49 online
 
Most Popular Choices
Share on Facebook 34 Printer Friendly Page More Sharing
OpEdNews Op Eds    H2'ed 12/11/14

Stifling Dissent on the Upper East Side

By       (Page 3 of 4 pages) Become a premium member to see this article and all articles as one long page.   No comments
Message Consortium News
Become a Fan
  (3 fans)

Of course, this outlook overlooks what has been a central tenet of al-Qaeda's strategy -- to draw the United States deeper into the Middle East in order to exhaust America financially and militarily, to keep the U.S. locked in this conflict until it suffers a devastating strategic defeat much as was done to the Soviet Union in Afghanistan in the 1980s. But to military COIN theorists, like Petraeus and Boot, al-Qaeda's scheme is outside the scope of their analytical ability.

The Information Battlefield

So, in the minds of the totalitarian-oriented COIN theorists, the war is really about information and the battlefield is everywhere. According to this doctrine, "Insurgent support activities include ... communications. These support activities sustain insurgencies and allow for both military and political actions. They are enabled by an insurgency's ability to generate popular support. ... These networks can include support from other nations or from population groups outside the country."

This paranoid viewpoint is, of course, not unprecedented. Indeed, it has been common for authoritarian systems to label dissent against their war policies as support for insurgents or other "subversives." This attitude has been a common denominator of nearly all despotic military regimes from Hitler's Germany to Pinochet's Chile to modern Egypt under a variety of military rulers: dissent equals treason.

In fact, the COIN Manual cites as an example the case of the Tamil Tigers and the alleged support these insurgents received from civilians of the Tamil diaspora following ethnic riots against the Tamil people that drove many to flee Sri Lanka. According to the manual, this global diaspora then became a major part of the Tamil Tigers' "propaganda network," a statement that would be a bit like charging German Jewish emigres pre-World War II of being part of an American "propaganda network" for telling the truth about conditions in Germany.

FM 3-24 does acknowledge that a prerequisite for an insurgency is "Motive" but adds that grievances alone are not sufficient to spur an insurgency. It takes leaders "to build a compelling narrative that links grievances to a political agenda and mobilizes the population to support a violent social movement. ... When grievances mobilize a population, they are a root cause of an insurgency. ... The presence of a foreign force can be the root cause of an insurgency."

While all that is well and good -- and would apply to almost all political uprisings including the American Revolution -- the lessons drawn from this current obsession with "counterinsurgency" veers off into some dangerous directions. Behind it is the assumption that virtually all insurgencies -- at least those not initiated by Washington -- deserve countering.

Yet, sometimes, indeed often, insurgencies reflect the urgent desires of an oppressed people for justice, meaning that modern counterinsurgency warfare, as practiced by Gen. Petraeus and other U.S. strategists, can become just one more boot on the people's neck.

It also follows that the COIN's obsessive practitioners will begin to detect the enemy within the United States, since the information war is global and the counterinsurgency operation must protect itself against a loss of political will among the American people. Thus, a citizen who asserts that the U.S. invasion and occupation of Iraq was to blame for the Iraqi insurgency could be accused of enabling the insurgency, being part of the enemy's "propaganda network."

In counterinsurgency thinking, "external support" for an insurgency can be something as vague as "moral support."

The Insurgent "Network"

Another pertinent dynamic identified in the COIN Manual is "Organizational and Operational Patterns," which can be almost as ambiguous as "moral support." It is explained that "Insurgents may be organized into networks," a series of "direct and indirect ties from one entity to a collection of entities. " Insurgent networking extends the range and variety of both insurgent military and political actions. " Networks of communications, people, and activities exist in all populations and have a measurable impact on the organized governance of a population and, consequently, military operations."

So "networks" are not limited to insurgents inside the foreign nation where the insurgency is active; these "direct and indirect ties" can extend to all populations and include a variety of friendly, neutral and threat networks, each meriting its own treatment.

Individuals in a network are called "actors or nodes." Connections between nodes are links, and a link between two people is a "dyad." Understanding dyads is essential to understand the nature of an insurgency, per the FM 3-24's doctrine.

This is accomplished through "network mapping, charting, and social network analysis," which are "intelligence products that can aid in refined analysis and course of action developments." Intelligence collection for this purpose would be in the manner of total surveillance, electronically and digitally, as the NSA is alleged to be engaged in globally, including inside the United States.

So what does a counterinsurgent do when encountering a "network?" FM 3-24 prescribes the solution: attack the network.

Next Page  1  |  2  |  3  |  4

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Consortium News Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Consortiumnews.com was founded by Robert Parry in 1995 as the first investigative news magazine on the Internet. The site was meant to be -- and has become -- a home for important, well-reported stories and a challenge to the inept but dominant (more...)
 
Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Did Clinton's Emails Expose CIA Agents?

A Demand for Russian "Hacking" Proof

US Intel Vets Dispute Russia Hacking Claims

VIPS to Trump: Intel on Iran Could be CATASTROPHIC

Judith Miller's Blame-Shifting Memoir

To View Comments or Join the Conversation:

Tell A Friend