War In The Information Age

We are on the eve of a new era in the business of warfighting and combined arms. This is the information age of warfare and advantage will be achieved through the speed and integration of information. 

If we follow the right path, tomorrow’s commanders will seamlessly direct joint and coalition forces in a way that simultaneously capitalizes on the advantages on land; at sea; and in the air, space, and cyberspace. 

The primary warfighting attributes will be decision speed and operational agility. In short, our asymmetric advantage in future battles depends on harnessing the vast amount of information our sensors can generate, fusing it quickly into decision-quality information, and creating effects simultaneously from all domains and all functional components anywhere in the world.

Before discussing what must change as we evolve in the information age of warfare, we should acknowledge what never changes: trust and confidence. Joint and coalition warfare has and always will rely on trust and confidence at all levels, tactical, operational, and strategic.

At the tactical level, our soldiers, sailors, airmen, Marines, and Coast Guardsman must trust each other to achieve mission success. From Air Force Joint Tactical Air Controllers embedded with and coordinating airpower for Army and Marine maneuver units to Navy and Coast Guard integrated maritime operations around the globe, today’s military has established an unprecedented level of trust and confidence from 25 years of fighting together.

At the operational level, component commanders from each service understand the supporting and supported relationships required to employ joint and coalition forces in support of a Joint Force commander. 

At the strategic level, Chairman of the Joint Chiefs Gen. Joe Dunford continues to strengthen the partnership between combatant commanders and the Joint Chiefs as we think through campaign design at the strategic level of conflict. 

Today, we look at current and future global security challenges through the lens of a “4+1” framework. From China’s actions to militarize the South China Sea, to Russian aggression in Eastern Europe, to Iran’s continued malicious activity, to nuclear aspirations of an increasingly unstable North Korea, we have returned to the era of state-on-state competition even as we counter violent extremism in the Middle East, prevent its spread to other regions, and disrupt attacks worldwide. The 4+1 challenges, all transregional in nature, require a sophisticated approach that often spans beyond existing COCOM geographic boundaries.

With this level of trust and confidence established, the table is set for a revolutionary approach to warfare in the information age. To achieve the key attributes of decision speed and operational agility, we must focus on two levels of integration.

The future of combined arms

The first is a vertical integration of all operating domains (air, land, sea, space, cyber, and sub-surface). In each of these domains, we simultaneously sense the globe and create effects. Both the challenge and the opportunity is to better stitch these domains together in ways that allow the massive volume of data we collect to enter a common operating system that can store, share, and compare at machine speed. 

In the information age of warfare, relying on mostly human analysis is far too slow and the volume of data collected is far too great to achieve the decision speed required. This is where many of the Third Offset technological concepts of machine-to-machine dialogue, human-machine teaming, artificial intelligence, and autonomy come into play. As the data is quickly turned into decision-quality information, we must then create simultaneous effects from these same domains that can be rapidly choreographed into an attack plan that overwhelms any adversary’s ability to counter and respond.

Integrate across domains and components

The second level of integration is the horizontal connection of the various functional communities that must coordinate and integrate their activities so the sum of our operations is always greater than merely adding together the individual parts. This begins across components when a combatant commander demands vicious harmony in order to ensure the joint force hits on all cylinders. But it is far more than a military challenge. Much as we must stitch together domains vertically to sense the globe, provide decision-quality information, and create multi-domain effects, we must also stitch together the variety of stakeholders horizontally who offer the ability to contribute to creating multiple dilemmas for our adversaries.

This is going to require us to find creative ways to better share information with our international teammates as we prosecute campaigns “by, with, and through allies and partners.” As improved technology fosters mission growth (think no further than the current cyber and ISR enterprise that didn’t exist 15 years ago), there has been a corresponding increase in the security levels of information. 

War in the information age will continue to rely on a foundation of trust and confidence across the joint and combined team. The relationships we have built over the past quarter-century of conflict at the tactical, operational, and strategic levels set the table now for a revolutionary approach to future combined arms. 

DefenseOne:            NATO Cyberwar: Establishing Rules Of Engagement:
 

« Medical Devices Are The Weak Link
Australia Goes To Cyberwar With Islamic State »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

FirstPoint Mobile Guard

FirstPoint Mobile Guard

FirstPoint Mobile Guard has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Blockchains LLC

Blockchains LLC

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

The CyberWire

The CyberWire

The CyberWire gets people up to speed on cyber quickly and keeps them a step ahead in a continually changing industry.

Cyberguardians

Cyberguardians

Cyberguardians is a team of experienced cybersecurity experts and consultants who always believe in the value and a high level of cybersecurity services to clients.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.

SpectrumWise

SpectrumWise

SpectrumWise is a business technology specialist that provides Managed Services and Managed Security for small and medium IT Networks.

Panasonic Automotive Systems

Panasonic Automotive Systems

Panasonic Automotive Systems brings together security technologies and human resources cultivated across an extensive range of businesses into the automotive field.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.