Modern warfare takes place in the space, cybernetic and electronic spheres
Washington is concerned about the growing military power of the two main geopolitical opponents of the United States – China and Russia. The American military industry is losing its primacy in a number of strategic areas, such as the design of hypersonic weapons. As noted by the American media, the emerging technological gap is seriously concerned about the Pentagon, which is preparing a symmetrical response to the threat from outside.
The US media reports that the US Department of Defense seriously fears for the security of the country. Some time ago, the Military Intelligence of the Pentagon published a report in which it listed threats to the national security of the United States. Among the most dangerous phenomena that undermine international stability are terrorism, the activity of ” rogue states “(North Korea, Iran, Cuba, etc. – “MK”), as well as the strengthening of the military power of Russia and China.
According to the publication The National Interest, a separate threat to the United States is the threat of hacking. New challenges require the development of new ways to collect intelligence, technologies for processing and securely transmitting information, and other measures to protect against hacking. The” Cold War ” of our days, the publication notes, is unfolding in the space, cybernetic and electronic spheres. And the Pentagon is well aware of this.
“Expanding the competitive space beyond traditional military domains and geographical boundaries increases and complicates the requirements for military intelligence, collection, analysis, and planning,” the US military department said in a report.
The new US military budget allocates $ 23.3 billion for the development of new information security systems (with a total military budget of $ 715 billion). According to the National Interest, the Pentagon intends to neutralize new threats by introducing modern technologies that will seriously increase the chances of success in modern warfare. Introduction of new exchange technologiesthis should reduce the time it takes to transmit the order from headquarters to the person who pulls the trigger directly. The publication believes that the allocated funds will be used to develop systems with support for artificial intelligence, modern network technologies, improve the Air Force combat operations management system and other high-tech achievements.
Also, the US military expects to create the most secure information transmission network in the world. Once the likely enemy is unable to crack the security algorithms and get data on the upcoming actions of the US army, the US military will have a serious advantage. Among the most dangerous threats to information security, American expert Chris Osborne calls jamming systems, electronic warfare systems (EW) or other types of hostile activities aimed at suppressing communication systems.
In theory, these measures should allow the United States to maintain military superiority around the world, especially since other countries are not yet ready to invest so much in the development of weapons for a “new type” of war.
However, the Pentagon still retains dominance in a number of traditionally military areas, such as the Navy. The National Interest notes that the US navy has more firepower than any of its possible rivals. The publication summarizes that in the near future, Russia, China or other” hostile ” countries to Washington will not be able to create aircraft carrier strike groups, as opposed to operational units of the US Navy.
However, as military expert Alexander Mikhailovsky noted in a conversation with MK, the US confidence in the perfection of its intelligence and information transmission systems can play a cruel joke with the Pentagon.
– The fact that they are aware of the scale of the threat and are preparing to fight it is certainly a plus for them. Simply because not everyone in the world has yet realized how this front is generally arranged and how they fight on it. But so far, they are losing not only to their leading rivals, but on some fronts – to Iran, for example. Because American drones often fall prey to Iranian electronic warfare. And moreover, if you start creating information security, it would be nice to have employeespick up mobile phones, as we do. Because there are known cases of how US secret information got into the Network through applications for evaluating hotels, beer, and the like. In short, it is necessary to start not with technology, but with discipline, ” the expert noted.
The expert also added that information security systems and methods of hacking them will be improved as well as any other weapons. And on any virtual shield, sooner or later there will be a sword.