, transnational
  • 4. Improved state security systems The decline of state sponsorship New technology and systems for using the technology which make the dispersed, networked, swarming, terrorism-focused, transnational model of insurgency more viable and effective Especially the Internet/new media
  • 5. Technology Internet, laptops and tablet computers, image capture and editing, mobile communication, GPS Systems Web pages, email, file sharing, chat, blogs, microblogs, IM, SMS, cloud storage Culture Vastly expanded connectivity Creation of new communities and identities Anti-authoritarianism Depersonalization Blurring distinction reality and virtual New basis for credibility Wiki knowledge development
  • 6. How insurgents use it Recruiting, network building, mobilizing support Training Intelligence collection Operational planning and strategy development Financing Psychological offensive operations/amplification Why insurgents use it Low entry cost in terms of training and money Low risk From "amongst the people" to inside the matrix Facilitates a shift to the psychological domain Immense increase in potential audience, recruits, supporters, partners
  • 7. The dispersed, networked, swarming, terrorism-focused, transnational model of insurgency is more viable and effective Dense information flows and cheap/rapid communication facilitate networked organization and swarming techniques Insurgents can aggregate broad currents of anger, frustration, and resentment This can spark insurrection which can be a precursor to insurgency, i.e. insurgents have a surge capability Insurgencies composed of diverse nodes may not need a unifying ideology Multiple connections allow the creation of complex, even conflicting narratives Survival of the fittest--reinforce the narrative that seems to work
  • 8. Reliance on the Internet/new media propels an insurgency toward terrorism focused methods The commitment of online, tech savvy recruits has a short lifespan Terrorism is a "use them or lose them" method Terrorism is easier to plan and train for online or with limited physical interaction The Internet and new media amplify the psychological effects of terrorism by greatly expanding the audience and bypassing traditional media for explanation
  • 9. al Qaeda Egypt 2.0 Taliban Libya al Qaeda 1.0 Traditional, proto-state "Pure" Internet/new media insurgencies which based insurgencies adopt the Internet/new media as an applique
  • 10. The bad news: dispersed, networked, swarming, terrorism-focused, transnational insurgencies are very hard to eradicate Because they are transnational and virtual based, they can pop up somewhere else if quashed in one place It's nearly impossible to eradicate anger, frustration, and anti-authoritarianism The good news: dispersed, networked, swarming, terrorism-focused, transnational insurgencies are unlikely to attain decisive success in the absence of major outside intervention if the initial insurrection fails
  • 11. Much of what we think we know about insurgency may be approaching obsolescence The universality of the Maoist, proto-state model The concepts of legitimacy, building state capacity, winning popular support The ability of states to succeed at creating and sustaining a viable counterinsurgent narrative The ability of states to destroy networks