The military-digital complex (MDC) is the militarization of
cyber operations
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic wa ...
by governments and corporations, often through monetary relationships between computer programmers in private companies and the military to combat the threat of cyber terrorism and warfare. Cyber operations since 2000 have increased dramatically, with the recent branch of the US Strategic Command the
United States Cyber Command
United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
. Cyber operations has been defined by the ''Washington Post'' as,
:"Offensive and defensive cyber (or digital) warfare, including the fields of computer network attack, computer network exploitation and computer network defense; as well as traditional electronic warfare (e.g., jamming) intended to deny an adversary use of their electronically dependent equipment through "non-kinetic" means—that is, by fighting with electrons rather than explosives."
As cyber attacks become an increasingly common threat to the security of civilians and highly classified governmental information, a need to combat the threat by means of
computer network operations Computer network operations (CNO) is a broad term that has both military and civilian application. Conventional wisdom is that information is power, and more and more of the information necessary to make decisions is digitized and conveyed over an e ...
and
computer network defense have arisen. It is important to note however that protection is only one component of the Military-digital complex and that the use of
information warfare
Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from ''cyberwarfare'' that attacks computers, software, and ...
within the complex can be used to achieve military operations and an upper-hand in economic exploits.
The Military-digital complex contains many components which align it succinctly to its industrial counterpart, for example the use of defense contractors. Although hired Contractors may not be explicitly named as such they still expose the complex to complications such as the
principal–agent problem
The principal–agent problem refers to the conflict in interests and priorities that arises when one person or entity (the " agent") takes actions on behalf of another person or entity (the " principal"). The problem worsens when there is a gr ...
and consequently
moral hazard
In economics, a moral hazard is a situation where an economic actor has an incentive to increase its exposure to risk because it does not bear the full costs associated with that risk, should things go wrong. For example, when a corporation i ...
. The MDC is seen as a progression as nations move globally towards
cyberwarfare
Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
, indeed the cyber war is increasingly being acknowledged as the "fifth domain of warfare".
The MDC is a necessity for governmental bodies in order to maintain high standards within their cyber army, for example the USA boasts over "143 private companies involved in top secret cyber operations programs", however James Gosler a government specialist in cyber security indicates that the USA have a severe shortage of government cybersecurity specialists.
History
It was not until the late 19th and early 20th century that weaponry advanced in leaps and bounds to the armaments mankind witnesses today, however even then industry was relatively independent of the government and military.
World War I
World War I or the First World War (28 July 1914 – 11 November 1918), also known as the Great War, was a World war, global conflict between two coalitions: the Allies of World War I, Allies (or Entente) and the Central Powers. Fighting to ...
and
World War II
World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
were two important factors that led to the consequent
military-industrial complex.
Eric Hobsbawm
Eric John Ernest Hobsbawm (; 9 June 1917 – 1 October 2012) was a British historian of the rise of industrial capitalism, socialism and nationalism. His best-known works include his tetralogy about what he called the "long 19th century" (''Th ...
in his book ''
Age of Extremes'' outlines how categorically countries like Japan, USA and Russia had to develop their own military industry to support their militaristic efforts, creating a complex whereby the economies then straddled on this arms industry. Consequently, the procurement of
missile
A missile is an airborne ranged weapon capable of self-propelled flight aided usually by a propellant, jet engine or rocket motor.
Historically, 'missile' referred to any projectile that is thrown, shot or propelled towards a target; this ...
s,
ballistics
Ballistics is the field of mechanics concerned with the launching, flight behaviour and impact effects of projectiles, especially weapon munitions such as bullets, unguided bombs, rockets and the like; the science or art of designing and acceler ...
,
nuclear weapon
A nuclear weapon is an explosive device that derives its destructive force from nuclear reactions, either fission (fission or atomic bomb) or a combination of fission and fusion reactions (thermonuclear weapon), producing a nuclear exp ...
s,
destroyers
In naval terminology, a destroyer is a fast, maneuverable, long-endurance warship intended to escort
larger vessels in a fleet, convoy, or carrier battle group and defend them against a wide range of general threats. They were conceived i ...
and
submarine
A submarine (often shortened to sub) is a watercraft capable of independent operation underwater. (It differs from a submersible, which has more limited underwater capability.) The term "submarine" is also sometimes used historically or infor ...
s shows a marked difference between the ancient acquisitions of countries.
At the dawn on the 21st century, the world has seen an emergence of digital equipment in the use of warfare, spanning from satellite surveillance systems all the way to dedicated agencies such as
United States Cyber Command
United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
fully equipped with thousands of professionals manning computers on a 24/365 basis in order to prevent a cyber attack.
The use of computers has long been an essential tool in warfare, however as warfare moves from the traditional frontiers of land, sea, air and space to "cyber space" the use of computers is becoming not only essential but vital. Gregory Rattray, author of ''Strategic Warfare in Cyberspace'', explains how the history of warfare in the
Information Age
The Information Age is a historical period that began in the mid-20th century. It is characterized by a rapid shift from traditional industries, as established during the Industrial Revolution, to an economy centered on information technology ...
is far reaching and is well beyond military operation including financial crime and economic espionage. The history of this cyber warfare shows that it crosses global boundaries and encompasses political agendas, attacks on the USA such as
Titan Rain
Titan Rain was a series of coordinated attacks on computer systems in the United States since 2003; they were known to have been ongoing for at least three years. The attacks originated in Guangdong, China. The activity is believed to be associat ...
show an attack from networks and computers situated in China for example. As the age of digital warfare progressed it has become evident that human reliance on technological equipment to monitor essential utilities such as our electricity grids has proven cataclysmic. As the threat became increasingly relevant, the emergence of big corporate players on the MDC scene including names such as
Symantec Symantec may refer to:
* Gen Digital, an American consumer software company formerly known as Symantec
* Symantec Security, a brand of enterprise security software purchased by Broadcom
Broadcom Inc. is an American multinational corporation, ...
,
McAfee
McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American proprietary software company focused on online ...
and traditional defense contractors such as
Northrop Grumman
Northrop Grumman Corporation is an American multinational Aerospace manufacturer, aerospace and Arms industry, defense company. With 97,000 employees and an annual revenue in excess of $40 billion, it is one of the world's largest Arms industry ...
and
Lockheed Martin
The Lockheed Martin Corporation is an American Arms industry, defense and aerospace manufacturer with worldwide interests. It was formed by the merger of Lockheed Corporation with Martin Marietta on March 15, 1995. It is headquartered in North ...
,
as the cyber threat grows so does mankind's reliance on corporate players such as the aforementioned, creating an
iron triangle among government, military and these global security corporations.
See also
*
List of industrial complexes
*
James Langevin#Cybersecurity
*
Michael McCaul#Legislation
References
Further reading
*
*
{{DEFAULTSORT:Military-Digital Complex
Cyberwarfare