Skip to main content

Invisible Battlegrounds: On Force and Revolutions, Military and Otherwise

  • Chapter
  • First Online:
The Palgrave Handbook of Security, Risk and Intelligence
  • 2284 Accesses

Abstract

The last century witnessed sweeping changes in the technologies of destruction and the abilities of states to suppress dissent. States now wield unprecedented capabilities to detect and target those who would concentrate force against them, whether on a battlefield or even in private spaces. Digital information processing accelerated these developments, to the point where the term “cyber war” now seems redundant. Such developments promise to continue as ideological regimes crave external threats to justify mobilization of their citizens. Anti-liberal rulers cannot tolerate open borders with liberal democracies; thus, they seek to keep those borders closed, or those neighbors less free. The boundaries around repressive regimes are now the tectonic plates of conflict, and of modern warfare. Technology has progressed to the point that these fault lines now extend into cyberspace, the newest domain of conflict.

Michael Warner serves as a historian in the US Department of Defense, which reviewed the foregoing and found no sensitive or classified information. The views expressed in this essay are his alone and do not necessarily reflect official positions of the Department or any US government entity.

The ideas in the essay emerged from my recent book The Rise and Fall of Intelligence: An International Security History (Washington: Georgetown University Press, 2014).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Surveillance, after the French term (versus its English cognate), appears “not in the narrow sense of ‘spying,’ explains Christopher Dandeker, but rather “to refer to the gathering of information about and the supervision of subject populations in organizations” (Dandeker, 1991, p. vii).

  2. 2.

    Book 9 of Kautilya’s Arthasastra, for instance, has much to say about detecting plots and suppressing rebellions.

  3. 3.

    After all, “political conflict is not like an intercollegiate debate in which the opponents agree in advance on a definition of the issues. As a matter of fact, the definition of the alternatives is the supreme instrument of power.…He who determines what politics is about runs the country” (Schattschneider, 1960, p. 66).

Bibliography

  • Anna Funder, Stasiland: Stories from Behind the Berlin Wall (London: Granta, 2003).

    Google Scholar 

  • Alexander Cooley, “Countering Democratic Norms,” Journal of Democracy 26: 2 July 2015, pp. 49–63.

    Article  Google Scholar 

  • Christopher Dandeker, Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day, (New York: St. Martin’s, 1991). Niall Ferguson, Civilization: The West and the Rest (New York: Penguin, 2012).

    Google Scholar 

  • Citizen Lab, Munk Centre for Global Affairs, University of Toronto, “Hacking Team and the Targeting of Ethiopian Journalists,” Feb. 12, 2014 https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/.

  • Elmer E. Schattschneider, The Semi-Sovereign People: A Realist’s View of Democracy in America (Boston: Wadsworth, 1975 [1960]).

    Google Scholar 

  • Hillary Rodham Clinton, Hard Choices (New York: Simon & Schuster, 2014).

    Google Scholar 

  • “Internet the key front in China’s battle with Western hostile forces: military paper,” Reuters, May 20, 2015; accessed May 23, 2015 at https://ca.news.yahoo.com/internet-key-front-chinas-battle-western-hostile-forces-120506329.html.

  • Kautilya, The Arthashastra, translated by L.N. Rangarajan (New Delhi: Penguin, 1992).

    Google Scholar 

  • Leon Trotsky, Terrorism and Communism, 1920. https://www.marxists.org/archive/trotsky/1920/terrcomm/ch04.htm.

  • Machiavelli, The Prince, translated by Harvey Mansfield, Jr. (Chicago: University of Chicago Press, 1985).

    Google Scholar 

  • Michael S. Schmidt and Helene Cooper, “ISIS Urges Sympathizers to Kill U.S. Service Members It Identifies on Website,” New York Times, March 21, 2015.

    Google Scholar 

  • Niall Ferguson, Civilization: The West and the Rest (New York: Penguin, 2012).

    Google Scholar 

  • North Atlantic Council, Wales Summit Declaration, September 5 2014.

    Google Scholar 

  • P.M. Thomas, Barnett, the Pentagon’s New Map: War and Peace in the Twenty-First Century (New York: G.P. Putnam’s Sons, 2004).

    Google Scholar 

  • Ron Diebert, “Cyberspace Under Siege,” Journal of Democracy 26: 2 July 2015, pp. 64–78.

    Article  Google Scholar 

  • Ronald Reagan, “National Policy on Telecommunications and Automated Information Systems Security,” National Security Decision Directive [NSDD]-145, September 17, 1984.

    Google Scholar 

  • Samuel P. Huntington, The Clash of Civilizations and the Remaking of World Order (New York: Simon & Schuster, 1998).

    Google Scholar 

  • Sean Gallagher, “Chinese Army newspaper calls for military role in Internet culture war: Claims West and “ideological traitors” use Internet to weaken Party’s authority,” Ars Technica, May 21, 2015; accessed May 23, 2015 at http://arstechnica.com/tech-policy/2015/05/chinese-army-newspaper-calls-for-military-role-in-internet-culture-war.

  • Seth G. Jones, Hunting in the Shadows: The Pursuit of Al Qa’ida since 9/11 (New York: Norton, 2012).

    Google Scholar 

  • Stephen Biddle, Military Power: Explaining Victory and Defeat in Modern Battle (Princeton: Princeton University Press, 2004).

    Google Scholar 

  • Sun Tzu, The Art of War, translated by Samuel B. Griffin (London: Oxford University Press, 1963).

    Google Scholar 

  • Symantec, 2015 Internet Security Threat Report, Volume 20, April 2015.

    Google Scholar 

  • Thomas Rid, Cyber War Will Not Take Place (Oxford: Oxford University Press, 2013).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Warner .

Editor information

Editors and Affiliations

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Warner, M. (2017). Invisible Battlegrounds: On Force and Revolutions, Military and Otherwise. In: Dover, R., Dylan, H., Goodman, M. (eds) The Palgrave Handbook of Security, Risk and Intelligence. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-53675-4_14

Download citation

Publish with us

Policies and ethics