08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

example, General Hal Hornburg, USAF, Chief of Air Combat Command, noted<br />

that IO should be separated into three areas: manipulation of public perception,<br />

computer network attack, and electronic warfare. Only the latter should be<br />

assigned to the warfighter. 166<br />

In a 2000 article in China <strong>Military</strong> Science, Dai stated that the means of<br />

integrated application of information fighting will initially be the integrated<br />

application of networks and electronics and that the key to gaining the initiative<br />

in IO lies in the establishment of an “active offensive.” Dai also noted that an<br />

IO is a series of operations with an information environment as the basic<br />

battlefield condition, with military information and an information system as<br />

the direct operational targets, and with EW and a computer network war as the<br />

principal forms. 167 His emphasis on INEW was thus clear over three years ago.<br />

Dai further noted that IOs are both confrontations focusing on forces<br />

and arms and, more importantly, trials of strength focusing on knowledge and<br />

strategies, meaning the emphasis should be on strategies. As technology has<br />

reinforced human initiative, it has also highlighted the role played by a<br />

confrontation of strategies. Now traditional strategic theories are being<br />

rethought, new strategies mapped out, and new confrontation strategies<br />

advanced. Dai speaks of:<br />

Informationalized arms and equipment, which will, together with<br />

information systems, sound, light, electronics, magnetism, heat, and so<br />

on, turn into a carrier of strategies, thereby extending the field of<br />

strategic thinking and application of strategies; enabling us to map out a<br />

strategy from the angle of technology, technological equipment, and<br />

techniques; and helping us study and develop some new methods for<br />

applying a strategy by technological means. Thus, we’re able to map<br />

out strategies aimed at applying technology to a battlefield; organically<br />

integrate technology with a strategy; add strategic wings to technology<br />

or scientific and technological genes to strategies; match technology<br />

with strategies; make strategies complement technology; or apply<br />

strategies in light of technology. 168<br />

166 David Fulghum, “USAF Redefining Boundaries of Computer Attack,” Aviation<br />

Week and Space Technology, Vol. 158, No. 9 (3 March 2003), p. 33.<br />

167 Dai Qingmin, “Innovating and Developing Views on Information Operations,”<br />

Zhongguo Junshi Kexue, [China <strong>Military</strong> Science] Vol. 13, No. 8 (20 August 2000),<br />

pp. 72-77, from the FBIS website.<br />

168 Ibid.<br />

94

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!