text
stringlengths 4
429
|
---|
deny, degrade, |
disrupt, or destroy a broad range of adversary threats, sensors, command and control and |
critical support infrastructures |
(Information Operations Roadmap 2003). The document |
notes that PSYOPS and manipulating the thoughts of populations through media and internet |
require constant observation during peacetime, otherwise in the event of conflict, a state |
would not be sufficiently engrained into the information culture to utilize them fully. This |
can be seen with the emergence of patriotic hackers, the advancement of social media, and |
the rapid evolution of memetics, slang, and subcultures, all of which will be discussed further |
below (List of Internet Phenomenon 2008; Pang 2008; Slashdot Subculture 2008; Slashdot |
Trolling Phenomenon 2008). IO includes defence, attack, and reconnaissance as vital |
components (Information Operations Roadmap 2003). |
IO seeks to put out a political message in coordination with any traditional military assault. It |
places an emphasis on finding, and clandestinely promoting, favourable media from third |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
parties, so as to appear more credible. IO also seeks to establish a legal framework to defend |
against cyber attacks and cyber reconnaissance, as well as establish rules of engagement for |
conducting cyber attack. For example, how much certainty is required in identifying the |
source of an attack before responding? If an attack is being routed through multiple |
computers, is it acceptable to attack the intermediary computer? This would halt the attack |
but it would harm or destroy a computer which may have been infected without the owner |
knowledge or consent. Additionally, an intangible computer attack can result in significant |
tangible loss, but does this warrant the use of traditional military weapons as a response? |
Future Combat Systems |
Another US project that is gaining attention and closely resembles NCW and IO is Future |
Combat Systems (FCS). FCS places a particular emphasis on advanced robotics, including |
Unmanned Ground Vehicles (UGVs), Unmanned Aerial Combat Vehicles (UCAVs), NonLine of Sight Launch Systems, and Unattended Systems. This system of systems seeks to |
make warfare as networked as the internet, as mobile as a mobile phone, and as intuitive as a |
video game. The highly interconnected nature of FCS can even be seen in its development, |
utilizing 550 contractors in 41 US states. While the US has yet to determine a definitive |
name for this new type of information based, highly networked, and highly technological |
warfare, it is clear that the US government has spent a significant amount of time and money |
seeking to make it a reality. US Army officials have already stated that they intent to change |
s name, because they believe the name is inappropriate, stating |
the future is now |
(FCS |
Watch 2008; Future Combat Systems 2008; Baard 2007; Klein 2007; Gannon 2001). |
Some of the complex logistical problems inherent in such an undertaking include: finance |
allocation, giving the approval for use to commanders, inter-agency cooperation, a common |
vernacular, rules of engagement, and adhering to the program |
s stated goals. The US is |
continually modernizing its cyber force, creating new hacker units, conducting cyber war |
exercises, and diversifying and limiting the number of access points that could be used for an |
attack (Waterman 2008; Greenberg 2007). And the US is not alone, |
more than 120 countries |
already have or are developing such computer attack capabilities |
(GOA 1996). Information |
warfare is being adopted by all modern nations and competition is mounting. |
Informationization |
China |
s 2006 white paper on national defence places an emphasis on the informationization |
of the military. |
Informationization |
(xinxihua) means improving the PLA |
s ability to use |
the latest technologies in command, intelligence, training, and weapon systems. New |
automatic command systems linked by fibre-optic internet, satellite and new high-frequency |
digital radio systems, allow for more efficient joint-service planning and command, while |
also enabling a reduction in layers of command. The PLA |
s move towards information |
technology can be seen with the use of new space-based surveillance and intelligence |
gathering systems, ASATs, anti-radar, infrared decoys, and false target generators. PLA |
soldiers are using decision simulators, a low-light automatic tracking system for helicopters, |
and a battlefield artillery/mortar fuse jamming system derived from Russian technology. |
OSINT on China |
s military continually makes note of informationization and the related, if |
not identical, fields of cyber warfare, information warfare, CNO, and EW. |
Priority is given |
to R&D of new and high-tech weaponry and equipment, and endeavours to achieve |
breakthroughs in a number of key technologies and leapfrogging technological progress, thus |
speeding up weaponry and equipment modernization |
(China's National Defense 2006). |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
Informationization includes increased education of soldiers in cyber warfare and NCW, a |
reorganization of military branches and command system, and integrating joint operations. |
The PLA is improving the information network for military training, and has built more |
virtual laboratories, digital libraries and digital campuses to provide distance learning and |
online teaching and training. University courses have emerged for cyber attack and defence, |
a study of hacker methods, computer virus design and application, and network security |
protocols (Annual Report to Congress 2008). Following the Russian example, China is |
engaging in the debate of defining cyber warfare, in part through the Shanghai Cooperation |
Organization, in order to have a hand in the shaping of a legal framework and rules of |
engagement related to this new warfare. The PLA is pursuing a comprehensive |
transformation from a mass army designed for protracted wars of attrition on its territory to |
one capable of fighting and winning short duration, high intensity conflicts along its |
periphery against high-tech adversaries (Annual Report to Congress 2008) |
an approach that |
China refers to as preparing for |
local wars under conditions of informationization |
(China's |
National Defense 2006). |
Exponential Growth and Unrestricted Warfare |
One view on twentieth century patterns of unrestricted warfare has noted: |
The names Watt and Edison are nearly synonymous with great technical inventions, and |
using these great technological masters to name their age may be said to be reasonable. |
However, from then on, the situation changed, and the countless and varied technological |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.