Military-digital complex
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
|
The military-digital complex (MDC) is the militarization of
- "Offensive and defensive cyber (or digital) warfare, including the fields of computer network attack, computer network exploitation and computer network defense; as well as traditional electronic warfare (e.g., jamming) intended to deny an adversary use of their electronically dependent equipment through "non-kinetic" means—that is, by fighting with electrons rather than explosives."[1]
As cyber attacks become an increasingly common threat to the security of civilians and highly classified governmental information, a need to combat the threat by means of computer network operations and computer network defense have arisen. It is important to note however that protection is only one component of the Military-digital complex and that the use of information warfare within the complex can be used to achieve military operations and an upper-hand in economic exploits.
The Military-digital complex contains many components which align it succinctly to its industrial counterpart, for example the use of defense contractors. Although hired Contractors may not be explicitly named as such they still expose the complex to complications such as the principal–agent problem and consequently moral hazard. The MDC is seen as a progression as nations move globally towards cyberwarfare, indeed the cyber war is increasingly being acknowledged as the "fifth domain of warfare".[2] The MDC is a necessity for governmental bodies in order to maintain high standards within their cyber army, for example the USA boasts over "143 private companies involved in top secret cyber operations programs",[3] however James Gosler a government specialist in cyber security indicates that the USA have a severe shortage of government cybersecurity specialists.[4]
History
Technology has been a part of war since the dawn of warfare. Neolithic tools such as daggers were used as weaponry and clan rivalry long before recorded history. The
At the dawn on the 21st Century, the world has seen an emergence of digital equipment in the use of warfare, spanning from satellite surveillance systems all the way to dedicated agencies such as United States Cyber Command fully equipped with thousands of professionals manning computers on a 24/365 basis in order to prevent a cyber attack.
The use of computers has long been an essential tool in warfare,[
See also
- List of industrial complexes
- James Langevin#Cybersecurity
- Michael McCaul#Legislation
References
- ^ "Washington Post Official Site - Cyber Operations". Washington Post. Retrieved 2011-03-11.
- ^ "Cyber war in the fifth domain". The Economist. 2010-07-01. Retrieved 2010-07-19.
- ^ "military digital complex revealed". risky.biz. Retrieved 2010-07-10.
- ^ "Cyber war shortage threatens US security". NPR. Retrieved 2010-07-19.
- ^ "The Age Of Extremes, Eric Hobsbawm". www.history.ac.uk. Retrieved 2011-01-01.
- ISBN 9780262182096. Retrieved 2011-03-11.
- ^ "Spies hack US electricity Grid". CNET. Retrieved 2009-04-08.
- ^ "Pentagon plans new Cyberspace war command". Reuters. 2009-05-29. Retrieved 2009-05-29.
Further reading
- Geer, Dan (15 October 2008), "Risky Business #83 — The Military Digital Complex", Risky.Biz, retrieved 11 April 2011
- Meer, Haroon (10 March 2011), Lessons from Anonymous on cyberwar, Al Jazeera English, retrieved 13 March 2011