John Arquilla

Last updated

John Arquilla (born 1954) is an American analyst and academic of international relations.

Contents

Biography

Arquilla received a B.A. from Rosary College in 1975. Until 1987, he worked as a surety-bond executive. He then enrolled at Stanford University, where he studied Political Science, receiving the M.A. degree in 1989 and a Ph.D. in 1991. [1]

From 1989, Arquilla also worked as analyst for RAND. In 1993, he joined the faculty of the US Naval Postgraduate School, where he has since taught courses in national security affairs and defense analysis, while keeping his post at Rand till 2003. [1]

Arquilla worked as a consultant to General Norman Schwarzkopf during Operation Desert Storm (1991), as part of a group of RAND analysts assigned to him. During the Kosovo War (1998-1999) he assisted United States Deputy Secretary of Defense John Hamre on international information strategy. [2] During the George W. Bush administration, Arquilla was one of many advisors to former Secretary of Defense Donald Rumsfeld (in office 2001-2006), who like Arquilla is an admirer of Andrew Marshall's RMA (Revolution in Military Affairs).[ citation needed ]

Arquilla has contributed op-eds to journals and publications such as The New York Times , Forbes , Foreign Policy magazine, The Atlantic Monthly , Wired and The New Republic . [2]

Academically, he has developed the concept of netwar, or "swarm-tactics", referring to the particular fighting-style of network-organised groups. Networked cells can share precise information on a need-to-know basis without a hierarchical structure. This gives them the ability to disperse and "swarm" in an extremely effective manner, as witnessed in the 9/11 attacks.[ citation needed ]

Arquilla has promoted the idea of adapting militaries from a hierarchical structure to a network structure, suggesting that a network military will be the most able to defeat terrorist networks. He also points to the Roman concept of organized legions defeating the previous military paradigm of the phalanx. Likewise, terrorist networks have evolved while older Cold War militaries hold on to antiquated paradigms.

Arquilla's arguments for the US to use cyber war as an instrument of conflict prevention in areas such as South Asia, as described in a 2009 Wired article, [3] have earned him criticism from Pakistani writers and web journals, such as TechLahore. [4]

Arquilla supports preemptive war and NSA wiretapping as antiterrorist methods: "the fact that preemption can only function on the basis of accurate insight should make the case for governments around the world to continue to amass and employ big data to search out the small cells that bedevil our era". [5]

Works

See also

Related Research Articles

<span class="mw-page-title-main">Information warfare</span> Battlespace use and management of information and communication technology

Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from cyberwarfare that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.

<span class="mw-page-title-main">Insurgency</span> Revolt or uprising by irregular forces, especially one that is prolonged

An insurgency is a violent, armed rebellion by small, lightly armed bands who practice guerrilla warfare against a larger authority. The key descriptive feature of insurgency is its asymmetric nature: small irregular forces face a large, well-equipped, regular military force state adversary. Due to this asymmetry, insurgents avoid large-scale direct battles, opting instead to blend in with the civilian population where they gradually expand territorial control and military forces. Insurgency frequently hinges on control of and collaboration with local populations.

A revolution in military affairs (RMA) is a hypothesis in military theory about the future of warfare, often connected to technological and organizational recommendations for military reform.

Fourth-generation warfare (4GW) is conflict characterized by a blurring of the distinction between war and politics, and of the distinction between combatants and civilians.

<span class="mw-page-title-main">Ron Arnold</span> American writer and activist (1937–2022)

Ron Arnold was an American writer and activist. He was the Executive Vice-President of the Center for the Defense of Free Enterprise. He wrote frequently on natural resource issues and is an opponent of the environmental movement. Critics saw Arnold as promoting abuse of the environment, typified in an assessment by Wild Wilderness executive director Scott Silver: "Fifteen years after creating his 25 Point Wise-Use Agenda, an agenda prescribing unrestrained, unregulated and unconscionable abuse of the American commons, Ron Arnold is within striking distance of checking off every agenda item on his list." A key U.S. Senate staffer writing in 2011 noted his impact on federal legislation.

<span class="mw-page-title-main">Under Secretary of Defense for Policy</span> United States government position

The United States under secretary of defense for policy (USDP) is a high level civilian official in the United States Department of Defense. The under secretary of defense for policy is the principal staff assistant and adviser to both the secretary of defense and the deputy secretary of defense for all matters concerning the formation of national security and defense policy.

The Joint Worldwide Intelligence Communication System is the United States Department of Defense's secure intranet system that houses top secret and sensitive compartmented information. JWICS superseded the earlier DSNET2 and DSNET3, the Top Secret and SCI levels of the Defense Data Network based on ARPANET technology.

Seth G. Jones is an academic, political scientist, author, and former senior official in the U.S. Department of Defense. Jones is most renowned for his work on defense strategy, the defense industrial base, irregular warfare, and counterterrrorism. Much of his published work and media interviews are on defense strategy; Chinese, Russian, and Iranian conventional and irregular capabilities and actions; and terrorist and insurgent groups such as al-Qaeda and the Islamic State. He is currently a senior vice president at the Center for Strategic and International Studies.

Swarming is a battlefield tactic designed to maximize target saturation, and thereby overwhelm or saturate the defences of the principal target or objective. Defenders can overcome attempts at swarming by launching counter-swarming measures that are designed to neutralize or otherwise repel such attacks.

Proactive cyber defense, means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or deterring an attack or a threat's preparation to attack, either pre-emptively or in self-defence.

<span class="mw-page-title-main">Bruce Hoffman</span> American counterterrorism analyst and foreign policy expert

Bruce R. Hoffman is an American political analyst. He specializes in the study of terrorism, counter-terrorism, insurgency, and counter-insurgency. Hoffman serves as the Shelby Cullom and Kathryn W. Davis Senior Fellow for Counterterrorism and Homeland Security on the Council on Foreign Relations, and is a professor at the School of Foreign Service of Georgetown University. In addition, he is the Professor Emeritus and Honorary Professor of Terrorism Studies at the University of St Andrews, and is the George H. Gilmore Senior Fellow at the U.S. Military Academy's Combating Terrorism Center.

<span class="mw-page-title-main">United States Cyber Command</span> Unified combatant command of the United States Armed Forces responsible for cyber operations

United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise which focus on securing cyberspace.

milw0rm Hacker group

Milw0rm is a group of hacktivists best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai, the primary nuclear research facility of India, on June 3, 1998. The group conducted hacks for political reasons, including the largest mass hack up to that time, inserting an anti-nuclear weapons agenda and peace message on its hacked websites. The group's logo featured the slogan "Putting the power back in the hands of the people."

In the political field, a war of ideas is a confrontation among the ideologies that nations and political groups use to promote their domestic and foreign interests. In a war of ideas, the battle space is the public mind: the belief of the people who compose the population. This ideological conflict is about winning the hearts and minds of the people. Waging a war of ideas can involve think tanks, television programs, journalistic articles, government policies, and public diplomacy. In the monograph: 'Wars of Ideas and The War of Ideas' (2008), Antulio J. Echevarria defined the war of ideas as:

A clash of visions, concepts, and images, and — especially — the interpretation of them. They are, indeed, genuine wars, even though the physical violence might be minimal, because they serve a political, socio-cultural, or economic purpose, and they involve hostile intentions or hostile acts.. .. Four general categories [include]. .. (i) intellectual debates, (ii) ideological wars, (iii) wars over religious dogma, and (iv) advertising campaigns. All of [the categories] are essentially about power and influence, just as with wars over territory and material resources, and their stakes can run very high indeed.

Hybrid warfare is a theory of military strategy, first proposed by Frank Hoffman, which employs political warfare and blends conventional warfare, irregular warfare, and cyberwarfare with other influencing methods, such as fake news, diplomacy, lawfare, regime change, and foreign electoral intervention. By combining kinetic operations with subversive efforts, the aggressor intends to avoid attribution or retribution. The concept of hybrid warfare has been criticized by a number of academics and practitioners due to its alleged vagueness, its disputed constitutive elements, and its alleged historical distortions.

Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and power projection thanks to comparatively advanced technology and a large military budget. Cyber warfare presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities.

Informatized warfare of China is the implementation of information warfare (IW) within the People's Liberation Army (PLA) and other organizations affiliated or controlled by the Chinese Communist Party (CCP). Laid out in the Chinese Defence White Paper of 2008, informatized warfare includes the utilization of information-based weapons and forces, including battlefield management systems, precision-strike capabilities, and technology-assisted command and control (C4ISR). However, some media and analyst report also uses the term to describe the political and espionage effort from the Chinese state.

Command and influence is a component of Military C2 and is a key aspect of Terrorist Tactics, Techniques, and Procedures.

Ryan Maness is an American cybersecurity expert and an assistant professor at the Defense Analysis Department of Naval Postgraduate School. He is the co-author of Cyber War Versus Cyber Realities: Cyber Conflict in the International System, which won widespread critical acclaim.

David Ronfeldt is an American researcher known for his work on information-centric and network-centric warfare. He holds a doctoral degree from Stanford University and has been a prominent figure at the RAND Corporation.

References

  1. 1 2 CV, Naval Postgraduate school, Monterey
  2. 1 2 CV, Foreign Policy
  3. Shachtman, Noah (2009). John Arquilla: Go on the Cyberoffensive. Wired Magazine 17(10).
  4. "Wired magazine makes the case for cyber war against Pakistan and India « Tech Lahore". Archived from the original on 2009-11-17. Retrieved 2009-11-14.
  5. Last War Standing, Foreign Policy, 12 August 2013