By Dee Smith
Beginning in November 2023, following the attack by Hamas against Israel, groups of Houthi “pirates” in the Red Sea began to step up operations against ships in this crucial waterway that leads to the Suez Canal. The Houthis are a Shia Islamist group based in northern Yemen. Such pirate attacks have been happening in the Red Sea, the Gulf of Aden and the Arabian Sea for many decades, but the agenda now is as much political as piratical. Commercial shipping has been avoiding the region, including the Suez Canal, by making the much longer and more expensive journey around Africa and the Cape of Good Hope. The US has deployed a destroyer and other vessels to counter the Houthi. but has had trouble convincing other powers to join Operation Prosperity Guardian.
Consumers and industry will pay the price for the disruption in supply chains. Last week, 13 nations signed a “final warning” to the Houthi, noting: “Nearly 15 percent of global seaborne trade passes through the Red Sea, including 8 percent of global grain trade, 12 percent of seaborne-traded oil and 8 percent of the world’s liquefied natural gas trade.” The Houthi nevertheless continued their attacks. Last week, for the first time, they used ocean-going drones to attack US Navy and commercial ships.
Thus a relatively small group of operatives —albeit with financial and logistical support from a large nation-state, namely Iran — has managed to disrupt global shipping, create enhanced media awareness for itself, and force the most powerful nation in the world to deploy forces against it at significant financial and military cost.
The reason the Houthi are able to disrupt shipping affecting the entire globe is that they are applying asymmetric warfare techniques to a key strategic location.
What is asymmetric warfare? The classic definition is conflict between forces that are vastly different in terms of military power. It is almost always “irregular” warfare in that the combatants involved on the “enemy” side (the enemy from the perspective of states under attack) are not part of regular national armed forces of nations (although it can also occur among irregular groups, as between the Islamic State and al-Qaida). The goals of asymmetric players are often more to cause shock and confusion than to cause large-scale harm. Bronwen Maddox, head of the British think tank Chatham House, recently recounted a remark that Hamas deputy leader Saleh al-Arouri, who was killed by an Israeli strike last week in Beirut, made to her in 2007: “‘Our job is to keep the Palestinians radicalized’, he said. ‘Most of them would settle in a moment for peace, some deal that will let them get on with their lives. We need to keep them angry.’” Asymmetric attacks happen at unexpected times and in unexpected places, hence the less used term asynchronous warfare and thus asymmetric and asynchronous warfare, as US military and intelligence agencies have long called it.
Asymmetric warfare has been around for centuries and encompasses not just terrorist attacks like that on 9/11 but also insurgencies, guerrilla warfare, rebellions and so forth. The campaigns against the British that led to the birth of the United States would fall into the category of asymmetric warfare.
Asymmetric warfare has lasted because it can be effective, but two key changes, both products of advanced technology, have made it more so.
First, asymmetric players have been empowered through the increased capacities that new technologies afford to small groups in attacking large states. For example, weaponized drones can be simply repurposed civilian drones, costing at most a few thousand dollars each — while the US Navy might shoot them down with $2 million missiles. The Navy could ramp up existing directed-laser systems, which would be much less costly than missiles over time, but has been reluctant to make the large investments needed. This is an example of how asymmetric players can sometimes prevail against large opponents whose systemic complexity precludes quick and efficient action.
Cyber threats offer a textbook case of the complexity of the asymmetric environment. They can be perpetrated by small groups physically distant from their targets, but they are also used promiscuously by nation states and even sub-contracted to terrorist or criminal groups. It is a very tangled web, difficult to unravel and even more difficult to counter.
It is also well within the capabilities of some asymmetric actors to produce “dirty bombs,” conventional explosives surrounded by or laced with radioactive materials—if they can obtain the radioactive materials, which are difficult but by no means impossible to acquire.
Perhaps the most alarming asymmetric threat is bio-terror: the production and use of biological weapons that could devastate the populations of entire regions. Nation states mostly claim that they are not developing such weapons, but today the field is open to much smaller groups. CRISPR-Cas9 gene editing techniques have become so much more effective and affordable that genetic engineering to produce novel and lethal bio-agents can now, at least in theory, be conducted in a garage on a relatively small budget.
The rise of AI opens up an entirely new arsenal for asymmetric warriors. As those who study the field have noted, however, it has proved impossible to predict how technologies will be misused until they are.
The second major change is that technology has made targets softer. The highly interconnected and tightly coupled world that we have created is far more vulnerable than were simpler and more isolated systems. In other words, technology has to some extent leveled the playing field in favor of weaker asymmetrical players, just as it has made regular armed forces relatively less effective in an increasing range of circumstances. For example, an attack on 16 April 2013 that involved nothing more than AK-47 assault rifles and wire cutters used to cut fiber-optic cables managed to knock out 17 large transformers in 19 minutes, threatening the power supply to Silicon Valley. A blackout was avoided by quickly rerouting power and pulling it from other plants, but the damage was significant and the outcome could have been far worse. The perpetrators have never been found.
Our technologies of communication, such as social media, are so ubiquitous that we often fail to realize how much they have changed the equation. Asymmetric groups learn of one another’s techniques quickly, and they share goals by interacting to further them. For example, the perpetrator of the Christchurch mass shootings on 15 March 2019 said that he decided on a shooting attack specifically because of the effect it would have in the US. Those who study such “lone-wolf” attackers have noticed that they tend to find one another and band together, organizing asymmetric-warfare groups with shared aims and ideologies and becoming much more effective as they do so.
If you are reading this in your office, take a moment to look in your desk. You may have an effective asymmetric weapon at your disposal: a laser pointer of the kind used for PowerPoint presentations. If directed at someone’s eyes, it can be highly disorienting and even cause permanent damage. This is why shining lasers at or into the cockpit of commercial airliners is such a serious crime: it can endanger everyone on the plane by incapacitating the pilot’s vision. And it is a perfect example of how advanced but fairly mundane technology has empowered asymmetric players.
The proliferation of destructive technologies and the vulnerability of large technical systems to disruption have combined to make asymmetric attacks more common and more lethal. What the Houthi example shows is how the range of threats to international trade and investment has grown accordingly.