Structural Vulnerabilities of Networked Insurgencies: Adapting to the New Adversary
نویسنده
چکیده
T he ongoing conflict in Iraq has sparked a renewed interest in the study of counterinsurgency, leading many to comb the wars of the twentieth century, the “golden age of insurgencies,” for lessons that can be applied to today. Much of this recent analysis has focused on the knowledge gained from fighting Marxist revolutionaries. The insurgent of today, however, is not the Maoist of yesterday. His organization and methods are strikingly different from his twentieth century predecessors. The modern insurgent aims to defeat his opponent by psychological warfare and terrorism instead of military action. He draws his support from criminal networks as opposed to popular mobilization. He fights a netwar not a People’s War. These dissimilarities raise the question of just how much of twentieth century counterinsurgency thought can be applied to twenty-first century conflicts. Methods from past wars are put forth as guiding principles with only a nod towards these differences. Applying these principles without examination could lead, at best, to wasted effort, at worst, to defeat. Sun Tzu said, “Know your enemy.” The structure of a movement, meaning its organization and methods, is the key to understanding it. Modern and Maoist insurgencies are structurally different. In order to be effective, those conducting counterinsurgencies must take into consideration these differences and adapt their methods to the structure of modern adversaries.
منابع مشابه
Structural Properties of Multirate Sampled-Data Systems
The application of Networked Control Systems (NCS) in which sensory and control signals are transmitted via shared data communication networks, is growing significantly and these systems have been the subject of research during the last decade. On the other hand, multirate sampled data systems have been investigated since a long time. In this paper, conditions under which a networked control sy...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملHandling New Adversaries in Secure Mobile Ad-hoc Networks
1. The Problem Invariably, new technologies introduce new vulnerabilities which often enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anticipating new ones. Our adversary models seem to be perpetually out of date: often they do not capture adversary attacks and sometimes they address attacks rendered im...
متن کاملA NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
متن کاملRobust Model for Networked Control System with Packet Loss
The Networked Control System in modern control widely uses to decrease the implementation cost and increasing the performance. NCS in addition to its advantages is inevitable. Nevertheless they suffer of some limitations and deficiencies. Packet loss is one of the main limitations which affect the control system in different conditions and finally may lead to system instability. For this reason...
متن کامل