Military-digital complex: Difference between revisions
←Created page with '{{underconstruction}} '''Military-digital complex''' is a term used to describe the militarization of cyber operations by governments and corporations alike, it ref...' |
No edit summary |
||
Line 1: | Line 1: | ||
{{underconstruction}} |
{{underconstruction}} |
||
'''Military-digital complex''' is a term used to describe the militarization of |
'''Military-digital complex (MDC)''' is a term used to describe the militarization of [[Cyber Operations]] by governments and corporations alike, it refers to monetary relationships between computers programmers in private companies and the military to combat the threat of cyber terrorism and warfare. Cyber operations in the decade leading to 2011 have increased dramatically, such as the recent branch of the US Strategic Command the [[United States Cyber Command]]. Cyber operations has been defined by the Washington Post as, |
||
⚫ | :"Offensive and defensive cyber (or digital) warfare, including the fields of computer network attack, computer network exploitation and computer network defense; as well as traditional electronic warfare (e.g. jamming) intended to deny an adversary use of their electronically dependent equipment through "non-kinetic" means -- that is, by fighting with electrons rather than explosives."<ref>{{cite web|url=http://projects.washingtonpost.com/top-secret-america/functions/cyber-ops|title=Washington Post Official Site - Cyber Operations| accessdate=2011-03-11|publisher=projects.washingtonpost.com}}</ref> |
||
:Indented line |
|||
As cyber attacks become an increasingly common threat to the security of civilians and highly classified governmental information, a need to combat the threat by means of [[Computer network operations]] and [[Computer Network Defense]] have arisen. It is important to note however that protection is only one component of the Military-digital complex and that the use of [[Information Warfare]] within the complex can be used to achieve military operations and an upper-hand in economic exploits. |
|||
⚫ | "Offensive and defensive cyber (or digital) warfare, including the fields of computer network attack, computer network exploitation and computer network defense; as well as traditional electronic warfare (e.g. jamming) intended to deny an adversary use of their electronically dependent equipment through "non-kinetic" means -- that is, by fighting with electrons rather than explosives." |
||
The Military-digital complex contains many components which align it succinctly to its industrial counterpart, for example the use of defense contractors. Although hired Contractors may not be explicitly named as such they still expose the complex to complications such as the [[principal agent problem]] and consequently [[moral hazard]]. The '''MDC''' is seen as a progression as nations move globally towards [[cyberwarfare]], indeed the cyber war is increasingly being acknowledged as the "fifth domain of warfare"<ref>{{cite web|url=http://www.economist.com/node/16478792|title=Cyber war in the fifth domain, Economist| accessdate=2010-07-19|publisher=www.economist.com}}</ref> |
|||
The MDC is a necessity for governmental bodies in order to maintain high standards within their cyber army, for example the USA boasts over "143 private companies involved in top secret cyber operations programs"<ref>{{cite web|url=http://risky.biz/wapost|title=military digital complex revealed| accessdate=2010-07-10|publisher=risky.biz}}</ref>, however James Gosler a government specialist in cyber security indicates that the USA have a severe shortage of government cybersecurity specialists<ref>{{cite web|url=http://www.npr.org/templates/story/story.php?storyId=128574055|title=Cyber war shortage threatens US security| accessdate=2010-07-19|publisher=NPR}}</ref> |
|||
== History == |
|||
Technology has always been utilized for warfare since the dawn of man. Neolithic tools such as daggers were used as weaponry and clan rivalry long before recorded history. The [[bronze age]] and [[iron age]] saw technological improvements namely in the advancements of weaponry and subsequently the arrival of complex industries. It was not until the late 19th and early 20th Century that weaponry advanced in leaps and bounds to the armaments we witness today, however even then industry was relatively independent of the government and military. The [[Great war]] and [[World War II]] were two important factors that led to the consequent [[Military-industrial complex]], [[Eric Hobsbawm]] in his book [[Age of Extremes]] outline how categorically countries like Japan, USA and Russia had to develop their own military industry to support their militaristic efforts<ref>{{cite web|url=http://www.history.ac.uk/reviews/review/28|title=The Age Of Extremes, Eric Hobsbawm| accessdate=2011-01-01| publisher=www.history.ac.uk}}</ref>, creating a complex whereby the economies then straddled on this arms industry. Consequently the procurement of [[Missiles]], [[Ballistics]], [[Nuclear Weapons]], [[Destroyers]] and [[Submarines]] shows a marked difference between the ancient acquisitions of countries. |
|||
At the dawn on the 21st Century the world has seen an emergence of digital equipment in the use of warfare, spanning from satellite surveillance systems all the way to dedicated agencies such as [[United States Cyber Command]] fully equipped with thousands of professionals manning computers on a 24/365 basis in order to prevent a cyber attack. |
|||
The use of computers has long been an essential tool in warfare, however as warfare moves from the traditional fronteirs of land, sea, air space to cyber space the use of computers is becoming not only essential but vital. Gregory Rattray, author of Strategic Warfare in Cyberspace explains how the history of warfare in the [[information age]] is far reaching and is well beyond military operation including financial crime and economic espionage.<ref>{{cite web|url=http://books.google.co.uk/books?hl=en&lr=&id=lVbQ4AxfYaMC&oi=fnd&pg=PP1&dq=warfare+in+cyberspace&ots=OGw1ozPIlE&sig=-6gOJl7CcakbYhrxDbBfDgts7Y0#v=onepage&q&f=false|title= Strategic Warfare in Cyberspace| accessdate= 2011-03-11|publisher= Massachusetts Institute of Technology}}</ref> The history of this cyber warfare shows that it crosses global boundaries and encompasses political agendas, attacks on the USA such as [[Titan Rain]] show an attack from networks and computers situated in China for example. As the age of digital warfare progressed it has become evident that our reliance on technological equipment to monitor essential utilities such as our electricity grids has proven cataclysmic <ref?{{cite web|url=http://news.cnet.com/8301-11128_3-10214898-54.html| title=Spies hack US electricity Grid| accessdate=2009-04-08|publisher=CNET}}</ref>. As the threat became increasingly relevant the emergence of Big corporate players on the '''MDC'''scene including names such as [[Symantec]], [[McAfee]] and interestingly traditional defense contractors such as [[Northrop Gumman]] and [[Lockheed Martin]]<ref>{{cite web|url=http://www.reuters.com/article/2009/05/29/us-security-cyberspace-sb-idUSTRE54S0XQ20090529|title=Pentagon plans new Cyberspace war command| accessdate=2009-05-29|publisher=Reuters}}</ref>, as the cyber threat grows so does our reliance on corporate players such as the aforementioned creating an [[iron trinagle]] between Government, Military and these Global security corporations. |
|||
{{reflist}} |
Revision as of 16:23, 13 March 2011
This article or section is in a state of significant expansion or restructuring. You are welcome to assist in its construction by editing it as well. If this article or section has not been edited in several days, please remove this template. If you are the editor who added this template and you are actively editing, please be sure to replace this template with {{in use}} during the active editing session. Click on the link for template parameters to use.
This article was last edited by Jvirasami (talk | contribs) 13 years ago. (Update timer) |
Military-digital complex (MDC) is a term used to describe the militarization of Cyber Operations by governments and corporations alike, it refers to monetary relationships between computers programmers in private companies and the military to combat the threat of cyber terrorism and warfare. Cyber operations in the decade leading to 2011 have increased dramatically, such as the recent branch of the US Strategic Command the United States Cyber Command. Cyber operations has been defined by the Washington Post as,
- "Offensive and defensive cyber (or digital) warfare, including the fields of computer network attack, computer network exploitation and computer network defense; as well as traditional electronic warfare (e.g. jamming) intended to deny an adversary use of their electronically dependent equipment through "non-kinetic" means -- that is, by fighting with electrons rather than explosives."[1]
As cyber attacks become an increasingly common threat to the security of civilians and highly classified governmental information, a need to combat the threat by means of Computer network operations and Computer Network Defense have arisen. It is important to note however that protection is only one component of the Military-digital complex and that the use of Information Warfare within the complex can be used to achieve military operations and an upper-hand in economic exploits.
The Military-digital complex contains many components which align it succinctly to its industrial counterpart, for example the use of defense contractors. Although hired Contractors may not be explicitly named as such they still expose the complex to complications such as the principal agent problem and consequently moral hazard. The MDC is seen as a progression as nations move globally towards cyberwarfare, indeed the cyber war is increasingly being acknowledged as the "fifth domain of warfare"[2] The MDC is a necessity for governmental bodies in order to maintain high standards within their cyber army, for example the USA boasts over "143 private companies involved in top secret cyber operations programs"[3], however James Gosler a government specialist in cyber security indicates that the USA have a severe shortage of government cybersecurity specialists[4]
History
Technology has always been utilized for warfare since the dawn of man. Neolithic tools such as daggers were used as weaponry and clan rivalry long before recorded history. The bronze age and iron age saw technological improvements namely in the advancements of weaponry and subsequently the arrival of complex industries. It was not until the late 19th and early 20th Century that weaponry advanced in leaps and bounds to the armaments we witness today, however even then industry was relatively independent of the government and military. The Great war and World War II were two important factors that led to the consequent Military-industrial complex, Eric Hobsbawm in his book Age of Extremes outline how categorically countries like Japan, USA and Russia had to develop their own military industry to support their militaristic efforts[5], creating a complex whereby the economies then straddled on this arms industry. Consequently the procurement of Missiles, Ballistics, Nuclear Weapons, Destroyers and Submarines shows a marked difference between the ancient acquisitions of countries.
At the dawn on the 21st Century the world has seen an emergence of digital equipment in the use of warfare, spanning from satellite surveillance systems all the way to dedicated agencies such as United States Cyber Command fully equipped with thousands of professionals manning computers on a 24/365 basis in order to prevent a cyber attack.
The use of computers has long been an essential tool in warfare, however as warfare moves from the traditional fronteirs of land, sea, air space to cyber space the use of computers is becoming not only essential but vital. Gregory Rattray, author of Strategic Warfare in Cyberspace explains how the history of warfare in the information age is far reaching and is well beyond military operation including financial crime and economic espionage.[6] The history of this cyber warfare shows that it crosses global boundaries and encompasses political agendas, attacks on the USA such as Titan Rain show an attack from networks and computers situated in China for example. As the age of digital warfare progressed it has become evident that our reliance on technological equipment to monitor essential utilities such as our electricity grids has proven cataclysmic <ref?"Spies hack US electricity Grid". CNET. Retrieved 2009-04-08.</ref>. As the threat became increasingly relevant the emergence of Big corporate players on the MDCscene including names such as Symantec, McAfee and interestingly traditional defense contractors such as Northrop Gumman and Lockheed Martin[7], as the cyber threat grows so does our reliance on corporate players such as the aforementioned creating an iron trinagle between Government, Military and these Global security corporations.
- ^ "Washington Post Official Site - Cyber Operations". projects.washingtonpost.com. Retrieved 2011-03-11.
- ^ "Cyber war in the fifth domain, Economist". www.economist.com. Retrieved 2010-07-19.
- ^ "military digital complex revealed". risky.biz. Retrieved 2010-07-10.
- ^ "Cyber war shortage threatens US security". NPR. Retrieved 2010-07-19.
- ^ "The Age Of Extremes, Eric Hobsbawm". www.history.ac.uk. Retrieved 2011-01-01.
- ^ "Strategic Warfare in Cyberspace". Massachusetts Institute of Technology. Retrieved 2011-03-11.
- ^ "Pentagon plans new Cyberspace war command". Reuters. Retrieved 2009-05-29.