[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Info Foes
URL: http://www.ndu.edu/ndu/inss/strforum/z1106.html
Strategic Forum
THE REVOLUTION IN MILITARY AFFAIRS
Martin Libicki, CDR James Hazlett, et al.
[Excerpts]
DISCUSSION I: STRATEGIC CHALLENGES
Those who assess future strategic challenges tend to look to
Asian
countries, and to categorize competitors as peer, regional,
or niche.
Asia and the Nation-State
Most conference participants believe that, over the next
twenty
years, the fulcrum of world politics will continue to shift
from
Europe and its peripheries to the Asia-Pacific region. The
period of
European dominance produced innumerable wars as various
countries
challenged each other for power, resources, and sovereignty.
With the
formation of the European Union and the dissolution of the
Warsaw
Pact, great power rivalry in particular and the nation-state
in
general are fading somewhat in importance.
The nation-state remains strong in Asia, however. The last
fifty years
have seen considerable economic progress as various nations
have made
themselves richer by grasping the secrets of rapid
industrialization.
This trend, which started in Japan in the 1950s and 1960s,
spread to
the Tigers in the 1970s, ASEAN countries in the 1980s, and
China and
perhaps India in the 1990s, has left no Asian country
unaffected.
Economic growth, however, has not made the nation-state
obsolete. To
the contrary, the nation-state has been instrumental in
creating the
internal and external conditions for economic growth.
European history
suggests that countries, once they taste wealth, will
struggle for
power. Will Asian countries follow that pattern or
demonstrate new
models of what the nation-state is capable of? ...
Types of Competitors
One taxonomy of future threats suggested at the conference
is to
classify potential competitors as peer, regional, or niche.
A peer
competitor could challenge our military across the board. A
niche
competitor would be incapable of doing so, but would strive
to inhibit
or defeat U.S. intervention by developing capabilities such
as
primitive weapons of mass destruction, sensor blinders,
physical
terrorism, information system attacks, psychological
operations, or
hostage maneuvers. ...
DISCUSSION II: OPERATIONAL CHALLENGES
Considerable evidence suggests that commercial access to
information
-- GPS readings, space-based imagery, and Internet data --
could be
transformed into military advantage thereby levelling the
playing
field between ourselves and our potential opponents. Other
dual-use
technologies, for instance, those that would permit remote
piloting of
aerial vehicles, permit commercial technologies such as
electronic
video photography to act as powerful military tools
accessible to all
(RPVs are made in more than thirty countries).
Technologies That Level the Field
Does the proliferation in information technologies
necessarily negate
our current military lead? Information-based warfare creates
new
vulnerabilities for industrial-age institutions slow to
adapt. Because
most U.S. logistics facilities and command nodes are not
well hidden,
they are vulnerable to precision strike. The widespread
availability
of overhead imagery coupled with GPS integration into weapon
systems--
no more than a few years away for countries such as
India--poses a
serious threat to which our improving defensive measures
(e.g.,
anti-tactical ballistic missiles) will provide only a
partial solution
. Our own counter-C2 operations are complicated by the
rapidly falling
cost of bandwidth and redundancy. Even if 90 percent of a
bit flow can
be interdicted, the remaining 10 percent may suffice for
operational
uses. Rapid expansion of cellular nodes, particularly
through
exploitation of commercial space assets, may make targeting
and
communications denial difficult or impossible. Multiple
channels of
electronic access will also complicate psychological
operations and
countermeasures.
With the advent of the global information infrastructure, a
clever
adversary could take advantage of open information systems
to enhance
its own communications, information, navigation,
intelligence, and
operational support: examples include GPS, one-meter
imagery, weather
data, and even CNN. Every year more information with
potential
military use can be gleaned by anyone from the Internet
without
leaving fingerprints. How easily can a country's access to
the global
satellite communications networks be blocked? The coming
global
information infrastructure will have many points of entry.
It will
also be difficult to curtail certain services (e.g., global
navigation) without denying them to U.S. users or even our
own
national security establishment.
Technologies that Keep Us Ahead
The United States, nevertheless, retains an edge in two
important
areas: space and systems integration. Space systems are
relatively
difficult to build and although many potential middle-income
adversaries can borrow space services from third parties,
fewer can
own satellites, and far fewer can launch them. Thus the
United States
will retain a clear edge in the size and sophistication
(timeliness
and interpretation) of space capabilities, in their adoption
and
adaptation for military uses, in their augmentation or
adaptation for
the particulars of future contingencies, and in the
assurance of their
continuity.
The distinctions between data and information, and between
information
and knowing could also favor U.S. forces. There are vast
differences
between, for instance, access to meteorological imagery and
determining, for instance, that a locus of operations is
likely to be
fogged in 24 hours hence (a distinction relevant to the
Falklands
campaign). The art of operational planning is not acquired
automatically with the acquisition of computers. Similarly,
as sensors
proliferate in type as well as numbers, data fusion is
likely to
become more decisive in future conflicts. ...
POLICY RECOMMENDATIONS
Two conference threads merit further examination:
* U.S. defense policies that make it more difficult for
potential
competitors to threaten their neighbors and hold off the
United
States at the same time may be worth pursuing for that
fact alone.
* If militarily relevant information technologies are
everywhere,
sophistication at using them may be a better predictor
of how
challenging a competitor may become for the United
States.
Therefore, in addition to worrying about how large
future foes are
(and sizing our own forces accordingly), we should also
focus on
the potential sophistication of our foes (and develop
doctrine
accordingly).