Military-digital complex

Source: Wikipedia, the free encyclopedia.
Cyber-warriors, the implementation of thousands of Governmental Cyber Security Specialists displays the prevalence of the Cyber threat which has subsequently led to the Military-digital complex.

The military-digital complex (MDC) is the militarization of

cyber operations by governments and corporations, often through monetary relationships between computer programmers in private companies and the military to combat the threat of cyber terrorism and warfare. Cyber operations since 2000 have increased dramatically, with the recent branch of the US Strategic Command the United States Cyber Command
. Cyber operations has been defined by the Washington Post as,

"Offensive and defensive cyber (or digital) warfare, including the fields of computer network attack, computer network exploitation and computer network defense; as well as traditional electronic warfare (e.g., jamming) intended to deny an adversary use of their electronically dependent equipment through "non-kinetic" means—that is, by fighting with electrons rather than explosives."[1]

As cyber attacks become an increasingly common threat to the security of civilians and highly classified governmental information, a need to combat the threat by means of computer network operations and computer network defense have arisen. It is important to note however that protection is only one component of the Military-digital complex and that the use of information warfare within the complex can be used to achieve military operations and an upper-hand in economic exploits.

The Military-digital complex contains many components which align it succinctly to its industrial counterpart, for example the use of defense contractors. Although hired Contractors may not be explicitly named as such they still expose the complex to complications such as the principal–agent problem and consequently moral hazard. The MDC is seen as a progression as nations move globally towards cyberwarfare, indeed the cyber war is increasingly being acknowledged as the "fifth domain of warfare".[2] The MDC is a necessity for governmental bodies in order to maintain high standards within their cyber army, for example the USA boasts over "143 private companies involved in top secret cyber operations programs",[3] however James Gosler a government specialist in cyber security indicates that the USA have a severe shortage of government cybersecurity specialists.[4]

History

Military-industrial complex
when describing the twinning of the arms industry to the military under the government; this paved the way for the emergence of the military-digital complex.

Technology has been a part of war since the dawn of warfare. Neolithic tools such as daggers were used as weaponry and clan rivalry long before recorded history. The

destroyers and submarines
shows a marked difference between the ancient acquisitions of countries.

At the dawn on the 21st Century, the world has seen an emergence of digital equipment in the use of warfare, spanning from satellite surveillance systems all the way to dedicated agencies such as United States Cyber Command fully equipped with thousands of professionals manning computers on a 24/365 basis in order to prevent a cyber attack.

The use of computers has long been an essential tool in warfare,[

Symantec, McAfee and traditional defense contractors such as Northrop Grumman and Lockheed Martin,[8] as the cyber threat grows so does mankind's reliance on corporate players such as the aforementioned, creating an iron triangle
among government, military and these global security corporations.

See also

References

  1. ^ "Washington Post Official Site - Cyber Operations". Washington Post. Retrieved 2011-03-11.
  2. ^ "Cyber war in the fifth domain". The Economist. 2010-07-01. Retrieved 2010-07-19.
  3. ^ "military digital complex revealed". risky.biz. Retrieved 2010-07-10.
  4. ^ "Cyber war shortage threatens US security". NPR. Retrieved 2010-07-19.
  5. ^ "The Age Of Extremes, Eric Hobsbawm". www.history.ac.uk. Retrieved 2011-01-01.
  6. . Retrieved 2011-03-11.
  7. ^ "Spies hack US electricity Grid". CNET. Retrieved 2009-04-08.
  8. ^ "Pentagon plans new Cyberspace war command". Reuters. 2009-05-29. Retrieved 2009-05-29.

Further reading