Information coming war: why then prepare RF
Now when they say analysts about future wars, they mean no longer clash of nations and peoples, as in former times, and civilizations. Civilizations problem now so topical that their cooperation against the backdrop of increasing globalization can become a problem axial first half of the XXI century. And on the first plan are increasingly pushed the informational component of the armed conflict.
Inter-civilizational wars and armed conflicts considered to be those in which one civilization or representing its government (coalition) aim to forcibly kill the other means, to oust its historically developed culture and lifestyle, instead impose their own.
Fight for survival
It is believed that to existing civilizations are now Western, Islamic, Orthodox, Buddhist, Confucian, Hindu, Latin American, Russian, Japanese. Some scientists have added here the emerging African civilization. It is believed that in the not distant future, the main source of conflict will be the relationship between the West and several Islamic-Confucian states. With all this crucial means of resolving conflicts between civilizations and interstate disputes remains a military force. But it is not only.
In the XXI century the world’s population has to deal with fundamentally the latest and not elementary puzzle — how to survive in the criteria elements rampant economic growth and human populations.
Already at this point it is clear that the edge prepyadstviya will focus on emergency response to food, resources, environmental pollution. In this regard, is a large-scale work to ensure their own countries and territories with new sources of raw materials, which under certain conditions can be reincarnated into a war for survival.
South American political scientist Zbigniew Brzezinski offers project, which contains within itself the ambitious expansion against Russia. So, he is not satisfied that our homeland as before remains the owner of the largest areas in the world, extending over 10 time zones and significantly superior to the South American, Chinese or European. He clearly alludes to the fact that its territorial ownership would do well to limit, since, in his view, the loss of area is not a major problem for Russia. Brzezinski recommends decentralizing Russia, divide it into three parts — European Russia, the Siberian and Far Eastern Republic republic. With all this ideologist of American hegemony offers to give control of the Old World European territory of Russia, China — Siberia, Land of the Rising Sun — Far East.
Another political analyst, Martin Howard, advises teach other countries (including regional favorites) to the idea that their peace and prosperity depend not on the regional balance of power, and the peace and the cold-blooded presence of the United States whose military capabilities are superior ability to at least some of their .
So Makar, we can say that in today’s world of new, more strenuous tasks that can under certain conditions be of particular wars and armed conflicts. Exclusively in modern warfare full potential impact falls not on the armed forces and not on top of political opponents, and his command and control system and instrument, economic objects. With all of this information is immeasurably enhanced by the opposition, the ideological impact on the military and political control, officers, soldier and people opposing the country. Physical destruction of the enemy’s strategy more becomes of secondary importance. At first thought out plan a violation of his mental stability. In the course is propaganda — the impact on the brain and emotions of soldiers and civilian population of aggressive government of the country. Effectiveness of the ideological war demonstrated collapse of the USSR, when the personnel and the Russian army remained intact, and the country is not.
In general, as indicated by the analysis of numerous research papers, thesis about the prevalence of moral and psychological factors of the physical liquidation of the enemy is becoming more vserasprostranennym. War, even in its classical form, seen military professionals is not only and not so much a military clash on the battlefield as complex information technology, cognitive psychological, virtual-real phenomenon.
According to the views of western professionals, modern war — is an information war, and wins one whose information systems are more perfect. «Computers — is a tool, and front line runs everywhere» — writes the South American military analyst James Adams, in his book «The next global war.» And the term «information war» appeared in the midst of the 80-ies of the last century in connection with new puzzles of U.S. forces after the war and began to cool rapidly consumed after «Desert Storm» in 1991. Then the new information technology for the first time were used as a means of warfare of a multinational force U.S. and its allies against Iraq.
In November 1991, the General Glenn Otis, the last commander of the U.S. Army Command and Training and Doctrine, published a paper in which explicitly stated: «From the» Operation Desert Storm «Much can be learned. Some of them — new, others are old. One lesson, but is truly basic: the nature of war has changed radically. The side that wins the information campaign — overcome. We have shown this lesson Worldwide: Information is the key to modern warfare on the strategic, operational, tactical and technical relations. » Soon after that, the term «information war» was formalized in the U.S. Department of Defense Directive (21 December 1992).
In the current time in U.S. military circles under information warfare refers to actions taken to the merits of the information advantages in support of the national military strategy means of influencing the information and information systems of the enemy, while ensuring the safety and security of their own similar systems.
Evaluation of major directions of reference confirmed the release of a similar war in the program of the Institute of U.S. national defense information counter such forms as electronic warfare, the war with the introduction of reconnaissance, psychic and cybernetic fighting burglars.
Investigating the information wars, South American analysts introduce the concept of «information superiority» — the ability to collect, process and disseminate continuous flow at banning the use disk imaging (receipt) of its adversary. Americans in their own concept of putting the question on strengthening the unification of information operations into an independent fighting together with other operations of the armed forces (from the mental to the physical elimination of the operation systems of protection against computer networks). In this context, the problem is considered separately assess the military damage caused by the enemy such operations. Moreover, evaluating them as a promising independent kind of fighting (by which the Pentagon and in the future expect to achieve decisive results) assumes command of U.S. forces in the introduction of the respective types of armed forces units, staffed spices, especially trained and equipped to modern information tool.
Information instrument — it means destruction, theft or refraction data arrays, getting out of their desired disk imaging after overcoming protection systems, restriction or prohibition of access to legitimate users, disrupt the work of technical means, the decommissioning of telecommunications networks, computer systems, high-tech equipment to ensure all the functioning of society and the country. Extraordinary danger they pose to the computer systems of state power, command and control instrument, money and banks, the country’s economy, and for people with information and psychological (psycho-physical) impact on them in order to configure and manage their personal and collective behavior.
Information instrument can be used to initiate a large man-made disasters on the ground as a result of enemy violating the normal process control and objects that have to deal with a huge number of unsafe substances, and the highest concentration of energy. With all of this on it’s own performance is comparable with WMD.
In 1995-1996 sverhtehnologichny methods were tested hostilities in Bosnia and Herzegovina. Namely, unmanned surveillance drones, «Predator» provided information on the location of hostilities in real time, right up to the individual action fighter. As a result of its computer processing obtained a clear picture of the battlefield, given instructions on settlement identified goals.
In October 1998, U.S. forces launched in «United Information Operations Doctrine» is a concentrated exposition of the views of military control by the U.S. temper the impact of the company on the information resources of the enemy and to protect their own resources from such influences. As indicated in the introduction of the doctrine: «The ability of U.S. forces to forestall or prevent crises and conflicts in peacetime as in wartime win decisively depends on the effectiveness of information operations at all levels of war and across a range of armed hostilities.» Naturally, that information technology and perfected during anger NATO in Yugoslavia in 1999.
Determining characteristics of the information war, a security expert at the U.S. government’s Richard A. Clarke introduces the concept of «cyberwar»: «The actions of the 1st state of the country with the penetration of computers in the network or other public services to the country’s goals of harm or destruction.» South American magazine «The Economist» describes cyberwar as a fifth domain of war after land, sea, air and space. The importance of preparedness for conducting cyberwarfare evidenced by the fact the whole creation in the U.S. military unit — the U.S. Cyber Command.
Since the beginning of cyberwar will first be taken cyber-attacks on computer systems and servers command control Fri, municipal institutions, money and business centers. This attack will be enhanced by activation of computer viruses first «trojan horses», «embedded» in a computer opponent in peacetime. Besides implied use of a special device that makes a powerful explosion at an electrical impulse or bio tools like special types of bacteria can destroy electrical wiring and insulation materials in computers.
Information will be held for the purpose of diversion of unauthorized access to databases violation lines, theft and copying disk imaging, its concealment and refraction. Effectiveness of hacker attacks showed an incident that occurred in the U.S. in 1988. Then South American student R. Morris «run» through the Web virus, which is a day or three (2 to 4 November 1988) knocked out almost the entire computer network USA. Computers were paralyzed the State Security Agency, the U.S. Air Force Strategic Command, local networks of all large institutions and research centers. Damage estimated at more than $ 100 million
Practice this a day or indicates that only one roller disposed in YouTube, can cause massive mess in the world. And what will happen if these movies will weave, a thousand? They can provoke not only civilians war within the country, and cause a worldwide conflagration. According to Major-General Alexander Vladimirov: «Modern wars are fought at the level of consciousness and the mind, and only there and so makarom achieved a complete victory. War is the new operating means having a view of contemporary geopolitical technologies that are informative. «
And the views of Major-General Vladimir Slipchenko: «Possession of information resources in the wars of the future becomes as a mandatory attribute, as in past wars defeat enemy forces, the mastery of its territory, the destruction of its economic potential and the overthrow of the political system.»
For whom it will be an advantage
At this point it is clear that informational confrontation is the factor that has a significant impact on the war itself coming. Countries will solve all their problems not by groupings based on manpower and the use of weapons based on new physical principles and winning informational advantages.
In the armed struggle of the coming victory can be achieved through information operations, which eventually will be destroyed economic potential enemy. In the criteria shattered economy forces initially doomed to loss of combat capability, and then a full destruction. In such criteria inevitably fall and political system.
So it was during the armed conflict in Libya in 2011, when NATO coalition forces were blocked network information resources of the government of Muammar Gaddafi and overseeing controlled via the Web infrastructure and livelihood of the banking system of the country.
Realizing the importance of the information counter, the U.S. administration in June 2009 made a Cyber Command, which is responsible for the security of computer networks MO, maintenance of computer intelligence, prevention of cyber attacks on America and preemptive strikes against enemies cooking such actions. Currently, formed 24th Army Air Force and cybernetic 10th kiberflot Navy. About 10 thousand professionals working on cybersecurity at the Center for Strategic and international research programs from within US Cyber Challenge. Outside the U.S., about 100 countries in the world are in the Armed Forces units to conduct operations in cyberspace.
Taking into account all the risk and severity of computer confrontation in the war of the future, the brand new management now the Defense Ministry in the ongoing military reforms should begin to create a separate genus troops of the Armed Forces of the Russian Federation — cybernetic troops, whose main task is to conduct cyber operations and gain information advantages.