Feeds

War, Web 2.0 and the Fail Loop

From Hezbollah to Twitter

High performance access to file storage

Subverting the feedback loop

The Westerner currently most trusted by Hezbollah is a former British diplomat and spy called Alastair Crooke. Crooke, who worked as an agent of the British Secret Intelligence Service (MI6) before being seconded by Tony Blair to be the European Union’s envoy to the Middle East between 1997 and 2003, now lives in Lebanon and spends his time encouraging discussions between Islamist movements and Western governments. After the 2006 war, he was taken to South Lebanon by Hezbollah officials and allowed rare access to its battlefield commanders.

In October 2008 I visited him in Beirut and asked him what he had seen and heard. At the beginning of the 2006 war, Crooke told me, Hezbollah fighters were given general orders and were then broken down into tiny cells, each of which operated quite independently of any central command. A specialist team was given high-tech listening devices and managed, according to Crooke, to intercept electronic communications flying to and fro between IDF personnel.

The bulk of Hezbollah’s military units, however, were encouraged to avoid unnecessary electronic chatter; when unit commanders did need to pass on messages they relied on relatively primitive means such as motorcycle couriers. At the beginning of the 2006 war Hezbollah fighters seem to have been given general orders and were then broken down into tiny cells each of which operated independently of any central command, and that they performed very well without either high-tech communications or complicated military manoeuvres to help them get around the battlefield.

Despite the fact that their information loop was not speeded up by new communications technology, it seems, Hezbollah's fighters were much better equipped to swarm around their enemy with great agility. "Rather than have to react faster than the IDF's decision-cycle", one early analysis of the war from Washington's Centre for Strategic and International Studies concluded, "they could largely ignore it, waiting out Israeli attacks, staying in positions, re-infiltrating or re-emerging from cover, and choosing the time to attack or ambush."

Quality not quantity

Hezbollah's commanders found that giving their fighters clear and prior battle instructions was vastly more important than allowing them to liaise with each other electronically during the conflict itself. Faced with a technologically superior enemy, they seemed to understand, it was still possible to knock your enemy off-balance and confuse him. But only if those under your command had a very clear idea of what was expected of them, only if they ignored that enemy's electronic information loop – and only if they switched off their mobile phones and fell back on their own initiative.

A post-script to all this emerged in December of last year, when the Israelis came to mount their invasion of Gaza. This time the Israelis didn't rely wholly on its air-force or its drones, and was relatively quick to put boots on the ground. It drew up clear and achievable plans and didn't rely on "smart" battlefield units communicating with each other and making it up as they went along. Last but not least, it was reported in The New York Times, this time the IDF's military commanders meticulously confiscated all its soldiers mobile phones.

Web 2.0, with its requirement that we participate in a continuous flow of electronic information, is being pushed as the saviour of government and organisations. But it doesn't always work. ®

James Harkin is the author of Cyburbia: The Dangerous Idea that's Changing How We Live and Who We Are. Catch our interview with James tomorrow. See cyburbia.tv for more details of the book.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.