European security researchers have exposed a cross-platform scheme by US and Russian tech companies to secretly spy on billions of Android users worldwide.
In the disclosure released this week called “Covert Web-to-App Tracking via Localhost on Android“, researchers from European institutions revealed that Facebook/Instagram/Yandex operated covert tracking to completely bypass Android’s privacy protections.
The Smoking Port
The evidence is damning: both companies were using hidden “localhost” connections to link users’ anonymous web browsing to their real identities in mobile apps.
That means when users visited websites—even in private or anonymous browsing mode—Meta Pixel or Yandex tracking scripts would secretly communicate with the Facebook, Instagram, and Yandex apps running in the background on their phones like American/Russian spies, bypassing all privacy protections.
Meta WebRTC techniques would send the `_fbp` cookie from websites to Facebook/Instagram apps listening on UDP ports 12580-12585. Yandex used HTTP/HTTPS requests to send data to Yandex apps listening on ports 29009, 29010, 30102, and 30103. This was possible because Android doesn’t restrict localhost access, as a bridge between the web and local apps.
Scale of the Operation
Meta’s tracking on 5.8+ million websites
Yandex tracking on nearly 3 million sites
Likely harming billions of Android users
Worked even when users cleared cookies or used incognito mode
Same Violation by America and Russia
While there’s no evidence yet the American and Russian method was coordinated, both developed exploits for the same Android vulnerability. Here’s the technical evolution that shows the linked progression:
Yandex (Russia) used HTTP-based tracking since February 2017—running for 8 years undetected using obfuscated domains that resolve to localhost (yandexmetrica.com → 127.0.0.1)
Meta (US) then went through a sudden rapid evolution starting September 2024
HTTP requests (Sep-Oct 2024) — Same as Yandex
WebSocket connections (Nov 2024-Jan 2025)
WebRTC STUN with SDP Munging (Nov 2024-present)
WebRTC TURN without SDP Munging (May 2025-present)
The fact that Meta started last September with the exact same HTTP method that Russia had been using since 2017 raises obvious questions about a knowledge transfer, shared intelligence, or reverse engineering of Android vulnerabilities.
More to the point, the fact that this surveillance infrastructure was deployed just 2 months before the US Presidential election, using Russian methods, certainly raises questions about whether this was Meta again implicated in election-related surveillance and interference.
When the European researchers went public with these findings both companies immediately ceased the spying operation.
Never Leave a Meta App on Your Phone
This goes beyond privacy rights and into issues of digital sovereignty. Two countries were using private companies for surveillance operations on domestic and foreign citizens’ devices, willfully circumventing consent or disclosure during crucial US elections.
The tracking defeated every privacy protection users thought they had. Given WhatsApp’s massive European user base and end-to-end encryption promises, its omission from this operation raises questions about whether Meta was trying to maintain plausible deniability for their messaging platform while using their social media apps for covert tracking. More likely is that WhatsApp is already so compromised, it doesn’t need another backdoor.
The EU’s researchers didn’t just expose spies—both US and Russian tech giants immediately stopped covert operations after initial public exposure. A business level privacy violation would have had a completely different footprint and reaction, further suggesting this was digital espionage by private tech companies for state control or capture.
We are in discussions with Google to address a potential miscommunication regarding the application of their policies,” a Meta spokesperson told The Register. “Upon becoming aware of the concerns, we decided to pause the feature while we work with Google to resolve the issue.”
Of course Meta, a company founded on the principle of unaccountable abuse, would try to get reporters to blame Google instead of documenting criminals were committing a clear crime.
When you’re secretly listening on localhost ports to harvest browsing data, there’s no “miscommunication” about whether that violates user expectations. Localhost tracking required deliberate technical implementation through apps developed to listen on specific ports, scripts deployed to send data through those channels, and evolving the methods when detection risks increased. There was no policy misunderstanding; only intentional infrastructure for spying.
Most companies fight disclosure or defend practices as legitimate, whereas the instant shutdown suggests they knew this crossed lines… and that the US presidential elections are over.
Europe continues to prove global leadership in digital rights, where advocates and regulators protect and enhance innovation. Independent researchers forcing transparency remain the best allies to regulators, holding Big Tech accountable, because they do not fear whatever flag these corporations fly.
Why a Think Tank Report on Deception Misses the Point—And Makes States More Vulnerable
I was excited to watch the presentation yesterday of a recent New America report on “The Future of Deception in War“. It seemed throughout the talk, however, that a certain perspective (the “operator”, the quiet professional) was missing. I even asked what the presenters thought about Soviet use of disinformation that was so excessive it hurt the Soviets.
They didn’t answer the question, but I asked because cultural corruption is a serious problem, like accounting for radiation when dealing with nuclear weapons. When deception is unregulated and institutionalized, it dangerously corrodes internal culture. Soviet officers learned that career advancement came through convincing lies rather than operational competence. This created military leadership that was excellent at bureaucratic maneuvering but terrible at actual warfare, as evidenced in Afghanistan and later Chechnya. Worse, their over-compartmentalization meant different parts of their centralized government couldn’t coordinate—creating the opposite of effective deception.
This isn’t the first time I’ve seen academic approaches miss the operational realities of information warfare. As I wrote in 2019 about the CIA’s origins, effective information operations have always required understanding that “America cannot afford to resume its prewar indifference” to the dangerous handling of deception.
What’s invisible, cumulative, and potentially catastrophic if not carefully managed by experts with hands on experience? Deception.
Then I read the report and, with much disappointment, found that it exemplifies everything wrong with how military institutions approach deception. Like French generals building elaborate fortifications while German tanks rolled through the Ardennes, the analysis comes through as theoretical frameworks for warfare that no longer exists.
As much as Mr. Singer loves to pull historical references, even citing the Bible and Mossad in the same breath, he seems to have completely missed Toffler, let alone Heraclitus: the river he wants to paint us a picture of was already gone the moment he took out his brush.
The report’s fundamental flaw isn’t in its details—it’s in treating deception as a problem that can be solved through systematic analysis rather than understood through practice. This is dangerous because it creates the illusion of preparation while actually making us more vulnerable.
Academia is a Hallucination
The authors approach deception like engineers design bridges: detailed planning, formal integration processes, measurable outcomes, systematic rollout procedures. They propose “dedicated doctrine,” “standardized approaches,” and “strategic deception staffs.” This is waterfall methodology applied to a domain that requires agile thinking.
Real deception practitioners—poker players, con artists, intelligence officers who’ve operated in denied areas—know something the report authors don’t: deception dies the moment you systematize it.
Every successful military deception in history shared common characteristics the report ignores:
They were improvisational responses to immediate opportunities
They exploited enemy assumptions rather than following friendly doctrine
They succeeded because they violated expectations, including their own side’s expectations
They were abandoned the moment they stopped working
Consider four deceptions separated by nuance yet united by genius: the Haversack Ruse at Beersheba (1917), Ethiopia Mission 101 (1940), Operation Bertram (1942) and Operation Mincemeat (1943). Each succeeded through what I warned over a decade ago is Big Data vulnerability to “seed set theory” – an unshakeable core of truth, dropped by a relative influencer, spreading with improvised lies around it.
The haversack was covered in real (horse) blood with convincing photos, military maps and orders. Mission 101 took a proven WWI artillery fuse design and used 20,000 irregular African troops with a bottle of the finest whiskey to rout 300,000 heavily armed and armored fascists. Mincemeat was an actual corpse with meticulously authentic personal effects.
None of these could have emerged from systematic planning processes. Each required someone to intuitively grasp what truth would be most convincing to a particular enemy in a unique moment, then place the right seed with human creativity into the right soil, that no doctrine could capture.
It’s no coincidence that Orde Wingate, founder of Commando doctrine, considered Laurence of Arabia a flamboyant self-important bureaucrat. One of them delivered an operations guideline that we use to this day around the world and in every conflict, the other created Saudi Arabia.
The Emperor of Abyssinia (modern day Ethiopia) with Brigadier Daniel Arthur Sandford on his left and Colonel Wingate on his right, in Dambacha Fort after it had been captured, 15 April 1941
The Wealthy Bureaucrat Trap
The report’s emphasis on “integrating deception planning into normal tactical planning processes” reveals profound misunderstanding. You cannot bureaucratize deception any more than you can bureaucratize jazz improvisation. The qualities that make effective military officers—following doctrine, systematic thinking, institutional loyalty—are precisely opposite to the qualities that make effective deceivers.
Consider the report’s proposed “principles for military deception”:
“Ensure approaches are credible, verifiable, executable, and measurable”
“Make security a priority” with “strictest need-to-know criteria”
“Integrate planning and control”
This is exactly how NOT to do deception. Real deception is:
Incredible until it suddenly makes perfect sense
Unverifiable by design
Unmeasurable in traditional metrics
Shared widely enough to seem authentic
Chaotic and loosely coordinated
Tech Silver Bullets are for Mythological Enemies
The report’s fascination with AI-powered deception systems reveals another blind spot. Complex technological solutions create single points of catastrophic failure. When your sophisticated deepfake system gets compromised, your entire deception capability dies. When your simple human lies get exposed, you adapt and try different simple human lies.
Historical successful deceptions—from D-Day’s Operation Fortitude to Midway’s intelligence breakthrough—succeeded through human insight, not technological sophistication. They worked because someone understood their enemy’s psychology well enough to feed them convincing lies.
The Meta-Deception Problem
Perhaps worth noting also is how the authors seem unaware, or make no mention of the risk, that they might be targets of deception themselves. They cite Ukrainian and Russian examples without consideration and caveat that some of those “successful” deceptions might actually be deceptions aimed at Western analysts like them.
Publishing detailed sharp analysis of deception techniques demonstrates the authors don’t fully appreciate their messy and fuzzy subject. Real practitioners know that explaining your methods kills them. This report essentially advocates for the kind of capabilities that its own existence undermines. Think about that for a minute.
Alternative Agility
What would effective military deception actually look like? Take lessons from domains that really understand deception:
Stay Always Hot: Maintain multiple small deception operations continuously rather than launching elaborate schemes. Like DevOps systems, deception should be running constantly, not activated for special occasions.
Fail Fast: Better to have small lies exposed quickly than catastrophic ones discovered later. Build feedback loops that tell you immediately when deceptions stop working.
Test in Production: You cannot really test deception except against actual adversaries. Wargames and simulations create false confidence.
Embrace Uncertainty: The goal isn’t perfect deception—it’s maintaining operational effectiveness while operating in environments where truth and falsehood become indistinguishable.
Microservices Over Monoliths: Distributed, loosely-coupled deception efforts are more resilient than grand unified schemes that fail catastrophically.
Tea Leaves from Ukraine
The report celebrates Ukraine’s “rapid adaptation cycles” in deception, but misses the deeper lesson. Ukrainian success comes not from sophisticated planning but from cultural comfort with improvisation and institutional tolerance for failure.
Some of the best jazz and rock clubs of the Cold War were in musty basements of Prague, fundamentally undermining faith in Soviet controls. West Berlin’s military occupation during the Cold War removed all curfews just to force the kinds of “bebop” freedom of thought believed to destroy Soviet narratives.
Ukrainian tank commanders don’t follow deception doctrine—they lie constantly, creatively, and without asking permission. When lies stop working, they try different lies. This isn’t systematizable because it depends on human judgment operating faster than institutional processes.
Important Strategic Warning
China and Russia aren’t beating us at deception because they have better doctrine or technology. They’re succeeding because their institutions are culturally comfortable with dishonesty and operationally comfortable with uncertainty.
Western military institutions trying to compete through systematic approaches to deception are like French generals in 1940—building elaborate defenses against the last war while their enemies drive around them.
Country Boy Cow Path Techniques
Instead of trying to bureaucratize deception, military institutions should focus on what actually matters:
Cultural Adaptation: Create institutional tolerance for failure, improvisation, and calculated dishonesty. This requires changing personnel systems that punish risk-taking.
Human Networks: Invest in education of people to curiously understand foreign cultures well enough to craft believable lies, not technologies that automate deception.
Rapid Feedback Systems: Build capabilities that tell you immediately when your deceptions are working or failing, not elaborate planning systems.
Operational Security Through Simplicity: Use simple, hard-to-detect deceptions rather than sophisticated, fragile technological solutions.
Embrace the Unknown: Accept that effective deception cannot be measured, systematized, or fully controlled. This is a feature, not a bug.
A Newer America
The New America report represents the militarization of management consulting—sophisticated-sounding solutions that miss fundamental realities. By treating deception as an engineering problem rather than a human art, it creates dangerous overconfidence while actually making us more vulnerable.
Real military advantage comes not from better deception doctrine but from institutional agility that lets you operate effectively when everyone is lying to everyone else—including themselves.
The authors end with: “We should not deceive ourselves into thinking that change is not needed.” They’re right about change being needed. They’re wrong about what kind of change.
Instead of building a Maginot Line of deception doctrine (the report’s recommendations are dangerously counterproductive), we need the institutional equivalent of Orde Wingate’s Chindits: fast, flexible, and comfortable with uncertainty. Because in a world where everyone can deceive, the advantage goes to whoever can adapt fastest when their lies inevitably fail.Wingate’s fleet of Waco “Hadrian” Gliders in 1944 Operation Thursday were deployed to do the “impossible”.
Disinformation was originally a World War I term, having been first applied to the Disinformation Service of the German General Staff. The Russian Bolshevik Cheka adopted the term (as dezinformatsiya) and the technique in the early 1920’s, and it has been in use by the Soviet state security (OGPU, NKVD, KGB, etc.) and military intelligence (GRU) services ever since. Current Soviet Russian intelligence parlance uses this term in a sense so broad that U.S. Government translators sometimes translate it as “deception,” although the Russians are careful to distinguish it from physical camouflage (maskirovka). The term, as borrowed from the Russian, is now also common in U.S. intelligence parlance, but is used in a less comprehensive sense.
false information deliberately and often covertly spread (as by the planting of rumors) in order to influence public opinion or obscure the truth. […]
Etymology: dis- + information, after Russian dezinformácija
Note: Russian dezinformácija and the adjective derivative dezinformaciónnyj can be found in Soviet military science journals published during the 1930’s. The Malaja Sovetskaja Ènciklopedija (1930-38) defines the word as “information known to be false that is surreptitiously passed to an enemy” (“dezinformacija, t.e., zavedomo lživaja informacija podkidyvaemaja protivniku”; vol. 3, p. 585). The verb dezinformírovat’ “to knowingly misinform” is attested earlier, no later than 1925, and may have been the basis for the noun. In more recent decades claims have been made about the origin of the word that are dubious and cannot be substantiated. […] First Known Use: 1939, in the meaning defined above
And, as an example of why that matters, Cyber Defense Review (quoting Merriam-Webster) then says this:
The word disinformation did not appear in English dictionaries until the 1980s. Its origins, however, can be traced back as early as the 1920s when Russia began using the word in connection with a special disinformation office whose purpose was to disseminate “false information with the intention to deceive public opinion.”
“The word disinformation did not appear in English dictionaries until the 1980s…“?
Hold that thought. With this dubious claim in mind, given we know that WWI Germans methods were copied by the Soviets, a most interesting version of all comes from a LSE blog post by Manchester University scholars.
Contrary to claims that the term disinformation entered English via Russian, conceived deceptively to sound like a word derived from a West European language to camouflage its Soviet origin, it had been in use in English from the turn of the twentieth century. For example, US press outlets accused their rivals of disinformation back in the 1880s and a British MP accused local authorities of using disinformation to justify their improper implementation of a parliamentary bill in 1901.
While not inventing the term ‘disinformation’, the Soviet authorities did pioneer its rather unusual usage. In 1923, the Bolshevik Party Politburo approved the establishment of the Disinformation Bureau (Dezinformburo) within the Soviet security service. The initiative, including its title, was suggested by an officer with close ties to German-speaking European Marxist revolutionaries (and this connection probably explains the Russian transliteration of the term in Russian from the German, rather than the English, spelling.)
Russians copied the Germans who copied the… British and Americans.
Or not? Could the origins of disinformation be disinformation itself?! Let’s pull this thread a bit more and see if we can find the ugly sweater it came from.
It’s plausible there was a potential knowledge transfer from German WWI intelligence practices to early Soviet operations, even if there doesn’t seem to be any formal “Disinformation Service” within the German General Staff structure (as claimed by Whaley).
German military intelligence during WWI ran under the Abteilung IIIb (formerly Sektion IIIb, established 1889, achieving departmental status June 1915). Colonel Walter Nicolai led it from 1913-1918, which is crucial to tracing origins. His comprehensive intelligence service conducted foreign espionage, counterintelligence, media censorship, and propaganda coordination, which included disinformation. The German War Press Office (Kriegspresseamt) was established in October 1915 to coordinate civilian agencies like the Military Section of the Foreign Office (established July 1916), which clearly focused on disinformation.
In the case of Germany, the press maintained a triumphalist approach, suppressing stories about the military disasters of the summer of 1918 and running uninterrupted editorials that victory was near. Throughout the war, troops who had just suffered massive losses of men and territory were dismayed to read optimistic accounts of battles unrecognizable to those that had participated in them. As the saying went, in portraying wars in the press, truth was the first casualty.
For as much as that sounds like coordinated efforts ran under the federal state, multiple German agencies worked at cross-purposes, lacking effective centralization until late in the war. Distributed and legacy structural problems limited effectiveness of information operations compared to Allied efforts (especially President Wilson’s Office of Propaganda, driven by his America First platform rooted in the KKK well-honed methods of racist disinformation).
Firtz Schönpflug: “D’Annunzio über Wien”, Karikatur aus: Die Muskete, Ausgabe vom 29. August 1918. Copyright: Wienbibliothek im RathausThe paramilitary wing of “America First” in 1921 used bi-planes to firebomb black neighborhoods and businesses in Tulsa, OK. They also dropped racist propaganda leaflets across America. Note the swastika was their symbol as well as the X.
Notably Nicolai’s own wartime diaries and correspondence, recently published after being strategically hidden in Moscow’s archives since 1945, do not seem to have the exact word desinformation. Nicolai’s personal records were hidden in 1945 by Moscow’s “Special Archive”
His post-war memoir “Nachrichtendienst, Presse und Volksstimmung im Weltkrieg” (1920) also doesn’t seem to use the word when describing the propaganda run by “Aufklärung” (intelligence) and “Nachrichtendienst” (intelligence services).
I’ve written before about the “dumb as rocks” German agent networks that infiltrated America, especially San Francisco (preparedness day bombing, heavily laced by federal disinformation). The evidence is unmistakable that Wilson’s administration restarting the KKK and sympathetic to Germany in WWI, was fundamentally on the side of German espionage as a means of ruthlessly suppressing domestic American dissent. This undermines any and all claims that Wilson’s wartime propaganda and surveillance were security measures, as he established them primarily as tools of racist political control that established dangerous precedents for future administrations. Calculated use of fabricated external threats to justify real domestic repression has since become a mainstay of American government communications during conflicts.
The targeting was systematic and coordinated by groups operating clandestinely as domestic paramilitary terrorists under President Wilson’s hand. Federal prosecutors routinely argued that opposing the war equated to aiding Germany without requiring evidence of actual German connections, while Wilson himself was aligned with German objectives. The administration setup “hyphenated Americans” rhetoric to justify surveillance of non-whites and political leaders while actual German agents continued unimpeded operations through established diplomatic channels.
Wilson was using explicitly nativist rhetoric while simultaneously enabling foreign spy operations, linked to domestic terror paramilitary groups, crushing domestic opposition. His “America First” campaigns makes “hyphenated Americans” targeting (e.g. calling non-whites Asian American, Black American to emphasize being born non-white prevents America being First) even more sinister in context.
Woodrow Wilson adopted the 1880s nativist slogan “America First” and soon after began promoting paramilitant domestic terrorism in constumes based on the film “Birth of a Nation”.
Wilson’s 1915 selective enforcement (like Trump and ICE today ignoring actual foreign spies while crushing American political opposition through paramilitary terror campaigns) provides crucial context for understanding how propaganda techniques were really developed and refined.
We can easily see how Wilson’s 1917 official government-run propaganda apparatus could directly influence the 1923 Soviet Dezinformburo through the German-speaking Marxist networks (the same ones Wilson used to terrorize America). This makes knowledge transfer much more plausible than Whaley’s phantom “Disinformation Service”, which lacks any evidence.
The entire WWI propaganda period is best understood not as developing intelligence for national defense but rather pioneering techniques for domestic political control.
1914-1917: German operations under Nicolai
1917: Wilson’s CPI established
1918-1923: Post-war period with German-Marxist networks
1923: Soviet Dezinformburo creation
The Mata Hari case is perhaps the best documented example of Nicolai’s methods, where agent H-21 was deliberately exposed to French authorities through radio messages transmitted in codes the Germans knew had been broken, a sophisticated termination operation designed to protect German intelligence methods. For what it’s worth, this is the kind of historical knowledge that gives crucial context for the 1980s CIA disinformation operation that blew up Soviet gas pipelines.
“In order to disrupt the Soviet gas supply, its hard currency earnings from the West, and the internal Russian economy, the pipeline software that was to run the pumps, turbines, and valves was programmed to go haywire, after a decent interval, to reset pump speeds and valve settings to produce pressures far beyond those acceptable to pipeline joints and welds,” [Thomas C. Reed, a former Air Force secretary who was serving in the National Security Council at the time] writes. “The result was the most monumental non-nuclear explosion and fire ever seen from space,” he recalls, adding that U.S. satellites picked up the explosion. Reed said in an interview that the blast occurred in the summer of 1982. […] In January 1982, Weiss said he proposed to Casey a program to slip the Soviets technology that would work for a while, then fail. Reed said the CIA “would add ‘extra ingredients’ to the software and hardware on the KGB’s shopping list.”
The sophisticated deception operation of agent H-21 was to protect real capabilities while feeding the enemy (at home or elsewhere) information that serves strategic political purposes. From 1917 paper and radio deception to 1982 software sabotage the technology changed, and yet American operatives maintained the same fundamental principles.
Perhaps now we see the real reason English dictionaries in the 1980s would publish a claim that Soviets invented “disinformation”. This was likely yet another CIA disinformation operation itself.
During the height of the Cold War, when American intelligence agencies were perfecting the art of feeding false narratives into academic and media channels, what better way to obscure the true American origins of modern propaganda techniques than to credit them to the enemy?
The irony is sickly sweet: the CIA, having inherited and refined Wilson’s domestic control methods and Nicolai’s sophisticated deception techniques, then deployed those same methods to rewrite the historical record. By the 1980s, American intelligence had become so adept at manipulating information flows that they could plant false etymologies in authoritative reference works, ensuring that future researchers would trace “disinformation” back to Soviet Russia rather than to America’s own pioneering propaganda apparatus.
The fact that a false origin story has persisted unchallenged for decades demonstrates just how effective these techniques are—the ultimate disinformation campaign was convincing the world that America learned disinformation from the Soviets, when in reality the Soviets had learned it from techniques pioneered and perfected by German spies deployed to suppress political dissent under “America First”.
We’re not just talking about historical artifacts when we do crucial history, but at the foundations of techniques being actively deployed today. The progression from Wilson’s “America First” domestic terror campaigns through Cold War disinformation to current “America First” domestic terror campaigns shows the proper through-line that explains the true meaning of present-day disinformation.
The Russian military depends heavily on old and unreplaceable hardware, which makes this intelligence operation particularly stunning.
“After processing additional information from various sources and verifying it … we report that the total (Russian) losses amounted to 41 military aircraft, including strategic bombers and other types of combat aircraft,” it added in a later update. There was no immediate public response from Moscow to the SBU statement.
The SBU said the damage caused by the operation amounted to $7 billion, and 34% of the strategic cruise missile carriers at Russia’s main airfields were hit.
Portraying this as unprecedented ignores the broader pattern of the entire war. Ukraine has been successfully using cheap, innovative solutions against expensive conventional systems since 2022.
This operation is best understood as a culmination from evolutionary scaling of existing products and procedures rather than any revolutionary new development.
The new “Long lines” of Wingate’s 1940 Chindits
Asymmetric tactics were foundational to defense of Ukraine from early on, with successful relatively inexpensive drones, anti-tank missiles, and other systems against much more expensive Russian conventional might.
What has evolved here is actually quite logical, and predictable.
Scale and coordination: Drone attacks have been a concept since the late 1800s. However, the act of simultaneously hitting four airfields across thousands of miles, including Siberia and above the Arctic Circle, represents an execution leap in operational coordination and reach.
Autonomous capabilities: AI-trained drones to recognize and target specific vulnerable points on aircraft without human control represents an expected culmination. If Chinese and German drones have been 98% accurate in zapping tiny agricultural pests for years already, a huge bomber on an airfield is a crispy duck.
Strategic impact: Destroying a third of Russia’s Tu-95 bomber fleet, which is presumed accurate, marks a substantial blow to Russia’s strategic large bombing capability. These aircraft represented an irreplaceable threat. China is now Russia’s only hope for hardware.
Cost-ratio: There has been a constantly deflating asymmetric warfare bill throughout the conflict. Fleets of armor and aircraft costing billions to invade Ukraine were eliminated by millions in agile defense systems. Now a reported set of $1,200 drones delivered $7 billion in potential damage, the most extreme example yet of Russia’s “power” proved to be a flimsy paper bear.
Those who know, know.
Wingate’s fleet of Waco “Hadrian” Gliders in 1944 Operation Thursday were deployed to do the “impossible”.
Just as the Chindits in WWII showed how smaller, more agile forces could penetrate deep behind enemy lines using unconventional methods, Ukraine is confirming again that distributed, low-cost systems can reach targets that conventional forces would struggle to hit.
Imagine if America had applied such logic in their ill-conceived plans for conventional forces to push through Iraq and seize Iran. It was big battalions on “the road to Tehran that runs through Bagdad“, remember, Mr. Tenet?
The “paper bear” effect is crucial to understand because Russia’s military has long projected power through impressive-looking legacy systems. Aside from criminal money and the ridiculously large continuation of the KGB, controlling every corner of the globe, what else have they got?
The Ukrainian defense repeatedly has exposed what Ukrainians have always known as Soviet insiders, how vulnerable expensive platforms are to much cheaper countermeasures. The Tu-95s are a perfect example: the biggest and baddest strategic bombers that Russia can’t replace are taken out by drones that cost less than a car. The supposed strength turns out to be the weakness.
The 1980s movie Red Dawn captured almost perfectly the mouth-frothing xenophobic fervor of Ronald Reagan. But it also was John Milius’ (Apocalypse Now screenwriter) comic book vision of how guerrillas could stop huge waves mechanized Russian conventional forces.
a blog about the poetry of information security, since 1995