Military Review English Edition July-August 2014 | Page 83

by Bouquet’s brilliant feigned retreat and flanking New Threats maneuvers; it also shows how an enemy can use We have seen the great utility of examining deception effectively. The official history of Bushy historical conflicts between Europeans and Native Run says Bouquet’s forces were engaged and surAmericans to learn lessons about possible future rounded by Indian forces at least equal in size to his conflict. Yet there are two additional dimensions to own. However, when I toured the battlefield, Indian asymmetric warfare that must be mentioned—the re-creators, who have studied the battle extensively threat of weapons of mass destruction, potentially from the Indian point of view, maintained that the used against the American homeland, and of cyberIndians numbered no more than 90 and that the tacattacks on U.S. military, government, and private tics they used in the forest made their numbers seem information systems. larger. This disparity is a good example of attempts At the heart of asymmetry is the assumption that to confuse conventional forces so that the size of the an adversary will choose to attack the weakest point. opposing force is impossible to discern. In the case of the United States, asymmetric tools may Finally, the Indian campaigns provide some excelwell entail terrorist acts—with or without nuclear, lent examples of the role of technological advances in biological, or chemical weapons—on the U.S. homeland asymmetric campaigns. Noted historian Armstrong designed to disrupt deployments, limit access, erode Starkey emphasizes that the Europeans arrived in North public support, and take the fight to the American peoAmerica during a time of military revolution in Europe: ple. In some respects, this homeland tactic is not new. “European soldiers brought the new weapons a