Modern warfare takes place in the space, cyber and electronic spheres
Washington is concerned about the growing military strength of the two main geopolitical adversaries of the United States – China and Russia. The US military is losing ground in a number of strategic areas, such as the construction of hypersonic weapons. As the US media notes, the emerging technological delay has serious concerns about the Pentagon, which is preparing a symmetrical response to the threat from outside.
The US media report that the US Department of Defense is seriously concerned about the country's security. Some time ago, Pentagon Military Intelligence issued a report listing threats to US national security. Among the most dangerous phenomena that undermine international stability are terrorism, the activity of “rogue states” (DPRK, Iran, Cuba, etc. – “MK”), as well as the strengthening of Russia's and China's military forces.
According to The National Interest, a separate threat to the US is the threat of hacking. The new challenges call for the development of new ways of gathering intelligence, technologies for the processing and secure transmission of information, and other measures aimed at protecting against hacking. The “Cold War” of our time, as the newspaper notes, is taking place in the space, cyber and electronic spheres. And the Pentagon is well aware of that.
“The expansion of the competitive space beyond traditional military areas and geographical boundaries increases and complicates the requirements for military intelligence, collection, analysis and planning,” the US Department of Defense said in a report.
$ 23.3 billion (with a total military budget of $ 715 billion) is allocated for the development of new information security systems in the new US military budget. According to the national interest, the Pentagon wants to neutralize new threats by introducing modern technologies that will significantly increase the chances of success in a modern war. The introduction of new information exchange technologies should reduce the time for handing over orders from headquarters to those who directly pull the trigger. The publication believes that the allocated funds will be used for the development of systems with the support of artificial intelligence, modern network technologies, improvement of the air combat control system and other cutting-edge technological achievements.
The US military also expects to create the most secure communications network in the world. After a potential adversary fails to break through defense algorithms and obtain data on upcoming US military actions, the US military gains a serious advantage. Among the most dangerous threats to information security, the American expert Chris Osborne named jamming systems, electronic warfare (EW) systems or other types of hostile activities aimed at suppressing communication systems.
These measures should theoretically allow the United States to maintain military dominance in the world, especially since other countries are not yet ready to invest such large sums in developing weapons for a “new type” of war.
However, the Pentagon still dominates a number of traditionally military areas, such as the Navy. The national interest states that the US Navy has greater firepower than any of its potential rivals. The publication concludes that in the near future, Russia, China or other countries “hostile” to Washington will not be able to form strike groups of aircraft carriers, unlike US Navy operational formations.
However, as military expert Alexander Mikhailovsky noted in an interview with the MC, US confidence in the integrity of its intelligence and information systems can play a cruel joke with the Pentagon.
– The fact that they are aware of the extent of the threat and are preparing to fight is definitely a plus for them. Simply because not everyone in the world has yet realized how this front works in general and how it fights on it. But so far they are losing not only with their leading rivals, but also on some fronts – for example in Iran. Because American drones often fall victim to Iran's electronic warfare. In addition, if you start creating information protection, it would be nice to pick up cell phones from employees, as they do here. Because there are known cases of classified information coming to the web from the United States through applications for rating hotels, beer, and the like. In a word, it is necessary to start not with technology, but with discipline, the expert noted.
The specialist also added that information security systems and methods of hacking them will be improved just like all other weapons. And sooner or later there will be a sword for any virtual shield.