Military Planning, Intelligence, and Algorithmic Warfare in the Iran Campaign

Center for Strategic & International Studies (CSIS)
Center for Strategic & International Studies (CSIS)Mar 17, 2026

Why It Matters

The episode shows how a simple physical fault shaped computing terminology and reinforces the need for rigorous debugging practices that underpin today’s sophisticated software and algorithmic warfare.

Key Takeaways

  • 1947 Harvard Mark II halted by moth in relay
  • Engineers documented insect, coining “first actual bug” as
  • Term “bug” predated computers, used by Thomas Edison
  • Logbook entry popularized debugging terminology across computing industry
  • Anecdote underscores meticulous error tracking’s lasting strategic value

Summary

The video recounts the 1947 incident where a moth caused a malfunction in the Harvard Mark II computer, marking the origin of the modern “bug” metaphor.

Engineers discovered the insect lodged in a relay, taped it into their logbook, and labeled it “First actual case of bug being found.” This anecdote illustrates early debugging practices and the literal nature of early computer failures.

Although the term “bug” had been used informally by inventors like Thomas Edison to describe mechanical glitches, the Harvard Mark II incident cemented its usage in computing. The logbook entry, complete with the moth, became an iconic illustration of error documentation.

The story underscores the enduring importance of meticulous record‑keeping and systematic troubleshooting in technology development, lessons that remain vital as modern systems grow increasingly complex and algorithm‑driven.

Original Description

Operation Epic Fury has brought renewed attention to how modern campaigns are planned and executed. From intelligence collection and analysis to operational planning and strike execution, military and intelligence professionals play a critical role in shaping how these campaigns unfold. At the same time, rapidly evolving technologies—including artificial intelligence—are raising new questions about how emerging tools are used on the battlefield, what they can realistically achieve, and how human judgment continues to guide military decisionmaking.
What can we learn from Operation Epic Fury so far? How do planning and targeting processes work in practice across the intelligence community and the joint force? What military objectives are shaping operational decisions, and how do they connect to broader strategic goals? And how are new technologies—including artificial intelligence and machine learning—being incorporated into modern military operations while managing risks and maintaining human oversight?
Please join the CSIS Defense and Security Department for a conversation featuring Lieutenant General (Ret.) Karen Gibson, U.S. Army, former Director of Intelligence for U.S. Central Command and Senior Associate (Non-resident) with the CSIS Intelligence, National Security, and Technology Program, Lieutenant General (Ret.) Jack Shanahan, U.S. Air Force, former Director of the Joint Artificial Intelligence Center at the U.S. Department of War, and Emily Harding, Director of the CSIS Intelligence, National Security, and Technology Program and Vice President of the Defense and Security Department. The discussion will be moderated by Kari Bingen, Director of the CSIS Aerospace Security Project.
This event is made possible by general support to CSIS.
---------------------------------------------
A nonpartisan institution, CSIS is the top national security think tank in the world.
Visit https://www.csis.org to find more of our work as we bring bipartisan solutions to the world's greatest challenges.
Want to see more videos and virtual events? Subscribe to this channel and turn on notifications: https://cs.is/2dCfTve
Follow CSIS on:

Comments

Want to join the conversation?

Loading comments...