War is transforming itself before our eyes, turning into something unfamiliar and strange. Information has taken a place as a major class of weaponry, with sabotage and subterfuge as preferred tactics. On the new battlefield, these weapons are available not only to nation-states, but to organizations and even individuals.
The Revolution in Military Affairs (RMA) is something that ought to be more widely known than it is. Starting in the 1980s, advances in cybernetics and communications began having a dramatic impact had on military operations. Such innovations as Precision-Guided Munitions (PGMs) and high channel capacity communications systems not only increased the effectiveness of individual weapons systems, but, acting as force multipliers, they also boosted the capabilities of entire units to a point where they could take on and defeat enemy forces that in the past would have been considered far superior.
The impact of the RMA became apparent in the First Gulf War of 1990-1991. Most of the two-thirds of a million Coalition troops deployed in Saudi Arabia never engaged with enemy forces. The Iraqis were defeated by a handful of spearhead units so technologically superior to the Warsaw Pact-type Iraqi units that there was no contest. In 2003, a much smaller Coalition force routed the Iraqis, utilizing all the technological advantages that had appeared in the ensuing twelve years. (Unfortunately, Donald Rumsfeld attempting to carry out the occupation of Iraq with the same size force, demonstrating that the RMA does not extend to civil affairs.)
But despite all the speculation surrounding the RMA, few foresaw the arrival of a second phase in which the breadth, execution, and very definition of warfare would be transformed. The new technology empowered not only military forces, but also intelligence agencies and even non-state actors. Utilizing communications and cybernetics innovations, the new combatants can, under the right circumstances, have an impact rivaling that of entire nation-states, causing serious turmoil and damage with a minimal outlay of effort. In 2010, we have been introduced to this mutated form of warfare by two distinct events: Stuxnet and WikiLeaks.
Stuxnet is the trojan "malware" (somehow the term doesn't seem quite fitting in this case) infiltrated into Iranian nuclear weapons program infotech systems. Its creators are unknown (for the record, I would surmise that these were the U.S. and Israel, the U.S. possessing the knowhow and the Israelis the espionage network). Its effects have been substantial but as yet unquantified, and they may remain so. One curiosity concerning the incident lies in the fact that damage estimates have continued to grow in the months since the worm was first discovered. Even Iranian strongman Ahmadinejad has, very much against his will, been forced to acknowledge the damage the program wrought. The Iranian nuclear effort has not yet returned to normal operations. Some question exists as to whether it can.
Since Stuxnet was discovered in July of this year, considerable effort has gone into analyzing it by computer security outfits such as Symantec and Kaspersky Labs, as well as agencies generally known by their initials. Expert conclusions can be best termed "disturbing." The Stuxnet worm is serious sci-fi malware, not something made up by a comp sci major in his dorm room. Embodying several innovations not previously encountered, it comprises a multi-targeted, multitasking IT warhead of unparalleled capabilities.
While much of the story remains conjectural, what we know is this: the worm was seeded in home PCs in the area surrounding Iranian nuclear facilities, presumably in computers belonging to Iranian techs and scientists. The program infected one or more flash drives, which carried it into the nuclear sites. There it targeted the centrifuge cascades used to enrich uranium. Stuxnet was programmed to manipulate these centrifuges, which number in the thousands, in a particular way -- by causing them to suddenly speed up well faster than their design limits without destroying them. This accomplished two things: it damaged the machines, and also cut the purity of the uranium, rendering it useless. This is an interesting point -- previous speculation on destroying the cascades has revolved around driving the centrifuges out of control. Since these machines revolve at a speed of several thousand RPM, increasing the speed uncontrollably would cause them to simply disintegrate.
But Stuxnet was specifically designed to avoid this. Why? To continue the process as long as possible without calling attention to itself. There's only one rational reason for such a tactic: while disabling the cascades, Stuxnet was also doing something else.
What follows is speculation -- what I would want a cyberwarfare worm to do if I were to order one. We can assume that Stuxnet was sending copies of itself out of the facilities, possibly by way of the same people who brought it in, and then contacting its creators through external computers. As the months passed, it forwarded more and more detail about the Iranian program. By now, the white hats know as much about Iranian nuclear initiatives as the Iranians themselves, if not more. And this involves not only facilities and technology, but also personnel -- it's well within the realm of possibility that the two nuclear scientists attacked on November 29 (one was killed, the other badly wounded) were identified as crucial to the Iranian effort by Stuxnet. As knowledge of the Iranian program grew, it's likely that Stuxnet was adapted to target different facilities. Distinct "mods" could be programmed to perform varying tasks. The Iranians have put off the ignition of the Bushehr reactor several times with no explanation, suggesting serious problems. Lingering effects of Stuxnet are not out of the question. Beyond that, the possibilities are endless. Consider an app that could change or lose internal e-mails while they were being sent, or place suspicious or misleading files in an engineer's computer, and so on. Between Stuxnet and covert action, the mullahs' nuclear program is being dismantled piece by piece. Lastly, it's possible that we haven't heard the end of the Stuxnet story. Copies could be still hiding in odd nooks and crannies of the Iranian system, with the computers reprogrammed to overlook the fact that they exist. The very possibility must weigh heavily on the mullahs and their servants.
Serves 'em right for using Windows.
A cyber warhead of this sophistication represents an evolution even more profound than the introduction of ironclads in the Civil War or aircraft in WWI. What this means in immediate terms is a constant, continual cyberwar on the Cold War espionage model. Adversaries will endlessly probe potential enemies (not to mention friends) to discover weaknesses and pry out secrets. (The behavior of China over the past few years suggests that this state of affairs is already the case.)
The first strike in any war from here on in will be cybernetic, in hopes of paralyzing an enemy's armed forces and shattering his society. Under these circumstances, the most important military figure in sense of pure national defense will be the cybertechnician, much as the missile launch officer was the most crucial during the Cold War. The American military need a bottom-up evaluation of its entire military IT system, including training, doctrine, and practice, to assure that we are capable of addressing this challenge. Such an action can't be expected from the current administration, preoccupied as it is with such critical matters as eliminating DADT and assuring that military vehicles use their fair share of ethanol. But it should be the first thing on the agenda when an adult administration again takes office. The survival of the United States as a superpower depends on it.
Further evidence of that fact is easily obtained from the WikiLeaks saga. It is no exaggeration to state that Julian Assange is engaged in warfare. He is at war -- not simply with the U.S., although the U.S. is his current bête noire, but with the human race as a whole. He is a would-be Alexander, intent on bending the world to his will, with little concern who gets hurt while he's doing it. He sees himself as a mythic figure, above and beyond the run of normal humanity, a man with a historical mission. (This is no rarity, unfortunately -- see Obama, Barack.) His followers see him as an Apollo bringing forth a new age.
Yet the world isn't bending, and the new age remains unborn. Despite all the excitement, Assange's impact has been minimal. Until incarcerated, he simply dropped one info-bomb after another, then ran off and hid, perhaps loitering to paw a woman or two in the process. It's an unedifying spectacle, nothing Alexandrine or Napoleonic about it.
It has been an axiom of the left since the days of the New Masses and the Daily Worker that if "the people" knew what was "really going on," what decisions were being made and crimes committed "in their name," they'd simply rise up in their wrath to smash the pillars of the temple and smite the evildoers. This is the impulse behind the Pentagon Papers, all those flicks that end with the main character pausing meaningfully before entering the Times building, and, for that matter, the entire Plame saga, now appearing in a multiplex near you. That is the role that Assange is playing in real time and on the world stage. And yet... far from ushering a new non-Matrix reality, he's cowering in a British hoosegow waiting for the Swedish cops to get the spelling right on his rape warrant, his site is being locked out from every host and service on the net, from Amazon to PayPal to XXX Real Live Bondage XXX for all I know, while the world awaits his next info-bomb not with dread or exultation, but with much the same sense of titillation as greets the antics of Britney or Jon Gosselin. What went wrong?
The information is trivial. There are no blockbusters or nation-breakers in the material yet released. No secret fleets of black helicopters. Karl Rove is not scheming to sell humanity to the aliens. The CIA is not transplanting children's brains into chimpanzees in the Langley basement. What we have learned instead is that the Saudis are terrified at the prospect of a nuclear Iran, that the U.S. is cutting quiet anti-terror deals with countries such as Yemen, and that Hamid Karzai is as corrupt as he is charismatic. In other words, nothing at all new to anyone paying attention to media reports. The big disclosure is how little of this stuff needed to be secret in the first place.
There have been loud gasps in some circles at the "news" that Hillary instructed her diplomats to seek out intelligence. This is asinine. Diplomats have been low-key intelligence agents as long as they've existed. For centuries they were often the only intelligence force many states possessed. The practice was not invented by Hillary, or Condi, or even Talleyrand, for that matter. It's part of the job description. All this "revelation" does is provide Dick Morris with ammunition to continue his never-ending feud with Hillary. The only item that surprised me was news of China's impatience with North Korea, which I never thought they'd admit to anybody, but there it is. Since one of the drivers of the recent crisis has been the conviction that China would back up North Korea to the last ditch, it appears that our would-be Australian Samson has succeeded only in defusing a current tension point. Good going -- how does a Nobel sound?
The damage is minimal. There has been a lot of concern expressed over damage to the U.S. as a whole, to American diplomacy, and to the international community. I don't see it. The Saudis are not going to sever relations or cease sharing intelligence, not with a pack of crazy Shi'ites intent on building A-bombs right across the Gulf. The Yemenis are not going to toss the infidels out and allow al-Qaeda to march into Sana'a next week. What damage does exist can be easily repaired since it's in the interests of all concerned to do so.
Examine the chain of events. The gruff, hard-bitten Bradley Manning stole a lot of secret e-mails and sent them to WikiLeaks. The e-mails originated in large part from the Defense Department, run by Robert Gates, and the State Department, run by Hillary Clinton. The Justice Department, run by Eric Holder, couldn't figure out what to do about it. All these people work for Barack Obama. That's a pretty impressive lineup. All that we're missing is Van Jones, and he'll probably pop up. If anybody sees a sign of the reliable, dutiful United States in that picture, the U.S. that serves as global sheriff and last resort of desperate nations and peoples worldwide, kindly point it out to me. All I see is the weird, twisted caricature that Obama and company have been trying to foist on us lo these past two years. It is that fantasy leftist U.S. that will take the major hit -- as long as the center-right doesn't line up to support O and his menagerie in a fit of false patriotism. This is not an American screw-up -- it is the ultimate Democratic foreign policy fiasco. It has all the symptoms: an unbalanced clown in a position of trust, loosened security standards, aloofness and ignorance at the highest levels, and pure ineptitude elsewhere. We have seen it a thousand times under LBJ, Carter, and Clinton, and here it is again. I'm certain that most foreign leaders would agree, whatever they may say for public consumption. What is going through their minds now is this: this is what happens when they put a Democrat in charge over there.
Yes, there has been ancillary damage to the United States. But the catastrophic damage is limited to the Democratic brand -- the ultimate proof, written in letters a mile high, that if Luxembourg were to attack the U.S. with a Democrat in office, we'd all be subjects of the Grand Duke two weeks later, without, furthermore, anybody being able to figure out how it happened.
For this point of view, it's clear that Julian has been calling in artillery rounds on his own position.
Assange's followers are flakes. These are not Red Guards or Khmer Rouge; these are the potential victims of Red Guards and Khmer Rouge -- foolish, childish, spoiled, miseducated (and possibly ineducable), the dregs of millennial society. They exist in a dream reality, feeding on myths that any normal individual would reject half-heard: that the world is run by means of conspiracy. That capitalism is evil. That Marxism is about sharing. That 9/11 was an inside job. That Michael Moore and Joseph C. Wilson IV are heroic figures. And most of all, that a brave new world lies just around the corner if we only do the right thing.
These people -- the lumpen-intellectuals -- have been bereft in recent months. Their last messiah let them down badly. It has been two years since 2008, and we're still in the bad old world, with Gitmo open, George W. Bush unarrested, and the oceans purportedly still rising. But now they have a new messiah, one whose prophecies remain tantalizingly vague and thus all the more enticing.
What we have here is a religious war, with the left's true believers against everybody else. Fortunately, their method of fighting amounts to sending out e-mails deriding Bristol Palin. In this view, Assange is the latest of those peculiar historical figures who appear when a system is collapsing, vocally assuring its triumph while practically guaranteeing its extinction -- Savonarola in 15th-century Florence, Tenskwatawa and Sitting Bull among the 19th-century Indian tribes, Gorbachev in the last days of the USSR. This new crusade will end just as badly as they all do. (Anyone seeking evidence of terminal flakiness will find it in this Q&A. One of the questioners unburdens himself of the major puzzle that's been gnawing at him: what about UFOs? Julian A. assures him that the data's on the way. The truth is out there!) Assange is not too bright. Assange has an obsessive's grasp of IT, and that's about it. The balance of his ideas are on a level with those of his followers -- the same as those of a somewhat thick college sophomore who gets most of his information from the tube.
Consider his strategy. Rather than analyze the e-mails on hand, collate them, sort them, select the one ones with the greatest potential for controversy, and release them where they would have the most impact, he simply throws everything out at once. Why? Because he doesn't know any better. Think of what could have been done with the same information by someone with a more sophisticated grasp of politics -- someone who would have contacted interested parties, who obtained financing or protection by guaranteeing certain messages would -- or would not -- be released. Who would use what he had to pry or bluff further information. Consider what chaos could have been created if this material had been data-mined on behalf of the al-Qaeda or another enemy force. Consider what a Metternich, a Lenin, or a Goebbels would have accomplished with such material.
In light of the possibilities, the actual results are unimpressive. Whatever damage Assange has achieved can in no way match the apocalyptic ruin he was seeking to trigger. He must be far more bewildered and frustrated that he's letting on: it's not like the movies. What happened?
The question remains as to why Assange has been allowed to continue. Part of the answer undoubtedly lies in incompetence -- it's a real puzzle as to exactly what would have to happen to make Eric Holder do the smart thing. But a deeper explanation may lie at the exact opposite pole -- in the omnicompetence of the Intelligence Community that remains untouched by Obama's influence.
It has been known that Assange possessed this material for nearly a year. It was understood that there was no means of getting it back or preventing its release. So what was the alternative? If you've got a lemon, you make lemonade.
Any number of methods exist for manipulating Assange and his organization -- send WikiLeaks fake files, locate their archives and insert new files, manipulate e-mails and other messages, and others that even my nasty imagination would miss without specialized training. As for the purpose -- that's not difficult to envision. A message implying that certain jihadi leaders are on the payroll. That a critical North Korean officer is a Western agent. That certain things that Osama, the mullahs, or Dear Leader wanted done were not done, or were botched in the doing. (In the late 1930s, German intelligence eliminated Soviet Marshal Tukachevsky, the actual formulator of the blitzkrieg strategy, and his entire general staff by exactly this means. Even if the victim suspects the info is false, he still has to take some action. Needless to say, the ultra-paranoid Stalin didn't require much prompting.) It is likely that Assange is being used, possibly by several parties. They know his every move, what he's doing, whom he's in contact with. (While he was fleeing Sweden at the end of last summer, two laptops in his luggage vanished, along with all data media. See "not too bright" above.) His organization has been penetrated, with all new leaked material traced and accounted for. It's fairly certain that everyone involved has been tracked down by this time, with none of them capable making a move unobserved. Assange is now a puppet, acting out against his will the role of Goethe's Mephistopheles, "Who wills forever evil, and does forever good." (Keep in mind that this holds true even is he is forced to address the charges in Sweden. The rape charges are ancillary matters, unrelated to WikiLeaks -- in fact, little more than a distraction.)
But eventually, Assange's usefulness will end. Then he will vanish -- not by means of a hit squad, but far more subtly and elegantly. A batch of documents from Russia, the mob, or Hamas will appear on the WikiLeaks site, and in short order, Julian and everyone who ever worked for him will be seen in their regular haunts no longer. A wise intelligence service will have film footage of Julian being jammed into a car by figures easily identifiable as to country of origin.
My sympathy will be well-controlled. People have died -- and more will die -- because of this man's actions. It is apparent in the manner in which he abuses women that Assange is a psychopath. Such figures grow worse as they grow more deluded. Under the circumstances, the sooner the better.
The first aircraft raids were carried out by pilots tossing grenades from open-cockpit biplanes. We are the same position as the soldiers gazing up out of the trenches and wondering what the hell that was all about as the offending kite puttered off into the clouds. People in 1914 were not yet introduced to the concept of technological extrapolation; they did not even consider the possibility of the vast air fleets, ruined cities, and atomic bomb strikes that were to grow from such trivial origins. After a century of whirlwind technology, we know better.
How do we defend ourselves on the transformed global battlefield? National militaries are studying both Stuxnet and WikiLeaks closely, not to mention thousands of hackers sitting in their basements considering how much better they'd have handled it than Julian A. We can take it for granted that the same level of discussion and analysis is occurring in American military and intelligence circles. As already noted, nothing can be expected from the current administration. But when a new one takes office, we can be sure that much of the necessary groundwork for Cyberdefense V.2 will have been accomplished.
But we can't leave it at that. The threat is too great, too vast, and too varied. Nor is it limited to IT. The nightmare possibilities inherent in nanotech and biotech chill the blood. There are already large numbers of serious amateurs carrying out biotech experiments in their homes and offices. Little oversight exists to assure that none of them is attempting to supercharge the plague bacillus. Simply add the dementia of a Charles Manson or the megalomania of a Jim Jones, and the picture comes right into focus.
One figure we can look to is the shadowy one of the Jester, evidently the sole force in the Western world capable of making WikiLeaks dance to its own tune. In the Jester's actions we can see clear similarities to the War on Terror, in which civilians have prevented almost all jihadi attacks while official forces have made ever greater asses out of themselves. We are just as much in the front lines as regards cyberwar as we are in fighting terror. We must consider how to extend and deepen the combatant role that the Jester has pioneered. Grabbing people's crotches, no matter how appealing to the Pistoles and Napolitanos of the world, will accomplish nothing. (One possibility would be an informal network among amateur biotech researchers to provide basic self-policing.) But in the end, we will require something far more profound than tactics, strategy, or organization. We will require a new civility, a mass return to the ideals of responsibility and service that animated civilization up until the modern era. We must revive the concept of the heroic. We need a status quo in which efforts such as WikiLeaks would be considered a scandal and a disgrace by all. After two centuries, the compulsive rebel -- descended from the club-footed Byron and the frail Shelley -- has about run his string. It is a long way down from the maimed grandeur of a Byron to the whining, petulant Assange. Whatever benefit such types may have provided is a matter of dead history. They have shed their attractiveness and outworn their welcome. They are a nuisance at best and a danger at worst. Our civilization has reached a stage where we would be better off without them.
It is possible to transform an entire society in such a fashion. This is exactly what occurred in Great Britain between 1790 and 1840. A rough, violent, and licentious society became one in which gentility, taste, and industry prevailed. This was accomplished through religious fervor, education, and example. The tools exist to duplicate this transformation today. As for the details...they require more in the way of consideration than we have space for at the moment.
J.R. Dunn is consulting editor of American Thinker and will edit the forthcoming Military Thinker. His upcoming book
Death by Liberalism can be found at
Amazon.com. Copyright - Original materials copyright (c) by the authors.