Technology and Networks in the Military

Sparked by the Dubai Air show, and the awesome display of the aircrafts here, I began to think what the future of the warfare would be like. We are seeing a different sort of a conflict resolution in the world already, The U.S playing big brother in the world trying to have a say in all the internal issues of countries is a growing concern among nations. This was evident when the U.S president bought over the topic of unrest in Tibet and the Xinjiang province. The “Minority Report” style of operations (like foreseeing the conflict that Iraq may pose with its alleged WMD’s) that was employed by the U.S to attack Iraq was something of a game changer, not only is the result a bad reference for the U.S but a definite setback to similar thinking processes.

[picapp src=”0303/0000303699.jpg?adImageId=7626604&imageId=306989″ width=”500″ height=”333″ /]

The entire shift of conflicts now is spearheaded world over through the keyword “terrorism”. Most conflicts starting from the Sri Lankan siege on the LTTE or the worldwide attack on Al Qaeda are all terrorism related. The good old days of the cold war don’t seem to be in sight, when one country used espionage on another country to get information in peace time to have an upper hand during “war” time. On the surface it looks like it is a dying form of warfare or has it just moved from the physical to the virtual.

[picapp src=”0304/0000304194.jpg?adImageId=7626601&imageId=307481″ width=”500″ height=”333″ /]

Analysts say China employs a constantly shifting mix of official and civilian or semicivilian groups (such as so-called patriotic hacker associations) as the foot soldiers — the “proxies” — in its cyberwar armies. The technological challenges of tracing attacks on U.S. government and private-corporation computers are so enormous that Beijing can simply deny that any of the problems have originated in China. If you cannot identify the source you cannot deter the attack. So far, the Chinese have been able to get away with it, despite the fact that not just the U.S. is complaining. In the past few years, sources ranging from the German Chancellor’s office to government mainframes as far afield as New Zealand and Belgium have made loud public allegations that they had been the subject of cyberinfiltration from China, all to no avail.

If U.S. officials try to raise the issue of what they believe is a constant and growing campaign by China to infiltrate U.S. networks, steal secrets and hone Beijing’s ability to wreak havoc in case of military conflict, the likelihood is that Chinese officials will simply deny that the problem exists, as they have done with great success in the past. From the American point of view, there’s unfortunately currently little Washington can do to change that state of affairs.

[picapp src=”0305/0000305240.jpg?adImageId=7626330&imageId=308518″ width=”500″ height=”333″ /]

Since I am from one of China’s neighbors, India, this might not be something we might be losing sleep over, today. But definitely as technological advancements trickle down into the heart of the military operations in India this might be something that we need to worry about, but unlike a country like the U.S, our inability of implementation of these technologies in the military sector might be a sort of a boon in disguise. The websites of the Indian armed forces are a faint shadow of their counterparts in the U.S or Europe.

With less networking between the bases, the Indian Armed forces rely on less “low tech” communication methods than the rest of the superpower militaries. Although having declaring itself a nuclear state with the capability of producing a nuclear weapon in 18 months, It has begun indigenously manufacturing its own weaponry only in the late 90’s and the 2000’s.

One could write a whole lot about the pros of technology in the military, I am quite contended that India is on the ‘not-so-advanced’ list. For now …

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: