Download presentation
Presentation is loading. Please wait.
1
Technology and National Security
PGMs RMA Cyber war? Robotics?
2
Precision-Guided Munitions (PGMs)
Thanh Hoa Bridge (after)
3
Gulf War
4
Revolution in Military Affairs
5
US “Information Dominance”
Lifting the Fog of War? US “Information Dominance” China’s response: Qiao Liang and Wang Xiangsui. Unrestricted Warfare (Beijing: PLA Literature and Arts Publishing House, February 1999)
6
Cyber… C4ISR Cyberespionage Critical Infrastructure Vulnerability
Cyberwar Offensive Defensive
7
Cyberspace: The New Realm of Warfare
8
1. C4ISR US military dependence on computers for: Command Control
Communications Computers (internet, networks) Intelligence Surveillance Reconnaissance
9
C4ISR What we want: Dominance Basic reality: Dependence
What we fear: Vulnerability
10
2. Cyberespionage Theft of material
Misinformation and alteration of data Disruption of activities and communications 21st century spy game Identification and attribution
11
3. Critical Infrastructure Vulnerability
12
4. Cyberwar?
13
Real? War just fought computer vs. computer
Cyber as an adjunct to traditional war
14
US Cyber Command
15
Cyber-war/espionage control treaties?
Cyber deterrence By punishment By denial Cyber capability race Cyber-war/espionage control treaties? “The Critical Infrastructure Non-Disruption Treaty”
16
Robotics
17
1. Robots Everywhere?
18
2. Military Robots Packbot
19
3. Robots to Do Specific Tasks
UAVs Predator Drone
20
MARCBOT UGV
21
Cormorant USV
22
BCB/AAI SQ-4 RECON Nano Quad-Rotor MAV/UAS/UAV (Micro Air Vehicle/Unmanned Aircraft System/Unmanned Aerial Vehicle)
23
4. Robots Replacing Humans?
Autonomous Battlefield Robots?
24
Special Weapons Observation Reconnaissance Detection System (SWORDS)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.