Alternatively, the US and other major powers may go to a more cooperative model, as in the
foreign internal defense mission of
special forces. In that model, which needs extensive lead time, the major power uses nonmilitary and military means to increase the capability of the host nation to resist insurgency. Foreign internal defense includes the economic stabilization of host countries. In Thomas Barnett's paradigm, the world is divided into a "connected core" of nations enjoying a high level of communications among their organizations and individuals, and those nations that are disconnected internally and externally. In a reasonably peaceful situation, he describes a "system administrator" force, often multinational, which does what some call "nation-building", but, most importantly, connects the nation to the core and empowers the natives to communicate—that communication can be likened to swarm coordination. Swarming is not a panacea for conflict at all levels. If there is a significant military force preventing the
system administrator from working on developing connections, the other part of the paradigm comes into play:, more a mission for police, which certainly can include a militarized force like the
Constabulary in the post-WWII occupation of Germany. Swarming would allow major powers to rapidly respond to guerilla forces, but, given the appropriate synchronization and communications, the less powerful forces can use swarming themselves. Modern communications allows military units to stay widely dispersed. The front, rear and flanks are disappearing from military conflict. Swarming allows the military to fight everywhere.
Swarming and Third World nations in the
Korean War. Swarming is advantageous to less powerful countries and groups, because it allows them to balance their disadvantage in firepower and numbers. Despite being less technically advanced, Communist forces made good use of swarming in Asia during the Cold War. The Chinese were able to make up for their lack of firepower by attacking from all sides and then quickly advancing to the rear. The Vietcong were famous from attacking from all directions out of nowhere and then quickly disappearing. When they did come into close contact, they used a technique called "hugging the belt", which meant they were too close for the US to employ air and artillery support. If the attackers "hugged" at several points, "pulsing" their attacks, they both neutralized external fire support, but also made it difficult for the US commander to know where to commit reserves.
Swarming principles in terrorism Cordesman observes that swarming is a viable terrorist tactic against targets of opportunity.
Al-Qaeda, for example, uses a different form of swarming than those of advanced militaries, in which the general objectives of operational cells are agreed in a manner coordinated, but not continuously controlled by the core organization. Once the decision has been made on the general targets, the operational cells cut positive control links from the core, although they may still receive financial and other support. A signature of al-Qaeda operations has been multiple, near-simultaneous attacks, such as the several hijacked airliners in the
9/11 attacks, the closely spaced bombings aimed at US embassies in Tanzania and Kenya, and attacks on buses and trains in London. The attacks on trains in Spain had an additional dimension: not all the swarms were associated with al-Qaeda. While
John Arquilla, a professor at the Naval Postgraduate School, cites the ability to plan separate and widely dispersed attacks, coordinated by mobile communications that might originate from a cave on the Afghan-Pakistan border, See
Clandestine HUMINT operational techniques. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an
indications checklist appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning. Semiautonomous swarming, in which the actors occasionally interfere with one another, is seen in attacks on computer networks by loose confederations of malicious hackers. On occasion, especially when the attack uses a
botnet, some of the units may try to overpower and control one another, as well as the target. One of the observations of the Center on Terrorism and Irregular Warfare was that unfocused mass disruption was not a useful terrorist, and by extension general military, tactic. The 9/11 attacks had symbolism. A
cyberattack on a stock market would have symbolism. For the political purposes of the swarm, there has to be a symbol to which observers need to connect the purpose of the attack. ==See also==