[Austin-ghetto-list] Asymmetric Warfare- a primer
telebob x
telebob@hotmail.com
Sat, 22 Sep 2001 14:31:17 -0500
Asymmetric Warfare: Old Method, New Concern
David L. Grange
“By indirection find directions out.”
—Shakespeare, Hamlet
Strategists define asymmetric warfare as conflict deviating from the norm,
or an indirect approach to affect a counter-balancing of force. Such warfare
is not new. Combatants throughout the ages have continually sought to negate
or avoid the strength of the other, while applying one’s own strength
against another’s weakness. Asymmetric warfare is best understood as a
strategy, a tactic, or a method of warfare and conflict. Because no group or
state can defeat the U.S. in conventional warfare, America’s adversaries and
potential adversaries are turning to asymmetric strategies. We must
therefore understand asymmetric warfare, and be able to respond in kind.
“When conventional tactics are altered unexpectedly according to the
situation, they take on the element of surprise and increase in strategic
value.”
—Sun Bin, The Lost Art of War
Though there are numerous examples of asymmetry in 20th century warfare, its
use was not as pronounced between adversaries as it is today. Wars were
primarily fought by nation-states with balanced, conventional fighting
capabilities. When asymmetric methods were used, usually in the form of
maneuver or technological advantage, they had a dramatic effect.
Three prominent examples of asymmetric actions that counterbalanced
established force are: the sturmtrupp assault tactics that broke the
trench-line stalemate and three-dimensional warfare as a result of the
airplane during World War I; the panzer blitzkrieg through France in World
War II; and the Strategic Defense Initiative that helped end the nuclear
arms race between the U.S. and the Soviet Union. The kind of asymmetric
strategy and tactics seen in the Vietnam War were termed guerilla warfare.
These asymmetric actions, however, did not produce the dramatic, day-to-day
effects on operations that we have seen since the fall of the Berlin Wall.
At the present time the U.S. has no identified conventional, war-making
peer, as we had prior to Desert Storm. This absence of global peer
competitors makes the world more uncertain, unstable, and difficult to
anticipate. As the sole superpower, with the accompanying expectations
placed on the U.S. and our extensive presence around the world, the U.S. has
become a big and inviting target. The U.S. engages in humanitarian
assistance, peacekeeping, and enforcement of UN or NATO sanctions, and
maintains bases necessary for force projection worldwide. Our adversaries
confront and confuse us with a multitude of asymmetric actions that catch us
by surprise, to which we continue to respond with a Cold War mentality.
Since Desert Storm, our adversaries have learned not to come at us in a
symmetric way since it is impossible for any country to engage the U.S. in
an arms race. By using asymmetric actions, our adversaries exploit our
vulnerabilities; taking advantage of the global information environment,
they are also able to do so on the cheap.
Reality of the Operational Environment
“Whosoever desires constant success must change his conduct with the times.”
—Nicolo Machiavelli, The Prince
Today we see an ambiguous world, with people, groups, and governments
pursuing complex goals. The borders have blurred between governments and
people, military and populace, public and private. New fourth-generation
warriors1, non-national and trans-national groups based on ideology,
religion, tribe, culture, zealotry, and illegal economic activities, have
pushed many regions of the world into anarchy.
Russia is in disarray, with increased fighting within its Muslim states in
the oil-rich Caspian Sea region. The Balkans, though somewhat stabilized,
have enormous corruption problems with no real peace in sight. The
counter-drug war in Colombia and Mexico has intensified. Israel, the Middle
East, North Korea, and Taiwan remain powder kegs.
This dangerous environment, coupled with the increased use of our military
as an extension of U.S. diplomacy, has placed us in a situation where our
adversaries employ asymmetric tactics to negate superior conventional
strength. We Americans look at conflict through a winner’s eyes-usually from
a past war. Setbacks cause concern, and if our quick-fix for the conflict at
hand derails, due to unintended consequences, we usually overreact and are
unable to deal with reality. Our standard approach to adversary actions
means that we have trouble adapting to what we actually find on the ground.
Planned intervention on the cheap, with awkward constraints, is inflexible
and pompous. Past high-tech, standoff warfare is largely ineffective against
these fourth-generation adversaries. We continue trying to play American
football on a European soccer field.
Captain Larry Seaquist notes, “While the U.S. military pushed toward
high-tech, low-casualty combat, war went the opposite direction-toward
brutal neighbor-on-neighbor killing, carried out by ragtag collections of
citizen-warriors, some of them just children.”2
These low-intensity conflicts have no quick-fix solutions. They have complex
cultural, religious, and historical origins where criminality, population
coercion, and extremist politics abound. Asymmetric tactics, usually
conducted out of necessity by our adversaries, are an economy of force and a
weapon of choice.
As Liddell Hart explained, “Campaigns of this kind are more likely to
continue because it is the only kind of war that fits the conditions of the
modern age, while being at the same time suited to take advantage of social
discontent, racial ferment, and nationalist fervors.”3
Our diplomats, commercial investors, and military will continue to
experience the unpredictability, chaos, and asymmetric threats that are
becoming the norm around the world. The greatest threat to world stability
appears to be small, regional wars with which the U.S. will be forced to
contend.4 Are we ready for this type of threat?
The Threat
“It is every Muslim’s duty to wage war
against U.S. and Israeli citizens
anywhere in the world.”
—Osama bin Laden5
Americans separate war and peace; most of our enemies today do not. Osama
bin Laden in Afghanistan, the “Army of Mohammed” in Yemen, and
narco-guerrillas in Colombia are but a few groups that threaten America, our
allies, and regional stability. The extensive, twisted links between
terrorism, black marketers, drug lords, arms dealers, and zealots have
created a formidable enemy.
Most of our adversaries are non-nation-state actors (terrorists,
international and trans-national criminal organizations, or insurgents).
They have a completely different mindset, believing they are continuously at
war. Violence is a way of life. They know violence is an excellent tool
against a democratic people worried about any threat to its way of life.
Taking advantage of the information age, our adversaries are able to show
atrocities, abuse, and destruction on our television screen daily. The
values of enemies are different from ours, making it very difficult for us
to understand why they don’t behave the way we believe they should.
Operating in agrarian cultures, with a small toolbox of dangerous, high-tech
capabilities, they maintain power with machete-wielding intimidation. Most
are predators that take advantage of weak states for refuge, and the
discontent of the local populace for support. If they cannot inspire support
from the people, they coerce recalcitrant members. Once established, they
operate in and out of these areas with impunity.
“Greater powers and resources
do not guarantee tactical superiority.”
—Sun Bin, The Lost Art of War
These fourth-generation enemies have become very adept at using the
asymmetric tactics of information warfare. They manipulate print and radio,
distort images with perception management and background film clips (or “B
Roll”) on global television, and disrupt the Internet. The infosphere has
become a new battleground suited for asymmetric attack from across the
globe. Serbian President Slobodan Milosevic was an expert at using the media
as a weapon. Through deception, disinformation, and the “CNN factor,” he
excelled at this cerebral form of competition.
Saddam Hussein has convinced most of the Iraqi population, many of our
Western allies, and the Arab world that the UN-U.S. sanctions are directed
against the people, not his tyranny. For 10 years, through the use of
asymmetric actions, he has tied up countless ships, troops, and aircraft
without reinstating sanctioned compliance inspections.
The Chinese have taken serious steps in their warfighting strategy for
future conflict. Not only have they steadily enhanced their conventional
arsenal with high-tech innovation, but they have learned the pronounced
effect asymmetric actions have had on the U.S. and its allies over the last
10 years. Two modern-day strategists, Senior Colonel Qiuo Liang and Senior
Colonel Wang Xiangsui, have laid out in detail how to conduct full-spectrum
warfare against the U.S., using asymmetric strategy, in their book
Unrestricted Warfare.6 This warfare strategy doesn’t follow any rules,
counters the U.S.’s high-tech advantages, and optimizes the electro-magnetic
spectrum. All dimensions of space are considered the battleground.
Adversary Actions
“Water shapes its course according to the ground over which it flows;
the soldier works out his victory in relation to the foe whom he is
fighting.”
—Sun Tzu, The Art of War
Recent examples of asymmetric actions abound around the world. Riots planned
by faction leaders, made up of coerced non-combatants, and manipulated by
gangster police, were effective against NATO troops keeping the peace in
Bosnia. Milosevic was able to move special police troops and other thugs at
will throughout Kosovo, destroying life and infrastructure, while NATO’s
unmatched air power was incapable of stopping him.
A group of Palestinians redirected British funds earmarked for education
programs to further ideals of tolerance, mutual respect, and peace, instead
using the money to send children to guerrilla training schools and then put
them on the streets of Israel to fight. This was a successful deception of
the British government’s generosity.7
One of the insurgent forces in Colombia, Fuerzas Armadas Revolucionarias de
Colombia (FARC), has nationally threatened every Colombian millionaire and
corporate CEO unless a tax is paid for protection. This action has produced
immense pressure from the upper class on government authorities in Colombia.
The FARC has also leveraged the Colombian government into conceding a
portion of the country to their control, separated by a recognized and
accepted demilitarized zone. Colombia now has more displaced citizens (one
million) than Kosovo experienced during their war.
Chechen rebels in Russia have demonstrated time after time the effectiveness
of asymmetric action against conventional forces by capitalizing on local
support, information warfare, terror, cutting critical supply lines, and
using urban areas to render irrelevant the superiority of the Russian
armored forces.
Our national expectation of a casualty-free, high-tech conflict is
challenged, for example, by rogue-state impertinence, setbacks dealt by the
warlords of Mogadishu, and terrorist attacks, like those on the USS Cole and
our embassies in Tanzania and Kenya. We have been forced to pull back in
fear, changing our operational effectiveness around the world.
What Can We Do?
“He will conquer who has learnt the artifice of deviation”
—Sun Tzu, The Art of War
Our response to asymmetric actions has usually been to react with defensive,
hunkering-down, panic decisions; or in some cases to retaliate ineffectively
with air or cruise missile attacks, occasionally injuring non-combatants or
disgracing ourselves in the media. We continue to restrict ourselves to
unrealistic rules of engagement, regardless of the situation. Deception,
psychological operations, cyberwar, disinformation, “softwar,”8 are all
non-kinetic ingredients in the toolbox of fourth-generation warriors, that
should, in turn, be used against them.
We must understand that relative strength is situational; it is based on
time, speed, location, and conditions. These intangibles are harder to
define and offer strength in different circumstances. The side that is
weaker in resources or complex command and control systems can balance that
with superior cleverness, morale, offensive attitude, security, surprise,
flexibility, and organizational design that fit the task at hand. We must
preempt enemy asymmetric actions by attacking the cohesion and flow of their
operational cycle.
An adversary must plan, gain support, move, stage, attack, and regroup
during any operation or in pursuit of a cause (Figure 1). We can cause him
to fail anywhere along this process-optimally, prior to his attack phase.
It’s all a matter of gaining positional advantage, mentally or physically,
over an opponent. Our adversaries have been very adept at gaining positional
advantage with asymmetrical action against our moral and organizational
domain (Figure 2). We can reverse this advantage by doing the same.
Asymmetrical targeting (deny, destroy, disrupt, dislocate, degrade) of
adversary moral and organizational domains, instead of our typical,
predictable, standard, conventional approach against physical strength
provides a faster, effective defeat. Indirectly preventing our enemy from
gaining ascendancy over the local population, denying organizations the use
of safe areas, disrupting cash-flow and other supplies, negating effective
use of the media, exposing corruption, disgracing the leadership, breaking
power relationships, will put adversaries on the defensive and force them
off balance.
This requires initiative, momentum, out-of-the-box thinking, flexibility,
and a winning mindset. Crimes against humanity, small wars, and probable
mega-terrorist (biological, chemical, nuclear, information) disasters are
threats worthy of our attention. We must turn the tide on these
fourth-generation warriors using asymmetric actions with a preemptive
strategy. It’s a matter of being the hunter or the prey.
Notes
1. Lind, William S., Maj. John F. Schmitt, and Col. Gary I. Wilson.
“Fourth-Generation Warfare: Another Look,” Marine Corps Gazette, December
1994.
2. Seaquist, Larry. “Community War,” Naval Institute Proceedings, August
2000.
3. Hart, Liddell. Low-Intensity Operations, 1971, p. 16.
4. Grau, Lester and Jacob Kipp. “Small Wars,” NSF Review, Summer 2000.
5. Vince Crawley “Terror Alert,” Army Times, Nov. 6, 2000.
6. Liang, Qiuo and Wang Xiangsui. Unrestricted Warfare, 1996
7. “Why are we paying for children to learn how to kill?” News of the World,
November 5, 2000.
8. Softwar is a term developed by information operations strategist Chuck
DeLaco to describe the hostile use of global visual media to shape another’s
will.
BG (Ret.) David L. Grange is Executive Vice President and Chief Operating
Officer of the Robert R. McCormick Tribune Foundation. He retired from the
U.S. Army in 1999 after 30 years of service, with his final position as
Commanding General of the First Infantry Division. In that position, he
served in Germany, Bosnia, Macedonia, and Kosovo.
forwarded by Telebob
_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp