Si Vis Pacem, Para Bellum


Five-Dimensional (Cyber) Warfighting: Can The Army After Next Be Defeated Through Complex Concepts and Technologies?

Five-Dimensional (Cyber) Warfighting: Can The Army After Next Be Defeated Through Complex Concepts and Technologies?With the end of the Cold War, U.S. national security perceptions concerning “Who is the threat?” have been thrown into free fall along with those governmental and military institutions meant to contend with it. Resulting from the spreading chaos and ambiguity in the nation-state system, which stem from the simultaneous processes of fragmentation and regionalization, a new question now needs to be asked—“What is the threat?” Increasingly, national security experts have argued that gray area phenomena,“. . . where control has shifted from legitimate governments to new half political, half-criminal powers,” will become the dominant threat.1 Such entities flourish in the growing failed-state operational environment where a condition of “not war–not crime” prevails and nation-state forces operating within it find themselves facing a severe capability gap.2 These entities disregard Western based “laws of war” and “rules of engagement” and are not concerned about such conventions as “legitimacy” or “public opinion.” Of further significance is the recognition that we are beginning the transition from the modern to the postmodern epoch in Western civilization. Past periods of transition such as this have historically witnessed the two collinear trends of the blurring of crime and war, along with shifts in social classes, economic modes, and motive sources which ultimately result in the fall of one civilization and its replacement by another more advanced one. 3 During the earlier shift from the medieval to the modern epoch, three new forms of social and political organization developed dynastic- (proto nation-) states, city-states, and city-leagues—as competitors to the then dominant feudal structure,4 in tandem with the domination of the battlefield by the non state soldier. Ultimately the early nation-state form and its mercenary armies won out over both these competitors and the preexisting civilization based upon Church, empire, and fief. As the shift to the post-modern epoch becomes more pronounced, we can expect similar competitors to the nation-state form and our modern civilization to emerge along with the accompanying non-state soldier. One such projected warmaking entity, “Black,” and its advanced means of waging war will be discussed in this paper. It is based upon an organizational structure far different than the classical hierarchy to which we are accustomed. Rather, it is nonlinear in function, composed of informational paths analogous to webs and nets, and basic units characterized as nodes and free floating cells.5 Such an organizational structure allows for the greater exploitation of postmechanical energy sources, advanced technologies, and new warfighting concepts which will come to dominate what we will term “war” in the decades to come.

Price: $14.95

Click here to buy from Amazon


Cyber Commander’s Handbook

Cyber Commander's HandbookThe global reliance on computers, networks and systems continues to grow. As our dependency grows so do the threats that target our military s Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) systems as well as the operational components and electronic controls for our critical infrastructure. Over the past decade we have experienced a substantial rise in the complexity and sophistication of cyber attacks as well as a frightening increase in the impact of some of the attacks. Every computer is a potential cyber weapon waiting to be loaded and used by extremists, criminals, terrorists and rogue nation states. As the world becomes more and more dependent on computers and information technology, the greater the risk of cyber attacks. Government and military leaders now face this fact and our critical systems and infrastructure remain at great risk! This risk has made the ability to defend these critical systems and direct cyber attacks core capabilities required for the modern military. In the age of cyber conflict, leaders need to understand the weapons and strategies used to wage this rapidly evolving type of warfare. This handbook will provide the background needed to understand the new world of cyber warfare, define the tools and techniques for offensive and defensive action, and provide insight into the strategies behind building a dynamic and relevant cyber warfare capability.

Price: $29.95
/* */