text
stringlengths
4
429
deny, degrade,
disrupt, or destroy a broad range of adversary threats, sensors, command and control and
critical support infrastructures
(Information Operations Roadmap 2003). The document
notes that PSYOPS and manipulating the thoughts of populations through media and internet
require constant observation during peacetime, otherwise in the event of conflict, a state
would not be sufficiently engrained into the information culture to utilize them fully. This
can be seen with the emergence of patriotic hackers, the advancement of social media, and
the rapid evolution of memetics, slang, and subcultures, all of which will be discussed further
below (List of Internet Phenomenon 2008; Pang 2008; Slashdot Subculture 2008; Slashdot
Trolling Phenomenon 2008). IO includes defence, attack, and reconnaissance as vital
components (Information Operations Roadmap 2003).
IO seeks to put out a political message in coordination with any traditional military assault. It
places an emphasis on finding, and clandestinely promoting, favourable media from third
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
parties, so as to appear more credible. IO also seeks to establish a legal framework to defend
against cyber attacks and cyber reconnaissance, as well as establish rules of engagement for
conducting cyber attack. For example, how much certainty is required in identifying the
source of an attack before responding? If an attack is being routed through multiple
computers, is it acceptable to attack the intermediary computer? This would halt the attack
but it would harm or destroy a computer which may have been infected without the owner
knowledge or consent. Additionally, an intangible computer attack can result in significant
tangible loss, but does this warrant the use of traditional military weapons as a response?
Future Combat Systems
Another US project that is gaining attention and closely resembles NCW and IO is Future
Combat Systems (FCS). FCS places a particular emphasis on advanced robotics, including
Unmanned Ground Vehicles (UGVs), Unmanned Aerial Combat Vehicles (UCAVs), NonLine of Sight Launch Systems, and Unattended Systems. This system of systems seeks to
make warfare as networked as the internet, as mobile as a mobile phone, and as intuitive as a
video game. The highly interconnected nature of FCS can even be seen in its development,
utilizing 550 contractors in 41 US states. While the US has yet to determine a definitive
name for this new type of information based, highly networked, and highly technological
warfare, it is clear that the US government has spent a significant amount of time and money
seeking to make it a reality. US Army officials have already stated that they intent to change
s name, because they believe the name is inappropriate, stating
the future is now
(FCS
Watch 2008; Future Combat Systems 2008; Baard 2007; Klein 2007; Gannon 2001).
Some of the complex logistical problems inherent in such an undertaking include: finance
allocation, giving the approval for use to commanders, inter-agency cooperation, a common
vernacular, rules of engagement, and adhering to the program
s stated goals. The US is
continually modernizing its cyber force, creating new hacker units, conducting cyber war
exercises, and diversifying and limiting the number of access points that could be used for an
attack (Waterman 2008; Greenberg 2007). And the US is not alone,
more than 120 countries
already have or are developing such computer attack capabilities
(GOA 1996). Information
warfare is being adopted by all modern nations and competition is mounting.
Informationization
China
s 2006 white paper on national defence places an emphasis on the informationization
of the military.
Informationization
(xinxihua) means improving the PLA
s ability to use
the latest technologies in command, intelligence, training, and weapon systems. New
automatic command systems linked by fibre-optic internet, satellite and new high-frequency
digital radio systems, allow for more efficient joint-service planning and command, while
also enabling a reduction in layers of command. The PLA
s move towards information
technology can be seen with the use of new space-based surveillance and intelligence
gathering systems, ASATs, anti-radar, infrared decoys, and false target generators. PLA
soldiers are using decision simulators, a low-light automatic tracking system for helicopters,
and a battlefield artillery/mortar fuse jamming system derived from Russian technology.
OSINT on China
s military continually makes note of informationization and the related, if
not identical, fields of cyber warfare, information warfare, CNO, and EW.
Priority is given
to R&D of new and high-tech weaponry and equipment, and endeavours to achieve
breakthroughs in a number of key technologies and leapfrogging technological progress, thus
speeding up weaponry and equipment modernization
(China's National Defense 2006).
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
Informationization includes increased education of soldiers in cyber warfare and NCW, a
reorganization of military branches and command system, and integrating joint operations.
The PLA is improving the information network for military training, and has built more
virtual laboratories, digital libraries and digital campuses to provide distance learning and
online teaching and training. University courses have emerged for cyber attack and defence,
a study of hacker methods, computer virus design and application, and network security
protocols (Annual Report to Congress 2008). Following the Russian example, China is
engaging in the debate of defining cyber warfare, in part through the Shanghai Cooperation
Organization, in order to have a hand in the shaping of a legal framework and rules of
engagement related to this new warfare. The PLA is pursuing a comprehensive
transformation from a mass army designed for protracted wars of attrition on its territory to
one capable of fighting and winning short duration, high intensity conflicts along its
periphery against high-tech adversaries (Annual Report to Congress 2008)
an approach that
China refers to as preparing for
local wars under conditions of informationization
(China's
National Defense 2006).
Exponential Growth and Unrestricted Warfare
One view on twentieth century patterns of unrestricted warfare has noted:
The names Watt and Edison are nearly synonymous with great technical inventions, and
using these great technological masters to name their age may be said to be reasonable.
However, from then on, the situation changed, and the countless and varied technological