首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
首先阐述和分析了赛博空间和电子战的概念和特点,给出了电子战在赛博空间中的定位。然后探讨了电子战在赛博空间中的应用,给出了电子战在赛博空间中可能应用的几大方面。最后总结了赛博空间电子战面临的关键技术与挑战。  相似文献   

2.
My aim in this paper is to reflect on a very narrow question: under what conditions might a cyber-attack provide a just cause for war? I begin by articulating what makes for a just cause, briefly address the problem of attribution, and then discuss three broad categories of cyber-attack: those that clearly do not satisfy the just cause requirement, those that clearly do satisfy the just cause requirement, and three ambiguous cases – the destruction of property, the emplacement of logic bombs, and the failure to prevent cyber-attacks. My conclusions are exploratory and suggestive rather than definitive, partly by virtue of the extreme paucity of literature on the moral assessment of cyberwar.  相似文献   

3.
The Indian Army has a uniquely political approach to counterinsurgency that has had great success. This essay examines the development of this doctrine over the last five decades, and the political and operational factors that influenced its development. The most important of these factors was, and remains, the Army's positional‐war orientation, which puts great emphasis on the need to prepare for conventional war. Though the doctrine has undergone some evolution, such changes have been constrained by the positional‐war orientation.  相似文献   

4.
Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts.  相似文献   

5.
This article examines British Army operations in Iraq. It focuses on the causes of the army's apparent failure to live up to its reputation for the conduct of small wars. The paper discusses the British experience of small wars in the context of Iraq, the influence of doctrine and strategy, and the political and moral factors that shaped the army's performance. The paper's conclusions suggest that the Iraq War may cause a significant reappraisal, not just of military doctrine and strategy, but also of Britain's role in future small wars.  相似文献   

6.
‘Doctrine’ has been part of military vernacular for at least a century. Nonetheless, it is a concept which is rather under-explored. The aim of this article is thus to break doctrine down into its component parts in order to grasp what a military doctrine actually is. Thereafter, the article points out different ways to utilise doctrine as a military devise. A doctrine cannot be, or rather should not be, all things to all men. On the contrary, doctrine can be a tool of command, tool of education or a tool of change. The main upshot of the article is that the future of doctrine is far brighter than its critics want us to believe.  相似文献   

7.
仰斐  廖东升 《国防科技》2017,38(2):043-048
从网络空间侦察能力、指挥控制能力、精确攻击能力、防御能力和评估能力等五个方面,对网络空间支援力量的核心支援能力进行了系统论述,提出建设军队网络支援力量、应对网络空间安全威胁的新思考和新观点。研究认为,当前我军在网络空间的安全意识、核心技术、均衡发展等方面面临严峻困难。为实现网络强国的奋斗目标,需要加强国家网络安全的顶层设计,增强网络技术自主创新能力,强化军民融合式建设和系统常态的攻防训练等。  相似文献   

8.
针对网络空间信息防御需求及特点,利用解析结构模型方法,分析网络空间信息防御能力的影响要素及其关系,建立网络空间信息防御能力影响要素的层次结构模型,并找出核心要素和关键环节,为网络空间信息防御能力建设提供决策支持。  相似文献   

9.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   

10.
赵炤  朱启超 《国防科技》2014,(1):11-13,17
震网病毒被认为是史上第一种"网络物理战"武器,文章介绍了两个版本震网病毒的作用机理,分析了网络物理战的作战思想,提出了层次化的网络空间、过程中的网络漏洞和网络物理威慑等新概念,并总结了其对网络战研究的启示。  相似文献   

11.
For six years, India has sought to implement an army doctrine for limited war, ‘Cold Start’, intended to enable a Cold War era force optimised for massive offensives to operate under the nuclear threshold. This article asks whether that is presently feasible, and answers in the negative. Doctrinal change has floundered on five sets of obstacles, many of which are politically rooted and deep-seated, thereby leaving the Army unprepared to respond to challenges in the manner envisioned by the doctrine's architects.  相似文献   

12.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

13.
Li Chen 《战略研究杂志》2017,40(5):663-695
This article analyses the doctrine development of the People’s Liberation Army (PLA) coping with the Soviet military threat between 1969 and 1989. In the 1970s, the PLA applied a doctrine of ‘active defence and luring the enemy into depth’ based on its traditional operational art. In 1980, the PLA decided to focus its doctrine on positional defence. In 1986, the PLA introduced ‘integrated operations and prioritised strike’, a generalised doctrine that originated from its war history. Many organisational and intellectual challenges in peacetime doctrine development contributed to the PLA’s operational idealism, including its aging leadership, command structure, attitude towards its previous experience, limited analysis of contemporary military developments, and failure in test and validation of doctrines. In the post-Cold War decade, many of these challenges persisted in spite of military modernization efforts. The ongoing military reform has to address these challenges and improve the PLA doctrine development in peacetime.  相似文献   

14.
This article had its genesis in a background study for the development of a new Australian Army counter-insurgency doctrine. Archival research showed that the Australian counter-insurgency doctrine employed in such post-1945 conflicts as Burma, Malaya, Borneo and Vietnam originated in the jungle campaigns of the South West Pacific Area during World War II. The historical record also showed that the Army's counter-insurgency doctrine, as with its World War II-jungle warfare doctrine, was a pragmatic amalgam of Australian experience and British doctrine. The article traces this process through the development of a series of doctrine manuals. It also considers the contribution of key individuals to both counter-insurgency theory and practice. This distinctively Australian approach to the development of doctrine was responsible for producing a highly successful manual, The Division in Battle: Pamphlet No. 11, Counter-Revolutionary Warfare (DIB 11), which the Army used during its involvement in Vietnam.  相似文献   

15.
In the mid-2000s, the United States Army was embroiled in counterinsurgency missions in Iraq and Afghanistan that required deeper understanding of local social systems. The Army turned to systems thinking and design thinking to model and understand the world, define problems, and develop approaches to strategic and operational challenges. However, the Army’s approach as expressed in publications and doctrine encourages the development of complicated, unsupported, and unfalsifiable hypotheses. The risk is that the Army will act on incorrect assumptions and develop plans that are fragile.  相似文献   

16.
根据特种作战力量网络空间防御作战系统的结构模型的预警、保护、检测、响应和恢复五个方面,按照指标的不同类型和特点,利用模糊综合评判法对指标进行量化、一致化和标准化处理,利用层次分析法确定各指标的权值,最后利用综合加权法建立综合效能评估模型从而实现对网络空间防御作战的效能评估。该方法适用性和实用性强,为网络空间防御作战效能的评估提供一种方法和思路。  相似文献   

17.
基于系统动力学的网络空间作战指挥效能评估?   总被引:1,自引:0,他引:1  
针对网络空间作战指挥效能评估问题,运用系统动力学方法进行了研究。通过层次熵分法对网络空间作战指挥效能评估指标体系进行了指标权重赋值,依托系统动力学方法建立了指挥效能评估模型并进行了仿真实验,分析了不同条件下指标对指挥效能的影响情况,为研究如何提高网络空间作战指挥效能提供决策依据。  相似文献   

18.
随着中美实力差距不断缩小和信息技术的发展与扩散,网络安全成为中美新的竞争点和摩擦点,中美在网络安全问题上展开新一轮的博弈,具体体现为网络空间治理权之争、中美网络安全战略博弈和网络技术优势的夺取。  相似文献   

19.
This study examines the war that the United States has waged since September 2001 as a global counterinsurgency. Placing the war against al-Qaeda and its allied groups and organizations in the context of a global insurgency also presents implications for doctrine, interagency coordination and military cultural change. The first part of the article offers a distilled analysis of al-Qaeda and its associated networks. The second section examines the US military in the context of the Western way of war, with the attendant military-cultural impediments to adapting to an enemy who embraces a very different approach to war. The third section aims to define and describe the nature of the war that America and its coalition partners are trying to wage. The concluding section offers the most value as it refines and distills the work of several international security and military thinkers to arrive at some imperatives for successfully prosecuting this type of war to its end.  相似文献   

20.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号