ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

The Asymmetric Warfare Threat

Updated on May 10, 2013

A Strategy to Destroy Western Civilization

A Strategy to Destroy Western Civilization

The objective of this paper is to explore a theoretical agenda that exposes nation-state actors such as Russia, China, North Korea and Iran as the chief orchestrators that provide the economic resources, weaponry, training facilities, strategic and tactical planning, as well as the overall philosophical indoctrination that enables the enemies of the United States, Israel and Western Civilization to operate in one accord; with the goal being the Asymmetric Warfare imposed destruction of Western Civilization.

China Asymmetric Threat:

Moving forward, from a military history perspective one can discover the work of the ancient Chinese military general and genius Sun Tzu in his The Art of War, written more than 1,500 years ago, he states: All warfare is based on deception. When confronted with an enemy one should offer the enemy a bait to lure him; feign disorder and strike him. When he concentrates, prepare against him; where he is strong, avoid him. Thus the art and science of Asymmetric warfare was born. ([1] Buffaloe, pg.7 )

Today Sun Tzu’s teachings still resonate in his native land China who according to Mr. James Rickard an expert at Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, California; states China assumes it can initially lull the opponent into complacency, or deceive him to take steps that will help China win. The premises here are quite elaborate. These concepts of how "The Inferior Defeats the Superior" are claimed to be unique to China, and to have been developed by Chinese strategists over thousands of years.” ([2] Rickard) To reiterate the concept of Asymmetrical warfare is alive and well in the PRC and is clearly aimed at the United States and her Western allies.

From documented cyber warfare attacks such as “'China has downloaded 10 to 20 terabytes of data from the NIPRNet (DOD's Non-Classified IP Router Network),' said Maj. Gen. William Lord, director of information, services and integration in the Air Force's Office of Warfighting Integration and Chief Information Officer. They're looking for your identity so they can get into the network as you,' said Lord, adding that Chinese hackers had yet to penetrate DOD's secret, classified network. There is a nation-state threat by the Chinese.”(4) The facts can be considered as somewhat overwhelming when contemplating the “open door” policies of American immigration laws. Yes, there has been a tapering of immigration guidelines following the 911 tragedy on the American homeland however with higher education student visas still being utilized by Chinese citizens as well as human beings from across the globe, which leave their native lands and loved ones behind seeking a better life in America. In most cases of course this long standing American tradition is utilized by honest hard working people who are genuinely seeking the “American dream.” Nevertheless, within the aforementioned scenario there are members of FISS seeking to exploit American and Western freedoms while performing acts of espionage which is another form of Asymmetric Warfare in action.

Russia Asymmetric Threat:

Some may agree that the now defunct Cold War that pitted the United States of America vs. the USSR is not truly over; it has just taken on a different form of global competition in which America and Russia disdain for one another still exist. Evidence of this covert conflict can be discovered via “so it was from Virginia to Boston, and from New York to Seattle: married couples with families, young get-ahead professionals, even noisy anti-government agitators – all seemingly unremarkable in the American mix. Even the accents did not raise eyebrows in a country of immigrants. But the carefully-crafted American normality, sometimes built over a decade or more, has been shattered with the arrest of 11 people – including eight who claimed to be married couples – on charges of being part of a long-term, deep cover espionage ring run by the Russian intelligence service.” ([3] The Guardian) The information provided by England’s The Guardian News is bone chilling as it not a teaser to a remarkable work of fiction; they are hard facts and documented evidence of American vulnerability to Asymmetrical Warfare attacks perpetrated by long time nemesis Russia.

North Korea Asymmetric Threat:

Granted, North Korea may not be perceived as a direct symmetrical and or asymmetrical threat to the United States and the West as whole. However some may beg to differ that the constant provocations committed by North Korea with South Korea as its primary target contributes to an unstable Asia in which has a trickle-down effect that compels the PRC and the USA to react. That being stated; some may agree that it would be less than prudent for the U.S. and the West to view the North Korea vs. South Korea conflicts as a Asian conundrum, however with the economic rise of the PRC and too much is at stake on the Korean Peninsula and the continent of Asia as a whole. One such recent incident being “North Korea recognized its disadvantage in symmetric surface-ship provocations. It resorted instead to new and unexpected tactics, utilizing its latest small submarine to torpedo ROKS Cheonan on 26 March 2010. the sinking of ROKS Cheonan gravely shocked every aspect of Korean society—political, diplomatic, psychological, and military—and caused deep ripples across the range of Northeast Asian security. ([4] Kim) Thus illustrating a highly successful act of Asymmetrical Warfare targeting American ally the Republic of Korea at the hands of North Korea.

Iran Asymmetric Threat:

Beyond the multitude of saber rattling that is spewed out of the mouths of the regime in Tehran aimed at America, Israel and the West; even away from Persian nuclear aspirations. Iran stands as an additional Asymmetrical Warfare threat via a savvy FISS that is very proactive in the United States. The Office of the National Counterintelligence Executive (ONCIX) reports such incriminating facts as in 2008 “9 Arrests and Convictions of Iranians for Economic Collection and Industrial Espionage Cases which included engineering software, telecommunications, equipment and technology, electronics and IED components, gas valve parts, nickel alloyed pipes, fighter jet components, chemical purchasing software, cryogenic pumps, and illegal export of three key master software.” ([5] ONCIX)

Conclusion:

In closing we find an expert analysis of the Asymmetric Warfare threat stated within the thesis of this document as “former United Nations Ambassador John Bolton told a packed crowd in Brevard that Iran, North Korea and Islamic terrorist groups project near-term nuclear menace that could someday soon threaten to destroy select American cities to bully their way, while longtime super powers China and Russia pose renewed challenges to world security.” ([6] Bolton) Thus, increased United States vigilance is required.

Work Cited:

1)Defining Asymmetric Warfare, David L. Buffaloe; THE INSTITUTE OF LAND WA R FA R E A S S O C I ATION OF T H E UNITED STATES A R M Y, Arlington, Vi r g i n i a

2) Rickard, James, Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, Californiahttp://www.au.af.mil/au/awc/awcgate/nps/rickard_chin_grand_strat_jul08.pdf

3) Chris McGreal in Arlington and Paul Harris in Montclair, The Guardian, Tuesday 29 June 2010; http://www.guardian.co.uk/world/2010/jun/29/russian-spies-suburban-america

4) THE REPUBLIC OF KOREA’S COUNTER-ASYMMETRIC STRATEGY; Captain Duk-Ki Kim, Republic of Korea Navy

5) The Office of the National Counterintelligence Executive (ONCIX) Annual Report to Congress on Foreign Economic Collection and Industrial Espionage, FYI 2008; http://www.ncix.gov/publications/reports/fecie_all/fecie_200have 8/2008_FECIE_Blue.pdf

6) Bolton: Beware Iran, North Korea, Russia, China, Obama Published on October 7, 2012 in Asheville, Hendersonville, News Stories, Pete Zamplas; http://www.thetribunepapers.com/2012/10/07/bolton-beware-iran-north-korea-russia-china-obama/

Bibliography:

Defining Asymmetric Warfare, David L. Buffaloe; THE INSTITUTE OF LAND WA R FA R E A S S O C I ATION OF T H E UNITED STATES A R M Y, Arlington, Vi r g i n i a

Rickard, James, Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, Californiahttp://www.au.af.mil/au/awc/awcgate/nps/rickard_chin_grand_strat_jul08.pdf

Chris McGreal in Arlington and Paul Harris in Montclair, The Guardian, Tuesday 29 June 2010; http://www.guardian.co.uk/world/2010/jun/29/russian-spies-suburban-america

THE REPUBLIC OF KOREA’S COUNTER-ASYMMETRIC STRATEGY; Captain Duk-Ki Kim, Republic of Korea Navy

The Office of the National Counterintelligence Executive (ONCIX) Annual Report to Congress on Foreign Economic Collection and Industrial Espionage, FYI 2008; http://www.ncix.gov/publications/reports/fecie_all/fecie_200have 8/2008_FECIE_Blue.pdf

Bolton: Beware Iran, North Korea, Russia, China, Obama Published on October 7, 2012 in Asheville, Hendersonville, News Stories, Pete Zamplas; http://www.thetribunepapers.com/2012/10/07/bolton-beware-iran-north-korea-russia-china-obama/

Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)