text
stringlengths 4
429
|
---|
discoveries of the past 100 years or so makes it difficult for the appearance of any new |
technology to take on any self importance in the realm of human life. While it may be said that |
the formulations of "the age of the steam engine" and "the age of electrification" can be said |
to be names which reflect the realities of the time, today, with all kinds of new technology |
continuously beating against the banks of the age so that people scarcely have the time to |
accord them brief acclaim while being overwhelmed by an even higher and newer wave of |
technology, the age in which an era could be named for a single new technology or a single |
inventor has become a thing of the past. This is the reason why, if one calls the current era |
the "nuclear age" or the "information age," it will still give people the impression that you are |
using one aspect to typify the whole situation. (Qiao Liang & Wang Xiangsui 1999). |
It is important to stop for a moment and ponder the rapid advancement in military weaponry. |
New weaponry and concepts are easily dismissed as science fiction, yet the integration of |
mobile phones and the internet in 2008 would resemble science fiction to someone in the |
1980s. Reports of research and development may be noted momentarily before being |
subsumed in a busy, informationally-competitive world. For the purpose of this study, it is |
useful to acknowledge them in passing as they show the rapid advancement in science and |
technology, where military weapons are headed, and the increasing complexity and |
cooperation involved in their development and use. Current militarily-applicable science and |
technology, under development or already in use, include: augmented reality (Bonsor 2008); |
biotechnology; genetics; giving soldiers internal/biologic infrared, night vision, radar, and |
sonar capability (Block 2006); GPS; force fields (Hershkovitch 1998); invisibility cloaks |
(Mark 2008; Winkler 2003); microwave guns (Beam It Right There Scotty 2005); |
nanotechnology; neuroscience; positron bombs (Davidson 2004); robotic exoskeletons |
(Berkeley Bionics Human Exoskeleton 2007; Yeates 2007); space-based weapons such as |
ANGELS (Lewis 2005) and Rods from God (Adams 2004); telepathy (Braukus 2004; Put |
Your Mobile Where Your Mouth Is 2002); thought control of internet surfing and electronic |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
devices (New Technology Operated by Thought 2007); unmanned ground combat vehicles |
(Bloom 2008); and unmanned combat aerial vehicles (Pike 2008). |
Adding further to this complexity, Unrestricted Warfare, a book by two PLA senior colonels, |
Qiao Liang and Wang Xiangsui, claims that warfare is no longer strictly a military operation, |
and that the battlefield no longer has boundaries. Unrestricted Warfare was published by the |
PLA Literature and Arts Publishing House in Beijing in February 1999. According to the |
FBIS translation editor, the book |
was endorsed by at least some elements of the PLA |
leadership |
and an interview with one of the authors was published in the CPC Youth |
League |
s official daily newspaper on June 28, 1999. Thus while the book is not entirely |
backed by the PLA, especially the older generation, like the |
half empty, half full |
glass |
analogy, it does have some official backing and hence a degree of legitimacy as a document |
assisting analysis as to where the PLA is headed and how asymmetric tactics against a |
superior hi-tech military might be employed. |
Environmental concerns, human rights in regard to weapons of mass destruction, and the |
increasingly intertwined economies and political structures of globalization all have an |
impact on modern warfare. Sheer might of weaponry can no longer guarantee victory under |
these conditions. US extravagance in weaponry has been shown to stymie in the face of |
guerrilla warfare in Vietnam and Iraq. Under limited warfare, asymmetric warfare has seen a |
resurgence in use and value. Terrorist groups such as Al Qaeda employ guerrilla tactics and |
make use of the internet and financial institutions to subvert traditional warfare (Levinson |
2008; Yassin 2008). No single weapon can deliver a decisive victory, and weapons have |
been replaced by weapons systems. For example, the patriot missile relies on multiple |
technologies working in concert, from satellites to the missile itself, with data being relayed |
around the world. Modern militaries have become reliant on electronic sophistication. The |
authors of Unrestricted Warfare assert that war has not disappeared, but its appearance has |
changed and its complexity has increased (Qiao and Wang 1999). |
Non-Traditional Threats |
Increasing interdependence among states has increased the danger of non-traditional security |
threats, including the spread of disease, environmental damage, international terrorist groups, |
international crime, acquisition and transportation of energy and resources, natural disasters, |
and intertwined economies that can have an impact on social and political issues. For |
example, modern transportation has made it possible for criminals to traverse the globe with |
relative ease. The internet allows them to transfer or hide money across the globe and to |
covertly communicate beyond the jurisdiction of their enemies. Natural disasters or |
communicable diseases are no longer something which can be kept quiet as information |
radiates out through global media, causing damage to soft power factors, tourism, business, |
and international scrutiny (China's National Defense in 2006). |
The line between military and non-military, soldier and civilian, is being blurred. Terrorism |
is the most common example: the 2001 plane hijackings in the US, the Madrid train |
bombings in 2004, and the London bombings in 2005 to name just a few key examples. |
These lack an easily identifiable enemy to target, they cross territorial boundaries and use |
asymmetric attacks. Further blurring the line are the Sarin gas attacks on the Tokyo subway |
by disciples of the Aum Shinri Kyo, the actions of currency speculators in relation to the East |
Asian financial crisis, drug cartels, the mafia, media moguls who can influence the opinion of |
a mass audience, or industrial polluters who affect the economy and health of their |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
neighbours. These events can cause damage and disruption equal to war, but there is no |
foreign military or state against which to go to war. The individuals involved may be from |
multiple states and acting without government sponsorship. |
Another form of non-traditional threat comes from hackers. Hackers tend not to have |
military training, they may or may not have a political agenda, and they are capable of |
causing massive damage with nothing more than an off-the-shelf computer and an internet |
connection. For example, two British teenagers were able to access files on ballistic weapons |
research of the US. They then took control of US air force computers and proceeded to |
intrude into other military and government installations, making it appear as though the US |
military was hacking other states (Hacking U.S. Government Computers from Overseas |
2001). The rapid advancements in technology and globalization are opening new and |
complex ways to subvert security. In 2008, a group of 11 people managed to steal 45 million |
users |
bank and credit card details, resulting in a loss of more than $256 million. The group |
members were from diverse, yet cyber-advanced, geographical locations, including: Belarus, |
Estonia, China, Ukraine, and the US. Their unprecedented feat was accomplished by sitting |
outside of TJX retail stores and hacking into the store |
s wireless network. This illustrates |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.