Feeds

War, Web 2.0 and the Fail Loop

From Hezbollah to Twitter

Gartner critical capabilities for enterprise endpoint backup

Subverting the feedback loop

The Westerner currently most trusted by Hezbollah is a former British diplomat and spy called Alastair Crooke. Crooke, who worked as an agent of the British Secret Intelligence Service (MI6) before being seconded by Tony Blair to be the European Union’s envoy to the Middle East between 1997 and 2003, now lives in Lebanon and spends his time encouraging discussions between Islamist movements and Western governments. After the 2006 war, he was taken to South Lebanon by Hezbollah officials and allowed rare access to its battlefield commanders.

In October 2008 I visited him in Beirut and asked him what he had seen and heard. At the beginning of the 2006 war, Crooke told me, Hezbollah fighters were given general orders and were then broken down into tiny cells, each of which operated quite independently of any central command. A specialist team was given high-tech listening devices and managed, according to Crooke, to intercept electronic communications flying to and fro between IDF personnel.

The bulk of Hezbollah’s military units, however, were encouraged to avoid unnecessary electronic chatter; when unit commanders did need to pass on messages they relied on relatively primitive means such as motorcycle couriers. At the beginning of the 2006 war Hezbollah fighters seem to have been given general orders and were then broken down into tiny cells each of which operated independently of any central command, and that they performed very well without either high-tech communications or complicated military manoeuvres to help them get around the battlefield.

Despite the fact that their information loop was not speeded up by new communications technology, it seems, Hezbollah's fighters were much better equipped to swarm around their enemy with great agility. "Rather than have to react faster than the IDF's decision-cycle", one early analysis of the war from Washington's Centre for Strategic and International Studies concluded, "they could largely ignore it, waiting out Israeli attacks, staying in positions, re-infiltrating or re-emerging from cover, and choosing the time to attack or ambush."

Quality not quantity

Hezbollah's commanders found that giving their fighters clear and prior battle instructions was vastly more important than allowing them to liaise with each other electronically during the conflict itself. Faced with a technologically superior enemy, they seemed to understand, it was still possible to knock your enemy off-balance and confuse him. But only if those under your command had a very clear idea of what was expected of them, only if they ignored that enemy's electronic information loop – and only if they switched off their mobile phones and fell back on their own initiative.

A post-script to all this emerged in December of last year, when the Israelis came to mount their invasion of Gaza. This time the Israelis didn't rely wholly on its air-force or its drones, and was relatively quick to put boots on the ground. It drew up clear and achievable plans and didn't rely on "smart" battlefield units communicating with each other and making it up as they went along. Last but not least, it was reported in The New York Times, this time the IDF's military commanders meticulously confiscated all its soldiers mobile phones.

Web 2.0, with its requirement that we participate in a continuous flow of electronic information, is being pushed as the saviour of government and organisations. But it doesn't always work. ®

James Harkin is the author of Cyburbia: The Dangerous Idea that's Changing How We Live and Who We Are. Catch our interview with James tomorrow. See cyburbia.tv for more details of the book.

Boost IT visibility and business value

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Fast And Furious 6 cammer thrown in slammer for nearly three years
Man jailed for dodgy cinema recording of Hollywood movie
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?