CEEOL - Article Detail
Gill Bennett reviews The Spy and the Traitor: The Modernising Defence Programme now offers the Royal Artillery a chance to consider the future of fires. Chris has witnessed the rise of one of the biggest tech firms on This roundtable will discuss the recent U. Time for a Change? Warfare in the Information Age: General Sir Richard Barrons has laid out his concerns about the defence and security postures adopted by the UK, NATO, and the West more generally, at a time of what he argues is a substantially increased threat to global peace and security. Subscribe to our Newsletter.
Support Rusi Research Make a donation. Proliferation and Norms in the Region Occasional Papers , 17 December Aniseh Bassiri Tabrizi and Justin Bronk This Occasional Paper aims to provide an in-depth inventory of armed drones possessed by Middle Eastern states, assessing quantity, types and timeframes; and to explore where and how armed drones have been used so far, to assess whether and how countries' practices and ethical considerations around airpower and airstrikes are affected. To Ban or to Banbury? Commentary , 7 December John Hemmings The detention of a chief Huawei executive has spotlighted yet again a controversial Chinese technology giant, and may be a harbinger of stronger international pressure on the company.
Fighting and Winning in the Information Age
Set up My libraries How do I set up "My libraries"? These 8 locations in All: Australian National University Library. Open to the public. Not open to the public La Trobe University Library.
Borchardt Library, Melbourne Bundoora Campus. Open to the public ; Open to the public ; held Book English University of Canberra. University of Canberra Library. These 3 locations in Australian Capital Territory: This single location in Tasmania: These 3 locations in Victoria: Open to the public ; held Book English Show 0 more libraries This single location in Western Australia: None of your libraries hold this item.
Found at these bookshops Searching - please wait Fear, honor, and interest still drive the behavior of individuals, groups, and nation-states. As organizations responsible for the lives of millions, some natural conservatism is understandable. Yet, just as animal species that fail to evolve eventually die out, an inability to adapt to an ever-changing environment condemns organizations to irrelevance. The lessons of Vietnam, Iraq, and Afghanistan are that overwhelming advantages in numbers, equipment, and training are insufficient to guarantee victory.
It is time to move away from industrial-age ideas about resources, technology, and manpower, and ask ourselves: What does it take to fight and win in the information age? In the coming years, adversaries will increasingly operate across all domains, land, sea, air, space, and cyberspace, throughout the peace to war continuum to degrade the cohesiveness of the United States and its allies and partners, attacking what U. The contested information environment means that current capabilities such as GPS-guided bombs and close air support are increasingly degraded.
This will put increasing emphasis on the need for protected, closed networks that are localized, and capabilities that can operate within line-of-sight of the marine or soldier on the ground, such as tanks, unmanned ground vehicles, and miniature unmanned aerial systems.
It also puts additional pressure on militaries to develop artificial intelligence and big data analytics systems that can assist in network and spectrum analysis to generate network and spectrum superiority. Overall, the demand for the rapid development of new technologies, and new doctrine, tactics, techniques, and procedures for the employment of these technologies, will increase. Even as modern militaries respond to growing threats, it is important to note that war in the information age is not just warfare in the information domain.
In recent years, the annual Russian military budget has been about In cyberspace, the Russian Business Network RBN , a cyber-crime organization, conducts cyber operations at the direction of the Russian government in exchange for safe haven in Russia.
Search form
In the real world, Russia has deftly tapped into rising nationalism to establish networks of anti-government militias in Georgia and Ukraine. These militias amplified the effects of the so-called Little Green Men, allowing Russia to invade and annex territory without the investments in manpower and equipment that would traditionally be required.
This is not a call to start recruiting criminals!
This is especially true in the cyber domain, where the military cannot compete with the private sector in paying for talent. The Cyber Defense League is a voluntary network of information technology professionals who can be mobilized as needed to defend against cyberattacks on Critical Information Infrastructure CII within Estonia. Other militaries could adapt the idea by establishing cyber units in the Reserves and recruiting cyber professionals into these units. These reserve cyber warriors would be able to hone their skills in dealing with cyber threats in their normal daily jobs, while familiarizing themselves with military networks during their reserve training periods.
Cyber professionals defending commercial networks which are on the internet face a far greater variety of threats in far larger numbers than those who work on closed off, military networks. As such, these reservists may well be able to perform much better than active duty personnel. Beyond cyber, militaries can leverage the power of networks with professionals and companies in developing technologies such as artificial intelligence, robotics, and big data analytics. They must also experiment with new ways to integrate these with existing military capabilities to support the tactical fight.
Fighting in the information domain alone will not be decisive.