Among them, conflicts and wars have always occupying important place, Through last decades the military were not only a beneficent but even a founder to the technological Demand for the technological superiority, the decisive factor in prospective war, were forcing successive American governments to spent large sums on research and development (R) centers during the Cold War, but didn’t expend with the decay of the Soviet Union.
Nowadays the LISA are spending approximately 12% of their defense budget (75 of 5623 billion in 2008) on “research, development, testing and evaluations” (to compare, in 2004 combined spending of China, Russia, Prance, Israel and the Lignite Kingdom for R didn’t exceed $17 In 1991, the first Gulf War showed the prosperity Of the American military technology over their Cold War’s adversaries equipment.
Best services for writing your paper according to Trustpilot
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team
This war were also an impulse for so called Revolution in Military Affairs (RAM) Which is so far shaping the strategy Of the American army. The point of this essay is the explanation where the American military supremacy is coming from and then, by referring to historical case studies, an analyze of possible weaknesses in the U. S. Strategy. At the end maybe it will be possible to answer the question: could the faith in technology became the American “Imaging of even “Achilles heel” of the 21st century?
Before the RAM became main goal of the LIST. Military during Donald Remorseful term of office as a Secretary of Defense, as early as in the middle ass military thinkers, like retired admirals William Owens and Arthur Casebooks, remarked that the changing rules of the information age implicate changes in the military area as well. They argued that the patterns trot modern economy should be implied also in military. 4] In 1996 the Joint Chiefs of Staff created the “Joint Vision 201 J’ OVA 2010) which stated that the main goal for the IS_S, military will be achieving “the information prosperity’ tinned as a “the capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary ability to do the same_IS] Year 1399 brought an another crucial work for the current military transformation program The “Network Centric Warfare” written by David S. Alberta, John J.
Garrets and Frederick P. Stein underlined once again that military reflects an economy system. Therefore, When in the past success in business depended on ability to rapid production and shipment of products, so also victory in war depended Of ability to rise and then transport concentrated army roofs into decisive points of enemy;s defense. The perfect example of the realization Of this strategy (created by the industrial revolution in 19th century) were Prussian victories over Austria (1866) and France (1871).
Bismarck armies were able to defeat their enemies because thanks to the developed command structure and railroad system were able to mobile and move masses of soldiers faster than their adversaries. In turn, as a result of the information revolution, success in nowadays business depend from the rapid acquirement and dissemination of information. Therefore, authors of the “Network Centric Warfare” argued that victory in post-industrial war will depend from the ability to gather the most exact possible knowledge to the enemy.
Then, thanks to the existing technology, it will be possible to strike into vital points of the enemy’s forces from big distances – it is no any longer necessary to concentrate big armies (in true it could be dangerous because of the mass destruction power of modern weapons), it will be enough it a fire platform will appear in 500 miles range from the enemy and then precision guide monition (PEG)will be lunched from this safe distance against nodes of the enemy’s army.
Realization of the “Network Centric Warfare’ ideas became the main goal of the Donald Remorseful era as the Secretary of Defense and for the fist time was shown in practice during the 2nd Gulf War in 2003.  The biggest change between the First and the Second Gulf War came in the real-time communications systems between units and their commanders. The main task of the specially designated units, like the 1 lath Signal Brigade was “connecting foxhole With the White House”.
Soldiers Of the Brigade, during assault on Baghdad occupying “Satellite Park” (camp with dozens of satellite ashes settled shareowner in Kuwait, approximately 75 miles from Iraqi border) were controlling if every unit has maintaining connection with the central command. In 2003 the 11th Signal Brigade were responsible for the flow of whole Army’s battlefield communication (five networks), The routine of checking health of the communication nodes spread among fighting units, were broken when any one of the representing them icons changed color from green to red.
In these cases main task of the unit were becoming delivery of reserve transmitters on the front line. In the Revolution in Military Affairs it is necessary that every soldier can et connection to the Global Command and Control System (SACS). Known as “Geeks” for common soldiers, system tracks every friendly soldier, vehicle, plane or ship on the world and place its position on the digital map. Also known enemy’s positions were showed there.
During the operation “Iraqi Freedom” SACS ran over Spinner – the Secret Internet Protocol Router Network: 65 servers placed in the Connect (Central Command) which was settled just outside the capital city of Qatar – Doth. Spinner is the American army’s local area network and works in a exactly same way like public Internet, however for the security seasons doesn’t connect with the World Wide Web properly. Through their SACS soldiers were able to get connection to the portal called ‘Warranting Web” – big source of battle plans, maps, records and online chats.
Thanks to the platform unit which engaged in a fight With the enemy may send an information about this struggle (or even upload a film from it) to the Joint Operational Command (JOY) Which can consult it With the intelligence, Pentagon or even the White House and then send orders back to unit (online or via radio through the nearest Tactical Operations Center – the most forward placed command post on the This new information network changed totally the way in which military units were moving through Iraq.
During the operation “Desert Storm/’ in 1991 coalition forces were forming a wedge which was literally sweeping the area in front of it. In this formation (designed for the armored divisions as early as in the eve of the Second World War) units were working close to each other and any time could received help from the neighboring divisions. Modern technology allowed units to track each other without maintaining an eye contact. Thanks of that, units could moved in a spread “swarm” formation through the battlefield. Formation like this is giving many advantages.
First of all, the enemy is not able to predict plans and positions of the American forces so also concentration of their forces in the crucial points of defense is impossible. Formed in the “swarm’ formation units were covering much more ground and thanks to that were able to localize more enemy’s forces. After encounter with them they were informing via Tactical Operations Center (TCO) (or even by Microsoft Chat of their SACS) the Central Command and then experts from Connect or Pentagon were trying to ivory out the best way to destroy this founded target.
Units in the “swarm” formation generally moves faster – TTS not necessary to keep a wedge formation for the price Of sweeping empty ground. And last but not least, fighting in this style makes war cheaper.  Donald Remorseful came to the Pentagon from the business community and his commercial approach were easy to spot during his term of office. One of the most important aims of any enterprise is lowering costs. So the savings became one of the Remorseful goals as well.
The “swarm” tactics is allowing achieving aims with fewer troops and less equipment (it’s not necessary to move vast wall of oldie’s and tanks across the desert – only to throw kept in reserve units against revealed strong points of the enemy’s defense and strike precisely against them). Also developing of precision guided weapons (Pigs) seemed like a proper investment. Of course one may found its surprising – a “smart” bomb costs much more than an ordinary one ? but one “surgical” hit is enough to eliminate a target and in the past dozens of bombs had to be dropped to achieve similar probability of destruction.
In fact this might be debatable, however Pigs posses much more advantages. First of all there is no other so “American” weapon. Designed as a killing machine ‘Smart bomb” is also considered as a life saving arm – or maybe more correctly as a non unnecessary victims weapon (and non necessary sacrifice are thing that American public opinion like to avoid). There is no need to drop a bomb directly over a target so American pilots are safer.
And thanks to the surgical precision is less likely that with the destroyed for example factory halt of a city disappear as well (like during the “carpet” bombings of the Second world War). What is more the USA have in this field great lead over the rest of the World. This ability to identify and strike against many targets it is the “market” (saying in business words) in Which Americans hue the best competitive advantage. According to the Remorseful economical approach, army as well as any Other enterprise should focus on things in Which are superb and abandon markets where is performing on a poor or average level.
In this approach efficiency is all and redundancy should be avoided. Because Americans specialize in the capability to identify and attack targets with their Pigs FM great distances, Remorseful begun homogeneities of his services – units that do to posses this ability are not fitting to the new strategy. The first victim of the Remorseful policy was the “Crusader” artillery system. This project was canceled because the Pentagon argued that tasks of the ground artillery can be done by the air force as well.
What is interesting, exactly the same conclusion were shared by the decision makers of the Israel Defense Forces (DIF-), Before In the eve to the so called “Yam Kipper war” Israeli command was sure that perspective war against countries of the Arab world will he looking like the previous one. The spectacular victory in the Six Days War of 1967 gave Israelis inference in own superiority and recipe for success in the future war. Because victory in 1967 were achieved mainly thanks to the superior air power, DIF developed this service more at the cost of for example field artillery.
To surprise of Israeli decision makers during the war in 1973 opponents were able to employ deadly effective air defense system which prevent Israeli Air Forces to provide close air support role in lieu of artillery. This and some other factors, like total underestimation Of the enemy brought Israel on the edge of I] History knew also other examples where homogeneities of army’s services dead to disaster _ Because Of the country Of my origin one Of first examples that are coming to my mind is the battle of Churchill in 1605.
This struggle is of course not very well known for military historians however is showing many aspects in which theoretically superior force became the victim of its own advantages. The battle of Churchill (today Assails, Latvia) was the turning point of the first war (1600?1611) been Sweden and Polish-Lithuanian Commonwealth for the dominance over Duchy of Alveoli (nowadays area of Latvia, Alveoli and Estonia). New model Swedish army – typical example of the 1 7th century West European litany – led by the king Charles IX himself, were eager to destroy much smaller Polish forces before their ranks could rise. 0. 800 strong Swedish army were formed according to the Renaissance era’s structure with approximately infantry (among them two thirds were armed in muskets and the rest in pikes) and a small cavalry contingent. To the contrary Polish-Lithuanian army were mainly mounted and the charge of their armored cavalry (“winged hussars”) were still considered as the decisive tactical maneuver. Opposite forces encounter on 25th September 1605. After 20 to 30 minutes of the battle Swedish forces came literally wiped out from the field and lost 50 to 75% of their base strength.
Outnumbered 3 to I in the eve of the struggle Poles and Lithuanian lost no more than 100 dead and 200 wounded. The victorious Polish commander Moan Karol Chickweed) exploited all weaknesses of the Swedish army ? homogeneities of forces, over reliance on technology and over confidence.  Western European armies ceased to relay on the charge of heavy armored knights in 16th century when armed in pikes and muskets infantry units literally ended the “age Of chivalry”. After the “milestone” battles Of Mortgager (1 313),
Leaped 1339, Secrecy (1346), Cincture (141 5), Raven (1512) and Via (1525) core Of typical European army was created Of professional soldiers organized in infantry blocks with the decreasing year by year support of cavalry (at the beginning Of the 17th century mounted soldiers were used only for reconnaissance and to secure infantry blocks from being outflanked by enemy’s horse. To fulfill this tasks typical western cavalryman were mounted on heavy, powerful but slow steed and relay on his pistols as a main weapon against adversary counterpart.
To the soldiers and commanders of organized in this style Swedish army (which included a few thousand German, Dutch and a few hundred Scottish mercenaries) the army of the Polish-Lithuanian Commonwealth had to looked very old fashioned. Two thirds of this army were created from the cavalry with the armored hussars as a backbone unit. But despite coming trot the nobility stratum this soldiers had not 50 much in common with out lived common leave of medieval knights. First of all, they were professional soldiers who had spent majority of their lives “in a saddle” practicing own military skills.
Secondly, Polish ‘Winged” hussars were not a remainder of the medieval times UT quite modern formation, Originated from Hungarian or Serbian mercenary Hussars” – medium cavalry unit specializing in the Unit and run” tactic (used commonly on the European frontier with the Turkish Ottoman Empire), they went through process of adaptation and uniformity to be able to deal with all of the Pollard’s opponents (since beginning of the 16th century – Russians, Western European mercenaries, Mongols and other Asiatic nomad tribes, Cossacks, All this struggles created an universal soldier – armed in lance, sword, saber, pistols, matchlock and sometimes even a bow and arrows, protected by the body armor ND riding on the especially breed warhorse, hussar were combing the light cavalry ability to maneuver with the breaking charge power of the medieval knights. ‘Winged” hussars were distinguishing themselves from other units by wearing attached to the saddles of their horses wings created of eagle or ostrich feathers and by covering their armor with furs of wild animals. This look, in addition to the unusual sound created by the long flags attached to their lances were scaring enemy’s horses and this is maybe the clue why at Churchill they beat Swedish riders with ease.
Swedish horsemen – too few in number and unable to fight with the enemy who excel in close combat instead of firefight, were not able to prevent poles of outflanking and then striking in the back of Swedish InterTAN formations spreading panic which embraced whole Charles IX army. So called in Sweden “Churchill disaster” forced changes in Swedish military. Forces of Gustavo Adolph, which doing especially well during the ‘Thirty Years War”, passed through transformation which raised the parity of cavalry in the army and changed the viva in which they were used. The second Swedish stake at Churchill were confidence about superiority of their tactics of musket fire.
The twilight of the heavy armored knight on the West came when weakened by gun fire cavalry units were not able to brake on through the wall of infantry pikes. Since this moment the winning side of a typical battle in Western Europe were this one avouch were able to shoot faster, more accurate and continuously to their enemy before encounter at the sword point. Because of that ranks of the musketeers Start growing and numbers Of the hand-to-hand fighters melting. Used to the speed of the marching infantry Swedish musketeers in 1605 were blew to shoot just one volley against fast charging Polish and Lithuanian riders before hiding among ranks of the pike-men.
This one volley were not able to cause much destruction in the files Of advancing cavalry mostly because as well trained and experienced horsemen as hussars were able to charge in spread formation and dense their ranks just before encounter with the enemy. What is more, the firearms technology of the 1 7th century were not very reliable, additionally in hours preceding the battle they were exposed to rain (and wet gun powder surely were not so effective as a dry one). If we add to this factors mom typical human reactions, like extreme stress experienced by the shooters in front of the charging cavalry, low losses among the Chickweed’s soldiers (of 100 killed only 13 were hussars) are not so surprising. Western European military men knew how to deal with the enemy’s cavalry but were not prepared to fight with such huge numbers of horsemen.
This problem – not sufficient number to existing countermeasures could became also a weakness of the American forces nowadays. During the “Millennium Challenge 2002” – war game which was simulation of (then) perspective warmth Iraq, American’s adversary (team “Red”) once succeeded. “Red” player’s land-to-sea rockets sank 16 American ships in the Persian Gulf with 20. 000 men on board. U. S. Ana were in possession of countermeasure ? anti-rocket system “Aegis”, but defenses were overwhelmed by the number of rockets shot at them (“Reds” fired whole their arsenal in one volley). Despite defeat Americans were still believing in theirs system. The over confidence can be extremely dangerous in battle. 14] The victory at Churchill could not be possible (or at least not so effective) without Swedish conviction in own superiority – not only in numbers but also in quality. Before the battle Swedes occupied strong defense position on the hill, however they left it when Polish-Lithuanian forces started retreating. This retreat, in fact a feint which forced Charles IX to chase after Chickweed’s army, stopped when Swedes moved out of the hill. Then hussars turned over and strike against the exposed enemy. Similar belief in own invincibility seems to be one of the main sins of modern American commanders. There are however some fields where it is possible to show weaknesses in the American war winning strategy. First of all, advantages given why the Revolution in Military Affairs had narrow applicability.
American strategy were deadly effective in Iraq but conditions typical to the desert landscape – vast flat land and generally clear weather, were perfect to show American supremacy in equipment Repetition of this may not be possible in other environment ? like the Afghan mountains or hated since Vietnam war jungle. What is more American opponent were conventional army – possessing specified structure and tactics ? things that can be exploited thanks to the dominance in the information realm. Realities of modern world shows however that possible American enemy do not have to be other country but for example insurgence group or international crime organization. Enemy like this is very difficult to track and its not predictable in acts. Secondly American army is relying on information technology that is very vulnerable and fails very often even in peace time.
Army Servers might be liable on hackers attacks (in 1999 Department of Defense reported 22, 144 attacks on its unclassified systems) and What is more they can fail even Without any help from enemies (for example because of the nonvoter failure Nationals Security Agency headquarter were shut down for Whole 3 days in January 2000). So crucial for American strategy Global Positioning Satellite (GASP) network can be jammed by accessible for less than $4000 commercial tools. The same problems might cause using by military public telecommunication nonvoters and commercial software, For example significant number of systems are provided by Microsoft (like mentioned chats). In case of problems the Joint Operational Command help desk’s main role is consultation with the Microsoft online help It is easy to imagine that so generally accessible knowledge Gang be used by hackers to interrupt this software work.
Additionally, even the most technologically secure network Anton be protected from human errors. Also actions of enemy agents (who in the society so multicultural like the American could be enlisted with ease) can create many potential dangers. The problem of today’s IIS, military is over dependence on technology and specialization in digital based strategy. As well as Swedes in 17th century American decision makers are believing that perspective enemies will follow the same paths and will try to compete with the LISA on American rules. The problem might appear when adversary will use different, so called asymmetric methods (i. E. Instead of competing in musket fight will inch a cavalry charge).
One of the definitions of asymmetry is avoiding strong points of the enemy and striking into his weak points. So, potential enemy’s countermeasures might not include only a try to deprive Americans support of information technology but also an exploitation of the LISA institutional impediments. American political system (like most Other democratic regimes) is underlining power of the civilian government over military. And civilians can be an easier target than the military men.  Two of the most significant American defeats (in Vietnam and Somalia) resulted to from military problems but because of losing the public opinion support for war.
Nowadays so called “CNN effect” can be used against democratic countries to weaken public support for the war (for example during intervention in Somalia in 1993, clan leader, Mohammed Aided won the information war against the UN when television showed corpses of killed marines dragged through the streets of Mogadishu – because of the public opinion, USA have to withdraw from Somalia despite the tact that for each killed marine Aided lost at least 15 men, at total one third of his In the past, countries that introduced new methods of combat were defeated by enemy that match their revolution and then excel in it. As a example it is possible to show France in Revolution and Napoleonic period. One of the most significant advantages of Prance was ability to mobile vast masses of society into the Army. This pattern – soon followed by for example Russia, was an important factors that allowed defeat Napoleon (of course it was not the only one reason but probably without it victories would not be possible).
The Prussian decisive factor in their 19th century victories was development of the railroad yester and management of the mass manipulation methods. This features, soon followed by Prance and Russia prevent German Empire to achieve fast victory in 1914 and as a result to exploit German problems with shortage of resources and manpower _ Also victory Of the Soviet Union on the eastern front Of the Second World War was not possible only thanks to the unequaled ranks of the Red Army and resources base (in fact this factors USSR possessed also when were suffering bitter defeats of 1 941) but mainly because of the adaptation (and even improvement) of the “blitzkrieg” tactic.
Thanks to the great investments n Research and Development the LISA seems to stand far out of the reach of another countries (which cannot even dream of so big spending on modern technologies) however because of the accessibility to the very often commercially used American military technologies they do not have to pass the same way of development and modernization that Americans. What is more most of the used by Americans military equipment are not so tress invention. Commonly used over Iraq and Afghanistan planes ? like fighters F–14, 15, 16, F-/A-18, stealth bombers F-1 17 and 8-2, tank destroyer A-I O, Black Hawk and Apache helicopters ere designed in the asses and asses. Also tank M-l Abram – literally indestructible from the ground level vehicle – was designed in asses.  The important factor behind the development of this combat machines was existence of the one, dreadful opponent – the Soviet Union.
Because American military were preparing to the possible war with the Soviets their weapons were constructed to match the Russian products and because the perspective of war was very real they did not have problems With convincing the public opinion to spent their tax dollars on the military purposes. Today, lack of the clear opponent s a real problem Of the American commanders. Field army can not be shaped to fight with so invisible adversary like AY-Qaeda or insurgence groups. On the other hand opponents like China are in possession Of the nuclear weapons and can not be matched with the conventional forces. Because of that only possible foe for the American military might be rouge countries with a limited access to resources and technology, so easy to underestimate. What is more technology can win a battle but will not win a war. Armed conflict is the complex affair of political and military dimensions.
Strategy leading to story can but no necessary have to be based on technology. From this point of view, IT really could be the “Imaging line’ of the 21st century. Prospective American enemies could simply bypass technological American handicap and take advantage of the existing weaknesses such like the lack of the public support tort war. Original Imaging line gave France confidence in own invincibility and because of that addicted the country’s strategy on this one feature. As a result French army were waiting in their strong points and lost perfect occasion to defeat Third Reich through offensive action in 1939. American problem might be exactly reverse.
Military doctrine of the LISA is underlining preemptive attack as an important part of providing national security. Conviction in the success of such attack coming from the blind faith in own technological superiority and it can fail bitterly. For the same reason society cannot treat wars as safe games Power solutions still should be considered as a (sometimes inevitable) failures rather than methods of diplomacy. To wrap up, technological superiority of the American military seems not to have any equals on the world. Even With the transparency Of American methods, respective enemies are far behind in digital arms race (we have to remember that large number Of the Pentagon’s new projects are classified as top secret).