26
THE EVOLUTION OF THE EVOLUTION OF MODERN WARFARE MODERN WARFARE

the Evolution of Modern Warfare

Embed Size (px)

DESCRIPTION

the Evolution of Modern Warfare

Citation preview

THE EVOLUTION THE EVOLUTION OF MODERN OF MODERN WARFAREWARFARE

IntroductionIntroductionWarfare has always been an evolving concept. Throughout history, it has constantly been shaped and altered by the exigencies of nations and the moral sentiments of the global community.

IntroductionIntroductionWe live in difficult times. Our world

witnessed armed conflict in countries like Afghanistan and Iraq, and escalating problems between Russia and Ukraine.

Various political, religious and economic divisions have caused both domestic international tensions.

The Evolution of The Evolution of WarfareWarfare

First Wave Warfare: GuerrillaFirst Wave Warfare: Guerrilla The oldest form of fighting is guerrilla warfare,

which requires the least amount of training.

People (men, women and children) fought as guerrillas, usually in a part-time capacity, in small bands, with each person knowing the rest of the group. The weapons were unsophisticated and based on everyday implements (usually farming tools)

In retrospect, it was a pioneer of modern warfare.

Second Wave Warfare: Second Wave Warfare: ConventionalConventional

Warfare changed around 17th century together with the Industrial Revolution. It meant that industry could develop more destructive weapons.

Fighting formations became larger and it was necessary for all troops to have distinctive uniforms to distinguish them from the enemy.

The troops carried their arms openly, wore insignias and fought in organized formations.

Armies also became more specialized in their work: they were to defend national security.

The Decline of Conventional The Decline of Conventional WarfareWarfare

During the first half of the 20th century, the nature of conventional warfare changed. It used to be about humans killing humans.

Beginning in WW1, land warfare became far more mechanized. Warfare became a matter of machines killing machines. WW II will remain the world’s largest conventional war. Other wars have been longer was the Iran-Iraq war of the 1980s.

The prime factor in the decline of conventional warfare is the cost of the mechanization of warfare. Governments cannot afford the same stock of equipment as they used to acquire.

Third Wave Warfare: Nuclear Third Wave Warfare: Nuclear WeaponsWeapons

Nuclear warfare was a direct outgrowth from conventional air warfare. Leaders in WW II wanted to avoid a repeat of WW 1’s trench warfare and so they looked for method of moving firepower quickly over long distances.

Bomber aircraft were the favourite method throughout Europe. The technology of that period seems quaint by the standards of half a century later.

The quest continued for much more powerful bombs. This work culminated in the creation of atomic bombs.

Third Wave Warfare: Nuclear Third Wave Warfare: Nuclear WeaponsWeapons

On a rate based on the number of potential deaths, nuclear missiles are cheaper than most other forms of killing. Their limitation arises, ironically, from their extensive capacity to kill. They are too destructive to use in the usual military campaigns. Nuclear weapons would destroy that which the attacker would like eventually to control.

Additionally, for the first time in history, a powerful nation cannot defend its people from an attack. Nuclear missiles cannot be shot down.

Meanwhile, all societies will remain vulnerable to guerrilla groups using nuclear explosive devices.

Fourth Wave Warfare: The Return Fourth Wave Warfare: The Return of Guerrilla Warfareof Guerrilla Warfare

Almost every conflict underway today involves guerrilla in at least one party to the conflict. These are people fighting in small band, often not in uniform, with weapon varying from very sophisticated ones (either donated by one of the great powers or stolen from the conventional forces on the other side) to old weapons and even homemade ones.

GW turns conventional warfare’s reasoning upside down. GW is essentially political- it is about winning the hearts and minds of people. Guerrillas do not need a large amount of firepower since they are only carrying out sporadic raids.

Fourth Wave Warfare: The Return Fourth Wave Warfare: The Return of Guerrilla Warfareof Guerrilla Warfare

Modern transport is of great use to guerrillas. It gives them greater mobility so that a group may attack the offices of its opponents in another nation (notably embassies).

It also provides targets (particularly airports and aircraft) where security is difficult to maintain. Thus, a dispute in one country easily spills over into other countries.

While there is now virtually no risk of a WWIII, there is a growing risk that eventually guerrilla groups will get access to nuclear weapons.

The Decline of International WarThe Decline of International War

Most wars underway today are not only guerrilla ones but they are also not strictly “international”. International warfare is now rare.

The modern trends in warfare are for groups to try to break away from an existing nation to create their own nation, or for a group to try to overthrow its government and so form its own government.

Guerrilla warfare is the preferred technique in both cases.

The Civilianization of WarfareThe Civilianization of Warfare

A further implication of the growth of guerrilla warfare is that civilians now bear the brunt of the fighting.

From WW II onwards, the percentage of civilians being killed in warfare has increased. This is to be expected given the changed nature of warfare.

A tradition of war was that military personnel and buildings were to be only targets. Nowadays, the target could be anything.

The 21The 21stst Century Warfare Century Warfare

The 21The 21stst Century Warfare Century Warfare There will be contrasts between 21st century warfare

and the forms we have previously witnessed.

1)For example, highly developed societies will attempt to “engage the enemy more closer” from further away. An example of this may be the use of the Unmanned Aerial Vehicle (UAV).

While UAVs may be flown, and therefore attacks can be carried out with precision by pilots located thousands of kilometers from these aircrafts, “boots on the ground” will still be needed, and still in large numbers. But the “boots” will need to be networked, skilled and supported.

The 21The 21stst Century Warfare Century Warfare 2) Networks will be key enablers. The capability growth

of C4ISR will continue to be phenomenal. If the power of computers continue to rise almost exponentially during the next decades, the advances made will not only be huge but also surely unpredictable.

3) Artificial intelligence, nanotechnology and biological computation are among the most important developing technologies and are bound to change the face of armed conflicts.

Failures in intelligence are unlikely to be eliminated and could have increasingly severe and global effects, because intelligence systems will be far-reaching and ostensibly capable of monitoring almost all villages on the planet.

CYBER WARFARECYBER WARFARE

Cyber WarfareCyber Warfare In the 2001 CRS Report, a definition of cyber

warfare was provided: "[c]yber warfare can be used to describe various aspects of defending and attacking information and computer networks in cyberspace, as well as denying an adversary's ability to do the same."

Ultimately, cyber warfare, regardless of the specific definition used, has come to symbolize a state sponsored use of weapons functioning within the cyberspace domain to create problematic and destructive real world effects.

The Weapons of Cyber WarfareThe Weapons of Cyber Warfare The cyber weapons actually come in two distinct

forms.

The first is the actual delivery method weapon: this is the standard device actually used as the portal through which the cyber attack is coordinated and the cyber weaponry constructed.

The second type of cyber weaponry is the cyberspace component. These intangible weapons are potentially comprised of computer programs, network viruses, and digital command operations, and function solely in the cyberspace domain.

The Weapons of Cyber WarfareThe Weapons of Cyber Warfare1. Denial-of-Service

A denial-of-service ("DoS") attack is defined as an "assault on a network that floods it with so many additional requests that regular traffic is either slowed or completely interrupted".

Generally, DOS attacks work by crippling a website or computer network resource and making it unusable by overwhelming the resource with a massive amount of information requests, resulting in an inability to respond to legitimate information and data requests.

The Weapons of Cyber WarfareThe Weapons of Cyber Warfare2. Malicious Programs Malicious programs, or malware, typically operate by

"disrupting normal computer functions, or by opening a back door for a remote attacker to take control of the computer.“

Viruses, the most common form of malicious programming, may function to delete certain computer files or make such files unusable.

The other common form of malicious programming, a worm, functions similarly by spreading from one computer to another and eventually infecting an entire computer network. However, a worm differs from a virus in that it is both capable of travelling across a computer system without aid from individual computer users and it is capable of directly replicating itself thousands of times within a single computer. Worms tend to consume massive amounts of memory, and as a result, infected computers, and the networks they operate on, often become unresponsive.

The Weapons of Cyber WarfareThe Weapons of Cyber Warfare3. Logic Bombs

Logic bombs, a more advanced type of malicious programming, only execute their destructive effects when triggered by particular events occurring at a pre-determined time.

A logic bomb can sit dormant for long periods of time unsuspected and then be activated, making its effects far more likely to be wide-spread than if its' malicious impact was readily apparent.

Once activated, a logic bomb may cause severe damage to the infected computer, rendering it entirely unusable, deleting specific data, or even functioning to activate a more complex DOS attack.

The Weapons of Cyber WarfareThe Weapons of Cyber Warfare4. IP Spoofing Also known as IP address forgery, IP spoofing is a kind

of hijacking technique that allows the hacking user to operate a computer while appearing as a trusted host.

By thus concealing his true identity, the hacker can gain access to computer networks and network resources. When hijacking a network Internet browser, any computer using the browser upon entering a URL is taken to a fraudulent webpage mirroring the entered site page, but created by the hijacker.

The moment the user interacts with any of the content of the fraudulent webpage, the hijacking user gains the ability to access sensitive network information or the computer's fundamental programming features.

The Weapons of Cyber WarfareThe Weapons of Cyber Warfare5. Trojan Horses

Trojan horses, as the name implies, operate as a kind of malicious software based on fooling targeted computers into believing that the malicious program will actually perform a useful or desired function.

Instead, the Trojan horse acquires unauthorized access to the infected computer. Subsequently, the Trojan horse programming allows a remote user to access the infected computer and may also cause the infected computer to serve as a resource in later DOS attacks.

Tutorial QuestionTutorial QuestionWhat is new about new wars?

What are the strengths and weaknesses of the new wars?

THANK YOUTHANK YOU