在反叛乱行动中利用技术

VIP文档

ID:53983

大小:0.51 MB

页数:19页

时间:2023-04-08

金币:10

上传者:战必胜
LEVERAGING TECHNOLOGY IN COUNTER INSURGENCY
OPERATIONS
Introduction
21
st
Century is characterised by phenomenal growth of technology specially Information
Technology (IT). The technology is becoming cheaper, easy to operate and provide facilities
which could not be even imagined decade earlier. Technology is also a great leveller. With
the possible exceptions of night-vision devices, Global Positioning Systems, and shoulder-
fired missiles,” writes retired Major General Robert Scales, a former commander of the US
Army War College, “there is no appreciable technological advantage for an American
infantryman when fighting the close battle against even the poorest, most primitive enemy.”
Technology is available to security forces as well as terrorists. Today’s enemies are dynamic,
unpredictable, diverse, fluid, networked and
constantly evolving leading to complex problem sets. Small networked organizations like
insurgents are very good at adopting technology whereas hierarchical bureaucratic
organizations like Army takes its own time to exploit its benefits. Since Counterinsurgency
Operations (CI Ops) is fought basically at battalion or below level, we must provide all the
technological support at that level. It is up to us to make use of technology in Counter
Insurgency Operations (CI Ops).
Preview
For leveraging technology in CI Ops we need to look into the aspects of various technologies
specially network technologies, Software Analysis Tools, sensor and weapon related
technologies, how intelligence, the most important factor in any CI Ops can be acquired with
the presently available technologies, creation of dynamic database in respective area of
responsibility and defensive measures. Information Warfare and some cautionary thoughts
also have been discussed.
Network Technology.
The term network technology is referred to as command, control, communication, computer,
intelligence, surveillance, and reconnaissance (C4ISR) technologies in military parlance, as
well as the consumer-oriented technologies that can often provide the functionality needed for
terrorist operations. These network technologies can include connectivity technologies (e.g.,
wireless routers), mobile computing (e.g., laptop computers), personal electronic devices
(e.g., personal digital assistants and cell phones), IT services and Internet access and video
recording, among others. If the primary goal of security forces is to defeat a terrorist
organization in the long run, there may be opportunities to turn the terrorist organization’s use
of network technology tools to the security force’s advantage by exploiting the information that
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭