Information Warfare: Creatures Of Habit


December 20, 2009: Interrogation of captured Islamic terrorists, translation of captured documents, and statistical analysis of their attacks, has revealed what many have long suspected. The big attacks are scheduled for maximum media impact. Not just the international media, but for local consumption as well. For example, although most of Iraq saw little, or no, violence after early 2003, most Iraqis were nervous about the terrorism. That's because the local media reported, in gruesome detail, the attacks that were being carried out in the small part of the country where most of the violence was concentrated. Thus the Islamic terrorists scared many Iraqis they could not reach with their bombs, or gunmen. This backfired a bit for Sunni Arabs living in Shia neighborhoods, as the Shia would respond to the new fear of more Sunni Arab terror bombings, by driving out their peaceful Sunni Arab neighbors.

Counter-terrorism organizations have computer models of terrorist organizations, and these models are believed capable of figuring out, with a high degree of precision, where and when the groups next big attack will take place. Using that information, more resources are applied, and often confirmation of such an attack is obtained, and the attack aborted. Naturally, the inner workings of these models is kept secret, lest the terrorists come up with a way to "work the model" and escape detection.




Help Keep Us From Drying Up

We need your help! Our subscription base has slowly been dwindling.

Each month we count on your contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage.
Subscribe   Contribute   Close