A U.S. Attack on Iran, a Catastrophic Unforced Error

war, warfighter, Iran, U.S., intelligence, counterintelligence, espionage, counterespionage, C. Constantin Poindexter, CIA, NSA

Public and Congressional Support: The Decisive Constraint That Can Turn U.S. Military Dominance Over Iran Into Strategic Defeat

The United States retains overwhelming advantages in the material and operational prerequisites of high-end conventional warfare. In any prospective conflict with Iran, Washington can assume advantages in air and naval superiority, intelligence and surveillance coverage, precision strike capacity, suppression of enemy air defenses, long-distance logistics, and advanced cyber and electronic warfare. Yet those advantages do not automatically translate into strategic success. The decisive variable is not whether the United States can destroy targets faster than an adversary can replace them, but whether the United States can sustain the political mandate to keep fighting after the initial shock of combat wears off, the costs become visible, and the enemy adapts.

This is the core vulnerability of a discretionary war with Iran. Public support and congressional support are not merely background noise or messaging challenges. They are strategic enablers. When they are absent or brittle, they shape rules of engagement, constrain time horizons, narrow acceptable costs, and fracture coalition cohesion. In that environment, even tactically brilliant operations can fail to achieve the most important objectives because political will collapses sooner than the enemy’s capacity to resist. Vo Nguyen Giap articulated this logic explicitly. A belligerent can leave enemy forces partly intact if it can destroy the enemy’s will to remain in the war. (PBS, n.d.) That insight was operationalized against the United States in Vietnam, echoed in Afghanistan, and remains relevant to any prospective United States-Iran war.

The Strategic Center of Gravity: Legitimacy and Endurance

Clausewitz argued that war is a continuation of politics by other means. In American practice, the political character of war is inseparable from constitutional structure and democratic consent. A war that begins without clear congressional authorization, or that proceeds amid broad public skepticism, can win battles while steadily losing its domestic foundation. The War Powers Resolution codifies Congress’s position that the President introduces U.S. forces into hostilities only pursuant to a declaration of war, specific statutory authorization, or a national emergency created by an attack on the United States or its forces. (50 U.S.C. § 1541, 1973) In a discretionary strike campaign that grows into sustained hostilities, the gap between executive action and legislative consent becomes a recurring legitimacy crisis rather than a one-time procedural dispute.

Recent reporting underscores that this institutional fault line is not theoretical. Reuters reported that the U.S. Senate rejected a bid to curb presidential Iran war powers, reflecting a live and lively, contested debate over authority and oversight in potential Iran hostilities. (Reuters, 2025) That debate matters operationally because contested legitimacy does not remain in Washington. It affects allied basing decisions, overflight permissions, intelligence sharing, escalation thresholds, and the credibility of U.S. signals to both adversaries and partners. A campaign that looks unilateral, politically improvised, or domestically unpopular becomes harder to sustain and easier for Iran and its proxy network to frame as illegitimate aggression.

Material Superiority Versus Political Fragility

From my perspective (military/intelligence), the United States can plausibly execute many of the classic prerequisites you listed. But those capabilities do not eliminate the central political question: what is the concrete objective, and how long will the American public accept the costs required to achieve it?

Public sentiment data indicates a serious constraint. A University of Maryland Critical Issues Poll found only 21 percent favor the United States initiating an attack on Iran, with 49 percent opposed and 30 percent unsure. (University of Maryland Critical Issues Poll, 2026) A YouGov report covering an Economist YouGov poll likewise found Americans more likely to oppose than to support using military force to attack Iran, with 49 percent opposing and 27 percent supporting, and with significant partisan and independent resistance. (YouGov, 2026) Meanwhile, an AP NORC poll found that while many Americans view Iran as an enemy and express concern about Iran’s nuclear program, they have low trust in presidential judgment on the use of military force, with only about three in ten expressing high trust and more than half expressing little or no trust. (Associated Press NORC, 2026)

The former being said, all of this has strategic implications. They suggest that domestic consent is not merely divided. It is structurally thin, with a large, uncertain middle and a relatively small affirmative mandate for initiating war. Low confidence in the decision maker’s judgment means that early setbacks or civilian casualties can rapidly convert uncertainty into opposition. Further, thin consent invites legislative confrontation, and legislative confrontation invites operational constraints. This is exactly the kind of environment in which an adversary designs a strategy of political attrition rather than symmetrical military competition.

Vietnam: Giap’s Theory of Victory Was Political

The claim that “North Vietnam did not win the Vietnam War” can be true in a narrow kinetic sense. The United States inflicted vast battlefield losses and dominated many tactical engagements. Yet North Vietnam and the Viet Cong were able to outlast the United States by targeting the political will that sustained American participation. Giap described the objective as breaking “the American will to remain in the war,” using operations intended to force de-escalation and reshape the political calculus in Washington. (PBS, n.d.) The point is not that one event alone decided the outcome. The point is that the adversary’s theory of victory treated American domestic endurance as the center of gravity. Once that center weakened, America’s material advantages could not convert into a stable political settlement on acceptable terms.

For an Iran scenario, the parallel is not an exact replay of Vietnam’s terrain or insurgency structure. The parallel is “strategic method”. Iran does not need to win a conventional air-sea contest. It needs to ensure that the United States does not achieve its most important objectives at a politically acceptable cost. If Iran can force Washington into a cycle of escalation and retaliation, or can trigger regional proxy pressure that steadily raises the price of engagement, then the war becomes a contest of domestic patience more than a contest of platforms.

Afghanistan and the Logic of “Time”

The Afghanistan experience reinforces the same strategic logic through a different mode of war. A saying widely attributed to Taliban fighters captures the asymmetry of time horizons: “You have the watches, we have the time.” (Maclean’s, 2017) The exact provenance of the phrase is less important than its strategic meaning. The U.S. Administration is about fall into the same bullshit trap. Democracies fight under time constraints produced by elections, news cycles, budget politics, and public casualty sensitivity. Insurgent and revolutionary actors often fight under generational horizons, with lower sensitivity to near term losses and a stronger tolerance for prolonged hardship.

Iran’s leadership and its proxy network have repeatedly demonstrated a long-horizon approach to regional strategy. In a conflict, Iran can employ calibrated escalation through proxies, maritime harassment, missile and drone pressure, and political warfare aimed at eroding coalition cohesion (a “coalition” of states that have already publicly objected to U.S. warplanning). The objective is not necessarily to defeat U.S. forces in the field. It is to make the conflict feel indefinite, morally ambiguous, and strategically distracting, which are precisely the conditions that drain public support in the United States.

“Shock and Awe” Does Not Solve the Political Problem

Advocates of rapid strike campaigns often argue that overwhelming early force can preempt political attrition by ending the conflict quickly. History offers caution. Initial public support (pretty clearly NOT the case today) can be high at the onset of a war, but it can erode sharply as the war’s duration and costs expand, particularly if the rationale becomes contested. The Iraq example is instructive: Gallup reported 72 percent support for the war against Iraq in late March 2003. (Gallup, 2003) Yet Gallup later documented substantial erosion in perceived worth and support over time as realities on the ground diverged from initial expectations. (Gallup, 2006) The Brookings analysis of early Iraq war opinion similarly underscores the rally effect and its limits. (Kull, Ramsay, and Lewis, 2003)

For Iran, the political risk is heightened because current polling suggests the United States would begin without anything like the 2003 level of public backing. (University of Maryland Critical Issues Poll, 2026) (YouGov, 2026) (Associated Press NORC, 2026) Without a broad initial mandate, the usual pattern reverses: instead of rallying, creating a cushion against early shocks, early shocks can collapse a narrow coalition of support. Moreover, Iran is structurally capable of generating early shocks through proxy responses and regional disruption, meaning that the political challenge may begin immediately, not after months or years.

Congress as a Strategic Actor, Not a Background Variable

In a system where Congress controls funding and has constitutional war powers, the legislative branch becomes a de facto strategic actor. When Congress is divided, when authorization is ambiguous, or when the public is skeptical, Congress can constrain the war through funding restrictions, reporting requirements, and political signaling that affects allied behavior. Reuters reporting on war powers debates around Iran illustrates that these conflicts are not hypothetical. (Reuters, 2025) Even the sycophants are likely to run out of patience for another endless foray, largely due to constituent pressure rather than disloyalty to their cult.

This really matters. Strategic clarity requires durable political consensus. If objectives are unclear or expand, congressional opposition becomes more likely and more intense. Further, Iran can exploit visible domestic division through information operations, propaganda, and calibrated escalation intended to polarize U.S. politics. In that sense, a weak domestic mandate is not merely a constraint on U.S. freedom of action. It becomes a targetable vulnerability. The North Vietnamese knew it. The Afghans knew it, and the more sober members of the Department of Defense know it.

A Missing Ingredient: Defined, Credible Political Objectives

Even if the United States can strike nuclear facilities, degrade air defenses, and disrupt command networks, the strategic question remains what “winning” means and what settlement conditions are realistically attainable. If the objective is limited, such as delaying nuclear capabilities, the question becomes whether limited objectives justify the costs and risks of regional escalation. If the objective expands to regime change, the problem becomes far harder because military destruction does not automatically produce political legitimacy, stable governance, or a non-hostile successor regime. Here, the user’s final criterion is decisive. Post-conflict planning, a wicked difficult peril that we have botched over and over again, will repeat itself. History shows that military victory without a stabilization strategy yields strategic failure, and the public tends to punish wars that feel open-ended, morally muddled, or poorly planned.

In the Iran case, this risk is amplified because a strike campaign can trigger proxy retaliation in multiple theaters, raise energy and shipping risks, and produce unpredictable political reverberations, all of which can be framed domestically as an optional war of choice rather than a necessary act of self-defense. When a war’s necessity is contested, public support becomes the decisive front.

Dominance in Combat Power Does Not Guarantee Strategic Success

The United States may indeed be dominant across many of the operational categories that matter for battlefield performance. Yet wars are not won solely by platform superiority. They are won by aligning military means with politically sustainable ends. Current public opinion suggests a narrow and fragile mandate for initiating an attack on Iran, combined with low confidence in executive judgment about the use of force. (University of Maryland Critical Issues Poll, 2026) (YouGov, 2026) (Associated Press NORC, 2026) In that environment, congressional contention over authorization and war powers becomes a predictable friction point, not an occasional procedural dispute. (50 U.S.C. § 1541, 1973) (Reuters, 2025) Iran and its proxy network do not need to defeat the United States conventionally to succeed strategically. They need to prolong, complicate, and regionalize the conflict until the United States loses the will and domestic legitimacy to continue, echoing Giap’s theory of victory in Vietnam and the time horizon logic captured by the Afghanistan aphorism. (PBS, n.d.) (Maclean’s, 2017)

A United States attack on Iran will NOT end well. We’ll have tactical dominance paired with a complete strategic disaster. Without sustained public and congressional support, the United States will fail to achieve its most important objectives (if the Administration can even articulate them) at an acceptable cost. The venture will not end with a clear victory, but with political exhaustion and a forced search for exit ramps. That is not my political critique. It is a strategic assessment rooted in how democratic states actually choose war and wage war. My call? Don’t f. do it. Exaggerations about “days from completing a nuclear weapon” coupled with no clear objective or endgame is a movie that we’ve seen before.

C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

Bibliography

  • Associated Press NORC Center for Public Affairs Research. 2026. “Most Americans see Iran as enemy but doubt Trump on military force: poll.” Associated Press.
  • 50 U.S.C. § 1541. 1973. War Powers Resolution, “Purpose and policy.” Legal Information Institute, Cornell Law School.
  • Gallup. 2003. “Seventy Two Percent of Americans Support War Against Iraq.” Gallup News Service, March 24, 2003.
  • Gallup. 2006. “Three Years of War Have Eroded Public Support.” Gallup News Service, March 17, 2006.
  • Kull, Steven, Clay Ramsay, and Evan Lewis. 2003. “Rally Round the Flag: Opinion in the United States before and after the Iraq War.” Brookings Institution.
  • Maclean’s. 2017. “Fighting in Afghanistan: ‘You have the watches. We have the time’.” September 2, 2017.
  • PBS. n.d. “Peoples Century: Guerrilla Wars: Vo Nguyen Giap Transcript.” Public Broadcasting Service.
  • Reuters. 2025. “US Senate rejects bid to curb Trump’s Iran war powers.” June 27, 2025.
  • University of Maryland Critical Issues Poll. 2026. “Do Americans Favor Attacking Iran Under the Current Circumstances? The Latest Critical Issues Poll Findings.”
  • YouGov. 2026. “Few Americans support U.S. military action against Iran, but a majority think it’s likely.” Economist YouGov poll, February 20 to 23, 2026.

Cyber-Militias and the Struggle for Primacy in the Information Battlespace

warfare and cyber militias, cyberwar, warfighter, intelligence, counterintelligence, c. constantin poindexter;

I came of age in an intelligence community that still treated the “front line” as a place one could step onto, map, and secure. That world is gone. Today, non-military adversaries, loosely coordinated “cyber-militias” of propagandists, patriotic hackers, influence entrepreneurs, and paid or volunteer amplifiers contest the initiative not with armor or artillery, but by colonizing attention, bending perception, and accelerating social division at scale. Our doctrine has begun to recognize this shift. In 2017, the U.S. Department of Defense elevated information to a joint function, formalizing what operators have seen for years. We note that modern campaigns hinge on creating and exploiting information advantage. The 2023 Department of Defense Strategy for Operations in the Information Environment makes the point explicitly: the Joint Force must be organized, trained, and resourced to integrate information effects alongside fires and maneuver (Department of Defense 2023).

By cyber-militias I mean non-uniformed actors—sometimes state-directed, often state-tolerated or “crowd-sourced” who blend cyber actions with narrative warfare on social platforms. They recruit and radicalize; swarm, harass, and dox; seed deepfakes and conspiracies; and flood the zone with emotionally sticky memes. Their command and control is typically flat and improvisational; their logistics are cloud-based, and their operational tempo is set by platform algorithms and news cycles. We have seen the military effects of such formations in diverse theaters. The so-called Internet Research Agency (IRA) exemplified a state-linked influence militia that scaled persuasion attempts and offline mobilization through U.S. social platforms. Rigorous research has since complicated the maximalist claims about measurable attitude change, but the operational fact remains: adversaries can reach millions of targets, at negligible marginal cost, with tailored narratives synchronized to geopolitical aims (Eady et al. 2023).

On the other end of the spectrum, the IT Army of Ukraine offers a case of defensive cyber-mobilization: a volunteer formation conducting DDoS, bug-hunting, and psychological operations in parallel with state efforts. This illustrates both the potency and the legal/ethical ambiguities that arise when civilians become combatants in the information domain (Munk 2025).

Terrorist organizations have long understood the leverage of social media. ISIS paired battlefield brutality with a meticulously engineered online propaganda machine, optimized for recruitment, intimidation, and agenda-setting across multiple languages and platforms. Peer-reviewed analyses detail how ISIS exploited platform affordances to sustain reach even as accounts were removed (Done 2022). The current flood of palestinian “claims of war theatre victory” are instructive.

Why Social Media Can Rival Physical Force

The simple answer is scale and speed. Computational propaganda leverages automation, amplification, and microtargeting to saturate feeds faster than fact-checking or deliberation can catch up. Systematic reviews now frame this as an evolving socio-technical ecosystem rather than a one-off tactic (Bradshaw and Howard 2019).

Assymetry comes a close second. Bots and coordinated inauthentic behavior give small and individual operators outsized influence, particularly in the first minutes of a narrative’s life cycle when early engagement signals can tip platform ranking systems. Studies show automated accounts disproportionately amplify low-credibility content at those critical early stages (Shao et al. 2018).

Human terrain effects must be contemplated. Even when direct persuasion is modest, harms in conflict zones are VERY REAL. Doxing, stigmatization, displacement, and cultural desecration have all been linked to online incitement during armed conflict. This is not just “online chatter”; it is operational preparation of the environment with human consequences (Ulbricht 2024).

Integration witrh kinetic operations is also an imperative ingredient. In Ukraine, Russian forces coupled physical systems (e.g., Orlan-10/Leer-3) with mass text and social campaigns to trigger panic and erode cohesion. This serves as a reminder that “information fires” can bracket the battlespace as surely as artillery (GAO 2022).

Memetic maneuver is a final consideration. In contemporary conflict, meme-based narratives are not mere ephemera. They are maneuver in the cognitive domain. Recent scholarship on memetic warfare in the Russia-Ukraine context argues that these artifacts structure attention, encode complex frames, and accelerate recruitment into “participatory propaganda” at scale (Prier 2017).

A Note on Evidence and Caution

Brutal intellectual honesty must be front and center. A Nature Communications study linking U.S. Twitter feeds to survey data found no overly significant changes in respondents’ attitudes or vote choice attributable to IRA exposure during 2016, however, we should neither ignore this nor overgeneralize from it. The study does not absolve adversary campaigns. It refines our theory of effect. Many operations seek agenda control, polarization, intimidation, and time-on-target distraction rather than simple vote-switching. In war, even small shifts in participation, risk perception, or unit morale can be decisive (Eady et al. 2023).

The Imperative: Treat Adversarial Propaganda as a Campaign Target

NATO now frames “cognitive warfare” as a cross-domain challenge. The human mind is “contested terrain” where actors seek to modify perceptions and behavior (Claverie du Cluzel et al. 2021). That is not inflammatory rhetoric. It is operational reality in every theater that I have observed. Our response must leave the era of ad-hoc rebuttals and move toward integrated operations in the information environment (OIE) with explicit objectives, authorities, and measures of performance and effect.

What Intelligence and Warfighters Must Do

1) Build a fused intelligence picture of the narrative battlespace.
We need SOCMINT and OSINT cells that map not just “what is trending,” but also why. The network topologies, amplification pathways, and cross-platform migration patterns by which malign content metastasizes. Computational propaganda research offers a starting taxonomy; we must operationalize it into collection requirements and analytic standards (Bradshaw and Howard 2019).

2) Normalize OIE alongside fires and maneuver.
Commanders should plan narrative lines of effort the way they plan suppression of enemy air defenses: with target systems, timing, sequencing, and joint enablers. The 2023 SOIE calls for exactly this, i.e., education, resourcing, and integration so that information effects are not an afterthought but embedded in campaign design (Department of Defense 2023).

3) Contest the initiative through pre-bunking and resilience, not just takedowns.
Content moderation is necessary but insufficient. The strongest evidence for population-level resilience points to psychological inoculation. Brief interventions that teach people to spot manipulation techniques before exposure reaps oversized dividends. Large field experiments on YouTube and cross-platform studies show significant gains in users’ ability to recognize manipulation, though effects attenuate without reinforcement (Roozenbeek et al. 2020; Maertens et al. 2021).

4) Impose friction on hostile cyber-militias.
Joint and interagency teams should target the infrastructure of amplification (maning botnet C2, SIM farms, and payment rails for “influence mercenaries.”) Early-cycle disruption pays outsized dividends given bots’ role in initial virality (Shao et al. 2018).

5) Clarify authorities and align with the law of armed conflict.
Volunteer cyber formations raise attribution and status-of-combatant questions. Scholars have argued for pragmatic frameworks that harness civic energy while mitigating escalation and civilian-combatant blurring (Munk 2025).

6) Train for the cognitive domain.
Treat cognitive security as tradecraft, not simply lip-service. This includes red-teaming our own narratives, pre-mission media terrain analysis, and SOPs for rumor control when adversaries seed panic. NATO-sponsored analyses emphasize that cognitive effects require skilled practitioners, clear objectives, and ethical guardrails (Claverie du Cluzel et al. 2021).

7) Measure what matters.
Intelligence and warfighter analysts must avoid over-indexing on vanity metrics. We need to build dashboards around indicators, i.e., time to adversary saturation, percentage of priority audiences inoculated, and suppression of inauthentic behavior during the “golden hour.” The ICRC’s typology linking online dynamics to offline harm provides a framework (Ulbricht 2024).

The Strategic Bottom Line

In conventional war, advantage is cumulative. Logistics, training, and combined arms competence pay off BIGLY. In the information fight, advantage is compounding. The side that gets inside the adversary’s decision cycle sets the frame for everything that follows. Our adversaries are playing that compounding game. They field cyber-militias that operate at machine speed but speak in human idiom, exploiting platform incentives and cognitive biases that are as old as persuasion itself and as new as generative AI.

As intelligence professionals and warfighters it is not merely to rebut lies after the damage is done. It is to DENY adversarial initiative in the information environment, to map and preempt their campaigns, to harden our populations, to integrate narrative effects with maneuver. Doing this all under the rule of law and democratic accountability will be a challenge. The I.C. and armed forces are not ignoring this, thankfully. The JF now names information as a core function, however, doctrine without resourcing and practice is just paper. We must build the teams, authorities, and habits to fight and win where people live now, in feeds and group chats as much as in physical space. If we fail, we cede the decisive ground of modern conflict to non-military adversaries who understand that primacy is no longer measured only in meters seized, but in minds held.

A crucial recommendation is that counterintelligence is particularly well-suited to this mission. Counterintelligence tradecraft, long dedicated to identifying, deceiving, and neutralizing hostile influence operations, translates directly into the fight against cyber-militias. C.I. operators bring expertise in adversary attribution, double-agent operations, disinformation detection, and the manipulation of clandestine networks, which are precisely the skills needed to unmask coordinated inauthentic behavior online. I firmly believe that integrating C.I. into information warfare provides unique advantages. It blends technical signals analysis with human-source validation and can “exploit, disrupt, or co-opt” adversary influence operations in ways that exceed mere content moderation (Hunker 2010; Rid 2020). To leave cyber-militias solely to public diplomacy or platform governance is to fight with one arm tied. Incorporating counterintelligence into the core of our information campaigns ensures that the United States can not only defend against adversarial propaganda but actively contest and dismantle the networks that drive it.

~ C. Constantin Poindexter, MA in Intelligence, Graduate Certificate in Counterintelligence, JD, CISA/NCISS OSINT certification, DoD/DoS BFFOC Certification

References

Bradshaw, Samantha, and Philip N. Howard. 2019. The Global Disinformation Order: 2019 Global Inventory of Organised Social Media Manipulation. Oxford: Oxford Internet Institute.

Claverie du Cluzel, François, et al. 2021. “Cognitive Warfare.” NATO Allied Command Transformation, Innovation Hub. Norfolk, VA.

Department of Defense. 2023. Strategy for Operations in the Information Environment. Washington, DC.

Done, Alasdair. 2022. “ISIS Propaganda and Online Radicalization.” Journal of Strategic Security 15 (3): 27–49.

Eady, Gregory, Jonathan Nagler, Andrew Guess, Jan Zilinsky, and Joshua Tucker. 2023. “Exposure to the Russian Internet Research Agency Foreign Influence Campaign on Twitter in the 2016 U.S. Election and Its Relationship to Attitudes and Voting Behavior.” Nature Communications 14 (1): 367.

GAO (U.S. Government Accountability Office). 2022. Information Environment: DOD Should Take Steps to Expand Its Assessments of Information Operations. Washington, DC.

Hunker, Jeffrey. 2010. “Cyber War and Cyber Power: Issues for NATO Doctrine.” NATO Defense College Research Paper, no. 62. Rome: NATO Defense College.

Maertens, Rakoen, Melisa Roozenbeek, Sander van der Linden, and Stephan Lewandowsky. 2021. “Long-Term Effectiveness of Inoculation Against Misinformation: Three Longitudinal Experiments.” Journal of Experimental Psychology: Applied 27 (1): 1–16.

Munk, Tine. 2025. “The IT Army of Ukraine: Digital Civilian Resistance and International Law.” Crime, Law and Social Change 83 (1): 55–74.

Prier, Jarred. 2017. “Commanding the Trend: Social Media as Information Warfare.” Strategic Studies Quarterly 11 (4): 50–85.

Rid, Thomas. 2020. Active Measures: The Secret History of Disinformation and Political Warfare. New York: Farrar, Straus and Giroux.

Roozenbeek, Jon, Sander van der Linden, and others. 2020. “Fake News Game Confers Psychological Resistance Against Online Misinformation.” Palgrave Communications 6 (1): 65.

Shao, Chengcheng, Giovanni Luca Ciampaglia, Onur Varol, Alessandro Flammini, and Filippo Menczer. 2018. “The Spread of Low-Credibility Content by Social Bots.” Nature Communications 9 (1): 4787.

Ulbricht, Moritz. 2024. “Online Propaganda and Civilian Harm in Armed Conflicts.” International Review of the Red Cross 106 (1): 67–94.