War In The Information Age

We are on the eve of a new era in the business of warfighting and combined arms. This is the information age of warfare and advantage will be achieved through the speed and integration of information. 

If we follow the right path, tomorrow’s commanders will seamlessly direct joint and coalition forces in a way that simultaneously capitalizes on the advantages on land; at sea; and in the air, space, and cyberspace. 

The primary warfighting attributes will be decision speed and operational agility. In short, our asymmetric advantage in future battles depends on harnessing the vast amount of information our sensors can generate, fusing it quickly into decision-quality information, and creating effects simultaneously from all domains and all functional components anywhere in the world.

Before discussing what must change as we evolve in the information age of warfare, we should acknowledge what never changes: trust and confidence. Joint and coalition warfare has and always will rely on trust and confidence at all levels, tactical, operational, and strategic.

At the tactical level, our soldiers, sailors, airmen, Marines, and Coast Guardsman must trust each other to achieve mission success. From Air Force Joint Tactical Air Controllers embedded with and coordinating airpower for Army and Marine maneuver units to Navy and Coast Guard integrated maritime operations around the globe, today’s military has established an unprecedented level of trust and confidence from 25 years of fighting together.

At the operational level, component commanders from each service understand the supporting and supported relationships required to employ joint and coalition forces in support of a Joint Force commander. 

At the strategic level, Chairman of the Joint Chiefs Gen. Joe Dunford continues to strengthen the partnership between combatant commanders and the Joint Chiefs as we think through campaign design at the strategic level of conflict. 

Today, we look at current and future global security challenges through the lens of a “4+1” framework. From China’s actions to militarize the South China Sea, to Russian aggression in Eastern Europe, to Iran’s continued malicious activity, to nuclear aspirations of an increasingly unstable North Korea, we have returned to the era of state-on-state competition even as we counter violent extremism in the Middle East, prevent its spread to other regions, and disrupt attacks worldwide. The 4+1 challenges, all transregional in nature, require a sophisticated approach that often spans beyond existing COCOM geographic boundaries.

With this level of trust and confidence established, the table is set for a revolutionary approach to warfare in the information age. To achieve the key attributes of decision speed and operational agility, we must focus on two levels of integration.

The future of combined arms

The first is a vertical integration of all operating domains (air, land, sea, space, cyber, and sub-surface). In each of these domains, we simultaneously sense the globe and create effects. Both the challenge and the opportunity is to better stitch these domains together in ways that allow the massive volume of data we collect to enter a common operating system that can store, share, and compare at machine speed. 

In the information age of warfare, relying on mostly human analysis is far too slow and the volume of data collected is far too great to achieve the decision speed required. This is where many of the Third Offset technological concepts of machine-to-machine dialogue, human-machine teaming, artificial intelligence, and autonomy come into play. As the data is quickly turned into decision-quality information, we must then create simultaneous effects from these same domains that can be rapidly choreographed into an attack plan that overwhelms any adversary’s ability to counter and respond.

Integrate across domains and components

The second level of integration is the horizontal connection of the various functional communities that must coordinate and integrate their activities so the sum of our operations is always greater than merely adding together the individual parts. This begins across components when a combatant commander demands vicious harmony in order to ensure the joint force hits on all cylinders. But it is far more than a military challenge. Much as we must stitch together domains vertically to sense the globe, provide decision-quality information, and create multi-domain effects, we must also stitch together the variety of stakeholders horizontally who offer the ability to contribute to creating multiple dilemmas for our adversaries.

This is going to require us to find creative ways to better share information with our international teammates as we prosecute campaigns “by, with, and through allies and partners.” As improved technology fosters mission growth (think no further than the current cyber and ISR enterprise that didn’t exist 15 years ago), there has been a corresponding increase in the security levels of information. 

War in the information age will continue to rely on a foundation of trust and confidence across the joint and combined team. The relationships we have built over the past quarter-century of conflict at the tactical, operational, and strategic levels set the table now for a revolutionary approach to future combined arms. 

DefenseOne:            NATO Cyberwar: Establishing Rules Of Engagement:
 

« Medical Devices Are The Weak Link
Australia Goes To Cyberwar With Islamic State »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Cyber Wales

Cyber Wales

Cyber Wales provides a focus and forum for everyone in the industry, helping businesses come together and collaborate both within Wales and internationally.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Experis

Experis

Experis provide IT resourcing, project solutions and managed services. We enable organizations to cultivate individuals and teams prepared for the digital age.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.