Saturday, April 27, 2013

Week 15: The Defense Industry


Cybersecurity and the Revolution in Military Affairs


In Military Transformation and the Defense Industry After Next, Peter Dombrowski, Eugene Gholz, and Andrew Ross discuss the importance of a "steady on" approach to our military development, while allowing for beneficial innovations (i.e. network capabilities), as opposed to abandoning ourselves to the drama of a complete defense makeover. Dombrowski, Gholz, and Ross emphasize the implications of technological innovations such as network-centric warfare (NCW) for the defense industry, while cautioning that sensationalizing those implications mirrors Rumsfeld's mania for an abrupt Revolution in Military Affairs (RMA). To this point, they examine the conditions under which stable, measured transformation might be optimally successful.





Enhanced network capabilities such as NCW lead to inevitable concerns over cybersecurity. For this reason, discussion over the role of cybersecurity in an ongoing RMA is increasingly relevant. The White House National Security Council, to give one example, has set up a cybersecurity web page to provide an overview of measures being taken collaboratively by government agencies and the private sector to address cybersecurity challenges, highlighting the necessity for cooperation between private industry, academia, and state and local governments. The President also announced a new Executive Order on Improving Critical Infrastructure Cybersecurity (E.O. 13636) in this year’s State of the Union address. The new E.O. was conceived to provide a framework for developing cybersecurity standards, improving public-private information sharing, and ensuring that privacy and civil liberties are maintained.

Experts recently gathered to discuss the new E.O. and other cybersecurity related topics at the RSA Conference USA 2013, held in February in San Francisco. Experts will convene again in Singapore in June for the RSA Conference Asia Pacific 2013, where the focus will be on Cybercrime and Law Enforcement, Mobile Security, Security Infrastructure, Cloud Security, and Data and Application Security. China (arguably the U.S.'s most formidable cyber sparring partner) has been an active RSA forum participant, holding its own RSA Conference in August 2012, so comments from Chinese participants during and after the Asia Pacific conference should be interesting. This is particularly true given that Western governments and media outlets tend to favor China as the culprit for cyber-attacks executed against both the private and public sectors.



In the current RMA climate of changing warfare due to network capabilities, these cyber activities are only the nascent buds of China’s cyber capabilities. In fact, when it comes to political and military strategy, China may have mastered the stable, measured approach to transformation favored by Dombrowski, Gholz, and Ross. Historically, this nation has demonstrated both an inclination and ability to effectively execute on long-term plans. China is a patient strategist, adapting plans to suit a desired context as opposed to simply mimicking Western iterations along the path through its own RMA. This means that China is likely to remain our deftest competitor and rival as the global community continues its shift toward NCW and refines both its defensive and offensive cyber warfare skill sets.

No comments: