× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



This is a multi-part message in MIME format.
--
Hi Folks,

I get this from Stratfor "a global intelligence agency" and prior to the
events of the past week, they have proven to be VERY insightful in a
number of things globally... I get the "freebie" part so it is OK by
them to pass it along. They are at  www.stratfor.com

Chuck
--
Delivered-To: clewis@iquest.net
Mailing-List: contact redalert-help@stratfor.com; run by ezmlm
Precedence: bulk
Delivered-To: mailing list redalert@stratfor.com
Delivered-To: moderator for redalert@stratfor.com
Date: Fri, 14 Sep 2001 16:37:08 -0500 (CDT)
From: <alert@stratfor.com>
To: redalert@stratfor.com
Subject: No Easy Battle

____________________________________________________

S T R A T F O R

THE 
GLOBAL INTELLIGENCE COMPANY

____________________________________________________
13 September 2001

COMPLIMENTARY INTELLIGENCE REPORT - FULL TEXT
____________________________________________________

**NOTE**

This is a 
complimentary full-text intelligence report, 
normally reserved for members 
only. For full-text reports 
every day and access to the full range of global 
intelligence, become a member today!

        
http://www.stratfor.com/COMPANY/info.htm
____________________________________________________

No Easy Battle
2000 GMT, 
010914

Summary

In the wake of this week's terrorist attacks in the 
United 
States, the U.S. government is trying to decide 
how it can defeat its new 
style of enemy. The key to 
victory is finding the enemy's center of gravity, 
or 
what enables it to operate, and destroying it. But what 
has worked for the 
U.S. military in the past may not be 
enough this time around.

Analysis

The 
foundation of any successful military operation is 
defining and attacking the 
enemy's center of gravity: 
the capacity that enables it to operate. A war 
effort 
that does not successfully define the enemy's center of 
gravity, or 
lacks the ability to decisively incapacitate 
it, is doomed to failure. 

The 
center of gravity can be relatively easy to define, 
as was the Iraqi command 
and control system, or 
relatively difficult to define, as was Vietnam's 
discovery of America's unwillingness to indefinitely 
absorb casualties. In 
either case, identifying the 
adversary's center of gravity is the key to 
victory.

In the wake of this week's terrorist attacks in the 
United States, 
this question is now being discussed in 
the highest reaches of the American 
government. The 
issue, from a military standpoint, is not one of moral 
responsibility or legal culpability. Rather, it is what 
will be required to 
render the enemy incapable of 
functioning as an effective force. Put 
differently, what 
is the most efficient means of destroying the enemy's 
will 
to resist?

This is an extraordinarily difficult process in this 
case because 
it is not clear who the enemy is. Two 
schools of thought are emerging though. 

One argues that the attackers are essentially agents of 
some foreign 
government that enables them to operate. 
Therefore, by either defeating or 
dissuading this 
government from continuing to support the attackers, 
they 
will be rendered ineffective and the threat will 
end.

Such a scenario is 
extremely attractive for the United 
States. Posing the conflict as one between 
nation-states 
plays to American strength in waging conventional war. A 
nation-state can be negotiated with, bombed or invaded. 
If a nation-state is 
identified as the attackers' center 
of gravity, then it can by some level of 
exertion be 
destroyed. There is now an inherent interest within the 
U.S. 
government to define the center of gravity as Iraq 
or Afghanistan or both. The 
United States knows how to 
wage such wars.

The second school of thought 
argues that the entity we 
are facing is instead an amorphous, shifting 
collection 
of small groups, controlled in a dynamic and 
unpredictable manner 
and deliberately without a clear 
geographical locus. The components of the 
organization 
can be in Afghanistan or Boston, in Beirut or Paris. Its 
fundamental character is that it moves with near 
invisibility around the 
globe, forming ad hoc groups 
with exquisite patience and care for strikes 
against its 
enemies.

This is a group, therefore, that has been deliberately 
constructed not to provide its enemies with a center of 
gravity. Its diffusion 
is designed to make it difficult 
to kill with any certainty. The founders of 
this group 
studied the history of underground movements and 
determined that 
their greatest weakness is what was 
thought to be their strength: tight 
control from the 
center. 

That central control, the key to the Leninist 
model, 
provided decisive guidance but presented enemies with a 
focal point 
that, if smashed, rendered the organization 
helpless. This model of 
underground movement accepts 
inefficiency -- there are long pauses between 
actions -- 
in return for both security, as penetration is 
difficult, and 
survivability, as it does not provide its 
enemies with a definable point 
against which to strike.

This model is much less attractive to American 
military 
planners because it does not play to American 
capabilities. It is 
impervious to the type of warfare 
the United States prefers, which is what one 
might call 
wholesale warfare. It instead demands a retail sort of 
warfare, in 
which the fighting level comprises very 
small unit operations, the geographic 
scale is 
potentially global and the time frame is extensive and 
indeterminate. It is a conflict that does lend itself to 
intelligence 
technology, but it ultimately turns on 
patience, subtlety and secrecy, none of 
which are 
America's strong suits.

It is therefore completely understandable 
that the 
United States is trying to redefine the conflict in 
terms of 
nation-states, and there is also substantial 
precedent for it as well. The 
precursor terrorist 
movements of the 1970s and 1980s were far from self-
contained entities. All received support in various ways 
from Soviet and 
Eastern European intelligence services, 
as well as from North Korea, Libya, 
Syria and others. 
From training to false passports, they were highly 
dependent on nation-states for their operation.

It is therefore reasonable to 
assume the case is the 
same with these new attackers. It would follow that if 
their source of operational support were destroyed, they 
would cease to 
function. A bombing campaign or invasion 
would then solve the problem. The 
issue is to determine 
which country is supplying the support and act.

There 
is no doubt the entity that attacked the United 
States got support from state 
intelligence services. 
Some of that support might well have been officially 
sanctioned while some might have been provided by a 
political faction or 
sympathetic individuals. But 
although for the attackers state support is 
necessary 
and desirable, it is not clear that destroying involved 
states 
would disable the perpetrators.

One of the principles of the attackers appears 
to be 
redundancy, not in the sense of backup systems, but in 
the sense that 
each group contains all support systems. 
In the same sense, it appears 
possible that they have 
constructed relationships in such a way that although 
they depend on state backing, they are not dependent on 
the support of any 
particular state.

An interesting development arising in the aftermath is 
the 
multitude of states accused of providing support to 
the attackers: 
Afghanistan, Iraq, Iran, Pakistan, 
Algeria and Syria, among others, have all 
been 
suggested. All of them could have been involved in some 
way or another, 
with the result being dozens of nations 
providing intentional or unintentional 
support. The 
attackers even appear to have drawn support from the 
United 
States itself, as some of the suspected hijackers 
reportedly received flight 
training from U.S. schools. 

The attackers have organized themselves to be 
parasitic. 
They are able to attach themselves to virtually any 
country that 
has a large enough Arab or Islamic 
community for them to disappear into or at 
least go 
unnoticed within. Drawing on funds acquired from one or 
many 
sources, they are able to extract resources 
wherever they are and continue 
operating.

If such is the case, then even if Iraq or Afghanistan 
gave 
assistance, they are still not necessarily the 
attackers' center of gravity. 
Destroying the government 
or military might of these countries may be morally 
just 
or even required, but it will not render the enemy 
incapable of 
continuing operations against the United 
States. 

It is therefore not clear 
that a conventional war with 
countries that deliberately aided the culprits 
will 
achieve military victory. The ability of the attackers 
to draw 
sustenance from a wide array of willing and 
unwilling hosts may render them 
impervious to the defeat 
of a supporting country. 

The military must 
systematically attack an organization 
that tries very hard not to have a 
systematic structure 
that can be attacked. In order for this war to succeed, 
the key capability will not be primarily military force 
but highly refined, 
real-time intelligence about the 
behavior of a small number of individuals. 
But as the 
events of the last few days have shown, this is not a 
strength of 
the American intelligence community. 

And that is the ultimate dilemma for 
policymakers. If 
the kind of war we can wage well won't do the job, and 
we 
lack the confidence in our expertise to wage the kind 
of war we need to 
conduct, then what is to be done? The 
easy answer -- to fight the battle we 
fight best -- may not be the right answer, or it may be only part of the 
solution.
____________________________________________________


<<<<<<<<<<<< 
SEND THIS TO A FRIEND! >>>>>>>>>>>>>

Did you like this analysis? Then forward 
it to a friend!

Got this from a friend? Get your own by becoming a member!

   
     http://www.stratfor.com/COMPANY/info.htm

<<<<<<<<<<<<<<<<<<<<<< 
>>>>>>>>>>>>>>>>>>>>>>>>>>>>


____________________________________________________

CONTACTS AND CUSTOMER 
SERVICES:
   STRATFOR
   700 Lavaca, Suite 405 Austin, TX 78701
   Phone: 
512-744-4300
   Internet: http://www.stratfor.com/
   Email: info@stratfor.com

ADVERTISE
   For information on advertising in the GIU or any
   section of the 
STRATFOR website, please email us
   at advertising@stratfor.com
ннннннннннннннннннннннннннннннннннн0D(c) 2001 Strategic Forecasting LLC. All 
rights reserved.


--



As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.