Asymmetric Warfare: An Ongoing Challenge in Our Current Security Environment
نویسنده
چکیده
4 he above citation, taken from Presidential Decision Directive 62 signed in May 1998, foresaw the potential that unconventional methods of warfare could be used against our Homeland. Although much has changed since publication of this document to address vulnerabilities, the threat remains for adversaries to attack our Nation, interests and military forces by unconventional or asymmetric approaches. The end of the Cold War resulted in significant realignments of alliances and an increase in regional instabilities. The former Soviet Union, once the predominant threat to American security, has been supplanted by rogue and failed states and non-state networks and actors. These entities attempt to avoid confrontation with our conventional military capabilities by striking weak points in our Nation’s social, economic and political structures, or by taking advantage of perceived U.S. military vulnerabilities. They often attempt to operate at the extremes of the conflict spectrum. At one end, North Korea is actively pursuing nuclear weapons capabilities. At the other end, groups such as al-Qaeda, remnants of Saddam Hussein’s former Ba’athist regime and various sectarian militia groups pursue insurgency warfare using asymmetrical approaches. Adversaries increasingly respond to U.S. military dominance by pursuing indirect, unorthodox or surprising approaches, and using the capabilities of information technology, especially the Internet, as a tool of asymmetric warfare. Because of this, Information Operations has emerged as a critical component of the Army’s operational readiness. Information Operations is defined as, “the integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision-making while protecting our own.” 2 Space professionals, by their access to and understanding of the relationships between the core Information Operations capabilities, are particularly well qualified to support Information Operations against asymmetric threats.
منابع مشابه
The Asymmetric Warfare and Its Psychological Factors
The authors sum up the more capital questions of the asymmetric warfare and its psychological factors. They give overview about the military-scientific basis of the asymmetric warfare and its threats; interpretation of asymmetry in the activities of national security; Systematic elements of strategic asymmetry; coherence of strategy reacting to asymmetric threats with other strategies and final...
متن کاملPosition Paper: A complex systems approach to operational planning
This conference provides a good opportunity to rethink operational planning. Currently, there are many efforts to tweak operational planning, whether by providing a greater emphasis on desired effects, on operational design that precedes planning, or through automation and battle management systems. These efforts are all likely to increase the efficiency of the current operational planning proc...
متن کاملWhack-a-mole: Asymmetric Conflict and Guerrilla Warfare in Web Security
Many malicious and fraudulent endeavors on the web exhibit characteristics of asymmetric conflict and guerrilla warfare. Defenders work continuously to detect and take down malicious websites, while attackers respond by resisting takedowns, evading detection, or creating large numbers of new sites. This is reminiscent of the arcade game of whack-a-mole – the faster the moles pop in and out of t...
متن کاملTracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications
The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of interest in various environments: air respectively maritime traffic, air defence, force protection in out of area missions, harbour protection, coastal surveillance, or the security of naval platforms operating in critical en...
متن کاملA Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Our increasing dependence on information technologies and autonomous systems has escalated international concern for informationand cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans ...
متن کامل