This article from the last issue of Parameters makes for a good follow-on read to the paper I linked above:

Structural Vulnerabilities of Networked Insurgencies: Adapting to the New Adversary
...The purpose of this article is not to propose a comprehensive strategy for a modern counterinsurgency. Instead, it examines one component of such a plan—understanding and exploiting the insurgent’s structural vulnerabilities. It does not exhaust this analysis; the conclusions drawn here are demonstrative of the possibilities inherent in this methodology.

Throughout this article, the conflict in Iraq is used as an illustrative example of a modern insurgency. The Iraqi insurgency is thus far the most advanced embodiment of netwar, where small groups coordinate, communicate, and conduct their campaigns in an internetted manner, without a precise central command. As such, this conflict is a powerful predictor of the future of insurgency....