Unrestricted Digital Warfare.

Add bookmark

Unless otherwise referenced, many of the ideas in this article are taken from the proceedings of the Disruptive Technology for Defence Transformation Conference held online by Defence iQ in September 2020. The Conference was held under the Chatham House Rule so individual ideas have not been attributed to particular speakers. Defence iQ is grateful to the speaker faculty for their contributions to the conference which was chaired by General Sir Richard Barrons.

 

A single manmade stock market crash, rumour or computer virus can be a new-concept weapon. Technological progress has given us the means to strike at an enemy’s nerve centre. The best way to achieve victory is to control, not to kill.

            -  Qiao Liang and Wang Xiangsui, Unrestricted Warfare (1999)

 

Blurred lines

It is over 20 years since the Chinese doctrine of Unrestricted Warfare was published. The West faces a nexus of hostile states, organised crime and insurgent groups that do not recognize a binary distinction between warfare and are supercharged by technology. Meanwhile the geo-strategic rise of China sees it prepared to use all available levers of economic, political and military power to subvert international norms. The cyber and communications infrastructure of the Belt and Road Initiative enable China to disrupt and influence other states in support of Beijing’s vision of a China restored to its rightful place in the world.

In the information age, where data has value as a source of power and control, China has ‘leap-frogged” the West in its understanding.

Against this backdrop Defence iQ brought experts from the Armed Forces, industry and academia together to explore the challenges and opportunities of digital technologies. From the 3 day virtual Disruptive Technology for Defence Transformation conference a number of key themes emerged.

 

“A new form of security for the cyber age”

 – Jeremy Fleming, 2019, Director GCHQ, Fullerton lecture on Cyber Power.

First and foremost it is clear that we must shift to a “homeland defence” mindset. Daily probing of networks pose an existential threat to our security. It is vital that we adopt digital strategies that can face the myriad threats both above and below what has historically been regarded as the threshold of conflict.

Allied to this there is no doubt that future military superiority will be dependent on national cyber power and sharing of information across services, government and coalitions. Multi domain integration is essential in the information age, “joint” is no longer enough.

In a system of systems the network becomes the driving force. Long held ways of operating and iconic platforms may fall by the wayside as we shift from being weapons led to digitally led. As data becomes as much of an asset as weapons our fundamental approach to command and control, even warfare itself must be re-evaluated.

The explosion in data will require an increased reliance on autonomy and machine learning bringing ethical and policy challenges to the fore. As the use of advanced weapons systems evolves, our teaching of the law of armed conflict must develop in tandem.

Future operations will take place in a cyber contested environment in which weapons systems, defences and responses can be rendered useless overnight. Cyber considerations must routinely be included in operational planning and front-line cyber support available. Timeframes for procurement and upgrades should be measured in weeks and hours, not years and months.

Finally whilst the development of offensive and defensive cyber capabilities are essential, these cannot continue to operate in isolation from each other as they currently do. Rather our cyber capabilities should become an extensive eco-system in which interdependencies between offensive and defensive can be maximized to our advantage and in which routine persistent network patrolling becomes the norm.

 

A change of mindset.

There is no doubt that a challenging transformation of political mindset, doctrine and capabilities lies ahead. The good news is that the UK has the cyber institutions, industry and academic expertise and military strategists required to meet this challenge, but it will require collaboration and foresight. Cyber can no longer be an afterthought but must be at the heart of UK defence.


Upcoming Events

Cyber Impact Gateway

24 - 25 November, 2015

ILEC Conference Centre and Ibis London Earls Court, London, United Kingdom

Cyber Impact Gateway

Countering IEDs and Explosive Ordenance Disposal

25 - 26 April, 2017

Hilton London Canary Wharf, London, United Kingdom

Countering IEDs and Explosive Ordenance Disposal

Medical Support Operations 2018

11 - 12 April, 2018

Hilton London Canary Wharf, London, United Kingdom

Medical Support Operations 2018

Armoured Vehicles Middle East

30 April - 2 May, 2018

Armed Forces Officers Club, Abu Dhabi, United Arab Emirates

Armoured Vehicles Middle East

Homeland Security Week 2016

November 1 - 3, 2016

Washington Hilton, Washington, DC

Homeland Security Week 2016

Mobile Mil satcom 2016

30 - 31 August, 2016

Hilton London Olympia , London, United Kingdom

Mobile Mil satcom 2016

Latest Webinars

Securing the Defence Industrial Base: Mitigating Risk and Delivering Resiliency in Physical and Digital Supply Chains

2022-04-21

12:00 PM - 01:00 PM EST

This webinar discusses the current risks in today's supply chain and the recent military initiatives...

Zero Trust and Air Force Missions

2021-07-27

11:50 PM - 01:30 PM EDT

As the Air Force and Space Force make significant strides in implementing Zero Trust, how do they ma...

Laser Weapons today and tomorrow

2021-07-22

12:00 PM - 01:00 PM EDT

Join a dynamic panel discussion on high-energy laser weapons with some of today’s top experts in hig...

Recommended