08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

uzzword for IO writers. For example, a recent 2004 Joint Warrior<br />

Interoperability Demonstration (JWID), where information security issues<br />

would be expected to appear, cited nine of sixty-one trials as worthy of further<br />

exploration. These nine trials were: identity-based encryption, cross-domain<br />

information sharing, interoperable decision support for defense, enterprise<br />

application integration, interoperable alerts here and abroad, making visible the<br />

entire network, securing message exchanges across nations, multiple network<br />

access from one workstation, and automated information sharing among<br />

networks. 2 This strong emphasis on systems integration and information<br />

security and network issues is typical for a US military exercise. Cyber-related<br />

terminology does not appear with nearly the same frequency or emphasis in<br />

such exercises, if it appears at all.<br />

The US military has been extremely successful in applying and<br />

integrating information capabilities into its fighting apparatus—so successful,<br />

in fact, that it may have become immune to an emerging need to look elsewhere<br />

for new ideas and trends. It is hard to tell those who have done so well for so<br />

long that they might be able to do better if they considered other options. The<br />

US military is more than willing to experiment with new Cyber Age equipment<br />

but just as unwilling to explore IO theory with the same abandon. Some IO<br />

tasks in Iraq and elsewhere, for example, were assigned to artillery personnel<br />

because they understood targeting, not IO theory and practice. This is simply<br />

wrong. Perhaps this is because the US military doesn’t have an academy of<br />

military science as some nations do. Such an academy would provide for<br />

greater clarification of the capabilities, laws, methods, forms, and principles of<br />

IO.<br />

The US military writes more on IO by order of magnitude than most<br />

countries. Still this doesn’t mean the US has it all right or that it has thought<br />

everything through from various perspectives. That is why a review of IO<br />

developments in other nation-states and IO developments among transnational<br />

groups, such as terrorists and criminal elements, are of value. The review offers<br />

alternative ways of viewing twenty-first-century developments and presents a<br />

comprehensive outline of the impact of information or cyber technologies and<br />

concepts on military and national security affairs. Such an analysis also helps<br />

with the formulation of counterstrategies to a terrorist’s cyber activities.<br />

While the primary US emphasis on technology meets the demands of<br />

keeping the military-industrial complex engaged, the US tends to place less<br />

emphasis on some of the equally important developments in the fields of cross-<br />

2 Frank Tiboni, “<strong>Military</strong> Eyes New Technology,” Federal Computer Network, 18<br />

January 2005, from FCW.COM, 20 January 2005.<br />

8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!