The military has so far designed a conventional war in the form of a land, sea and air war strategy. But as technology develops, a fourth dimension emerges in armed warfare, namely the strategy of war through cyberspace.

image: Symbols of the war in the form of eyes that continue to oversee the virtual path.

Military attacks via computer mouse, can support the attack of classical combat troops in incidents . But wars through space can also be used to wage war asymmetrically.

Military in leading countries and multinational armament industry, is now invested funds billions of dollars in the development of new systems and strategies, in what is referred to as a digital attack and defense. Attacks by stealing military data are also increasingly aggressively launched by various parties.

image: The attack of the hackers is one of the strategies in a war through cyberspace.

Cyber ​​attacks are very effective

image: Logo of the CCDCOE defense system in a war in virtual space.

See how effective and how accurate Si Si’s weapon is in attacking his target, as evidenced by the “Stuxnet” worm attack last year. Stuxnet successfully sabotaged the installation of Iran’s enriched Uranium Natanz. However, electronic control devices manipulated by the Stuxnet worm, not only installed in Iran, but also in many industries in various countries. For Finnish IT security experts, Mikko Hypponen’s attack on an electronic control system shows the quality of new risks.

“If Stuxnet can infect like that, then this is a big revolution related to worrying risks. Because everything is controlled by such a system. We have critical infrastructure. “Factories, power plants, chemical plants or food processing installations are all controlled by computer ,” Hypponen IT security expert said.

Computers also control conventional military weapons systems. Accelerating movements on the battlefield , forcing military logic to implement more automation. The reason is, humans are too slow for such situations.

New danger threat

How much of a danger, if electronic control devices are in chaos, evidence is evident in the incident that occurred in October 2007 in South Africa. At that time, an artificial flak German company, Oerlikon lose control and shoot boa b i blind to the surrounding area. As a result of this incident nine soldiers were killed and 14 seriously injured. In this case, the cause is a common software error, not manipulation by a computer virus.

The opening of a new dimension in armed conflict, today encourages legal experts to make a firmer definition. At present, 15 legal experts from around 12 countries are compiling an international legal guidebook for the implementation of civil war .

In cyber warfare, traces of attack can be erased perfectly and show false evidence. It is almost impossible to explicitly trace and find the perpetrators or initiators of the attacks.

Science and technology have brought progress in various fields, including in technology used in the military or defense fields. On the other hand , that progress is also a threat, because this technology allows increasingly terrible warfare with wider impact.

Utilization of advances in science p What Knowledge and tek nologi in the field of defense, to strengthen the defense of a country and also poses a threat to other countries. Utilization of this technology can improve the capabilities of other military equipment, for example, increasing the range of missile fire, increasing anti-radar capability, increasing the ability of chemical and biological weapons . Meanwhile, from the aspect of the threat posed it can be in the form of Electronic Warfare, Information Warfare, Cyber ​​Warfare and Psychological Warfare. Utilization of these technologies will have a major effect on the conditions of world defense and security.

Military strength, which is demonstrated by the mastery of technology and military equipment from a country, is proven to be able to give a “daunted effect” to other countries which can then be related to hegemony in other fields, such as the economy. Countries with the largest and strongest military power in the world, now also “regulate” the world economy, control the necessary resources, and even be able to regulate governments in other countries.

Many countries have developed information and communication technology, aerospace technology, biotechnology, propulsion technology, energy generation technology and nanotechnology to drive their defense industries in order to produce weapons used to strengthen their military and also to prepare as weapons manufacturers who are ready to compete with producing countries other. Developed countries like the United States, Britain, Germany, France, Russia and Japan are continuously developing their defense industries to increase their military strength and become an arms exporting country . Each country has advantages in accordance with the development of science and technology in the country. The defense industry in developed and developing countries is growing rapidly due to full support from the government, both industrial and financial policies, and the economic climate that supports its development.

In addition to the use of technology for the development of military physical equipment, the current use of information and communication technology can determine a country’s military superiority. Today almost all systems used for military purposes such as command and control, intelligence, surveillance and observation, weapons platforms have taken advantage of this technology. Of course, to maintain the security factor of the system, efforts must be made to protect it against those who are trying to disrupt the system. The concept of system protection needs to be adopted considering that the system in addition to forming a network also utilizes electromagnetic waves that are prone to interruption of data interception and destruction during the interaction process. Given the rapid leap in progress in information technology, the development of this technology needs to be examined carefully as an anticipatory material in the face of information warfare in this century.

In military doctrine, information is the key to every military operation. Existing military activity relies on high-speed communication equipment and computers. Based on this fact, a new concept called the Information Warfare was created, namely competition for information excellence. Information technology combined with other war technologies makes it possible to create qualitatively different types of war. Like the use of robots during ambush operations. The development of information technology also caused a very rapid change in the military field. Maybe also a few decades more the military will use robots to fight, not with humans anymore.

Due to the development of mastery of this technology, some countries are able to become new economic forces as well as strong new military forces , such as China which continues to develop its high-tech military capabilities and combat capabilities based on information technology. Another example is India which has succeeded in developing and producing fighter aircraft, helicopters and guided missiles with excellence in electronics and information technology.

The mastery of this technology is vital, because it is directly related to the sovereignty of the state and disconnects the dependence on technology from other countries which can be stopped at any time.


Please enter your comment!
Please enter your name here