30.01.2017 Views

THE FUTURE OF SEA POWER

SPC2015_Proceedings

SPC2015_Proceedings

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Operational Impact of New Naval Technologies | 89<br />

the desired reactions from the deception target. The attacker can also use so-called<br />

logic bombs to incapacitate the opponent’s information system. Such a ‘bomb’ can lie<br />

dormant until it is activated by some event, such as a specific date or a random number,<br />

and then destroy or substantially damage the opponent’s information system. Another<br />

deception method that can be used today is a conventional attack against an aspect of an<br />

enemy’s information system, such as his computer network’s ‘server farms’ or telephone<br />

switching facilities. The array of potential targets is enormous, and the more the enemy<br />

relies on information technology, the greater his vulnerability to such attacks. 55 Hence,<br />

the weaker side also has a significant ability to plan and execute deception by exploiting<br />

the inherent vulnerabilities of sophisticated technology to even the most basic measures<br />

of camouflage and concealment. Simple deceptions can be effective against certain<br />

types of information attack, while far more sophisticated methods would be required to<br />

counter the efforts of highly sophisticated intelligence organisations. 56<br />

As in the past, traditional theatre-wide functions - specifically, operational command<br />

structure, intelligence, command and control warfare, logistics, and protection - will<br />

remain indispensable in ensuring the success of campaigns and major operations. The<br />

new technological advances will significantly influence the way military forces are<br />

organised for combat. Operational command echelons will be the most critical link for<br />

planning, preparing, executing, and sustaining major operations and campaigns. At the<br />

same time, technological dependence on modern command and control and information<br />

systems also creates vulnerabilities and sources of disruption.<br />

The new technological advances will substantially increase one’s ability to obtain<br />

accurate, timely, and perhaps relevant intelligence regarding the enemy’s tangible<br />

capabilities - both military and non-military. However, one’s ability to know, with any<br />

degree of certainty, the enemy’s intentions or actions will not improve any time soon.<br />

In the past, increases in the volume of information led to further decentralisation of<br />

intelligence, because the lower command echelons did not have either the resources or<br />

the time to digest the vast volume of information necessary for the commander to make<br />

decisions.<br />

Another serious problem that may defy solution is the ever-growing collection of all kinds<br />

of information that cannot be either processed or transmitted in a timely manner. This<br />

information overload can result when there is too much information for the commander<br />

and his staff to timely process and place into the proper context. It can also result when<br />

technical systems cannot quickly transmit relevant information to users. Among other<br />

things, one’s commanders can be overwhelmed by a vast flow of information, especially<br />

if they are not properly trained. 57 The greatest challenge that needs to be resolved is not<br />

to overwhelm the user with vast volumes of raw data and unprocessed information. The<br />

critical problem is sorting out relevant from unimportant information. 58 The situation is<br />

even more serious if networks are used primarily to pass data instead of processing it<br />

into information. In that case, the sheer amount of data that the diverse sources collect<br />

and transmit to users will most likely overwhelm the processing capability of lower<br />

command echelons.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!