The five young men detained in Pakistan this week -- like a whole new generation of jihadis -- appear to have made considerable use of the Internet in their alleged approach to al Qaeda. Their story points out that, more than eight years after 9/11, terrorist networks are still not only able to stay in touch via cyberspace, but that they are even extending their reach thanks to our giving them a free ride in the virtual domain.
U.S. President Barack Obama often speaks about his central strategic objective of denying al Qaeda its haven in Waziristan, but he says nary a word about taking away its "virtual haven" in cyberspace. This omission is more than his alone, as none of the key military, intelligence, and law-enforcement arms of the U.S. government have done much to curtail terrorist use of the Net.
Those who do try to keep an eye on terrorism in cyberspace often argue that they learn a lot about enemy networks by monitoring their narratives on jihadi websites. But if this made a real difference, we would have already won the war on terror. Instead of thinking of cyberspace principally as a place to gather intelligence, we need to elevate it to the status of "battlespace." This means that we either want to exploit terrorists' use of the Web and Net unbeknownst to them, or we want to drive them from it.
We need to think of gaining an information edge, like the one enjoyed by the Allies in World War II. In that conflict, the first high-performance computing capability was created, and broke German and Japanese codes, enabling a series of victories to be won -- from the Mediterranean to Midway -- long before Allied material advantages could be brought to bear.
A similar capability fielded today against al Qaeda would do much more than just catch confused young men on their journey to the jihad. It would also intercept the messages that guide the movement of terrorist money, identify existing cells and nodes and enable us to go after them in the physical world, and allow us to preempt new attacks.
The officials I try to lobby in favor of creating this new "Magic" (the American name for the World War II code-breaking capability) always argue that, once the enemy realizes we have this capability, they will go to ground and we will know even less about where they are and what they intend to do next.
1 2 NEXT
U.S. President Barack Obama often speaks about his central strategic objective of denying al Qaeda its haven in Waziristan, but he says nary a word about taking away its "virtual haven" in cyberspace. This omission is more than his alone, as none of the key military, intelligence, and law-enforcement arms of the U.S. government have done much to curtail terrorist use of the Net.
Those who do try to keep an eye on terrorism in cyberspace often argue that they learn a lot about enemy networks by monitoring their narratives on jihadi websites. But if this made a real difference, we would have already won the war on terror. Instead of thinking of cyberspace principally as a place to gather intelligence, we need to elevate it to the status of "battlespace." This means that we either want to exploit terrorists' use of the Web and Net unbeknownst to them, or we want to drive them from it.
We need to think of gaining an information edge, like the one enjoyed by the Allies in World War II. In that conflict, the first high-performance computing capability was created, and broke German and Japanese codes, enabling a series of victories to be won -- from the Mediterranean to Midway -- long before Allied material advantages could be brought to bear.
A similar capability fielded today against al Qaeda would do much more than just catch confused young men on their journey to the jihad. It would also intercept the messages that guide the movement of terrorist money, identify existing cells and nodes and enable us to go after them in the physical world, and allow us to preempt new attacks.
The officials I try to lobby in favor of creating this new "Magic" (the American name for the World War II code-breaking capability) always argue that, once the enemy realizes we have this capability, they will go to ground and we will know even less about where they are and what they intend to do next.
1 2 NEXT
No comments:
Post a Comment