Military Review

Contactless and network wars

21
Contactless and network warsIn recent years, we have witnessed the rapidly changing phenomenon of war. The fighting, to which we are “accustomed”, changes its face, the actors and the logic itself. In addition to standard armed conflicts, we are increasingly talking about cyber attacks, terrorist acts, ethno-separatism, financial and commercial blockades, acts of civil disobedience and propaganda in the media. Attempts to qualify all these processes lead to the emergence of new terminology: from hybrid and asymmetric wars to network-centric operations and combat operations outside the conditions of war — such bizarre definitions supplement the new military doctrines of various countries.


The birth of contactless wars

The greatest success in a contactless war in recent years has been achieved during the Desert Storm campaign in 1991. There was a triple effect. At the tactical level, military personnel avoided direct participation in hostilities (except for pilots aviation, which attacked the sites of Saddam Hussein), which, of course, was in the hands of politicians behind the levers of war. Secondly, for the first time, military operations were shown live: according to CNN, in this way they showed the US military power to the whole world and worked out online information manipulation technologies. It was the first invasion of Iraq that led to the emergence of a term such as "television war." And thirdly, the high-precision was also first applied weapon - the so-called smart bombs and missiles, satellite navigation was used (for the first time, GPS technology was used to support the armed forces), which opened up new opportunities for the US military-industrial complex.

After the victory, American strategists and the military began a broad discussion about the beginning of a new era of war in the specialized press and academia. The continued involvement of the US military in conflicts in Yugoslavia, Somalia and other countries pushed them to the conclusion that radical reforms in the armed forces were necessary in order to make an organizational and technological leap, leaving their potential competitors far behind.

The architect of the air operation called Instant Lightning, which was the main component of Desert Storm, was Colonel of the USAF John Warden. He developed a systematic approach to hostilities, calling it “Operation Based on Effects” (SPE), which later became one of the cores of the strategy of network-centric wars. The concept of the colonel was based on a unique model of the modern state, which is a structure of five concentric rings. The central ring, or the circle that represented the national leaders, the most important element in military terminology, was surrounded and defended by the other four. The second ring was production, including various factories, power plants, oil refineries, etc., which are vital for national power during hostilities. State infrastructure - highways, railways, energy lines - was the third ring. The fourth ring was the population. And the last, fifth, outer ring was the armed forces. It was possible to avoid a collision with the outer ring and with the help of new technologies "Stealth", precision guidance systems and night vision immediately hit the inner ring. This scheme is called the "war from the inside to the outside."

Later, Warden continued to develop his theory of five rings, which was published in a specialized publication of the US Air Force called Enemy as a System. Based on comparisons and historical examples, he came up with a convincing and logical concept, which in addition to the ring structure used the term "strategic paralysis". “At the strategic level, we will achieve our goals by causing changes in one or more parts of the enemy's physical system, so that he will be forced to adapt to our goals, or we will not physically allow him to oppose us. We will call this “strategic paralysis,” the author noted. So, you just need to calculate the centers of gravity in the enemy's system and inflict pinpoint strikes on them. Each state has its own unique vulnerabilities, so the success of the operation will depend on a careful and accurate choice. You don't have to start a war and mobilize. You can use the contradictions of the target state with its neighbors or establish an economic blockade (as in the case of Cuba or Iran), raise a fuss in the UN and international structures, launch a duck in the media, which will create the corresponding mood in society (as was the case with Yugoslavia in 1999). Otherwise, call for the protection of human rights or engage patriotic hackers to punish the intractable government of a third country.

Indirect actions

General David Deptula expanded the views of Worden on new-type operations, from their use exclusively in the US military to all national levels, including diplomatic, informational and economic. Most importantly, he called for an emphasis on understanding the enemy as a system and believed that non-military actions are an integral part of the new theory of conflict. It is no coincidence that in the USA special groups were set up to work in Iraq and Afghanistan, which included sociologists, ethnographers, linguists, and other narrow specialists. Human Terrain teams communicated with the local population, created a favorable image of the occupying forces and purposefully engaged in penetrating the enemy’s consciousness by sending reports to the center, which described in detail the habits, behavior, hierarchical structure, strengths and strengths of a particular ethnic and religious group. The old dogma of the struggle for hearts and souls was also effective in the 21st century.

It is necessary to make a reservation that the new concept of war was preceded by several important conclusions drawn from the lessons of previous conflicts. First about the need to avoid contact with the enemy in the modern era spoke a British officer Liddell Garth in his work "The strategy of indirect action." The horrors of World War II, the doctrine of total war and the strategy of attrition brought their results. The United States and Britain, focusing on the Air Force, realized the benefits of air superiority. From here comes the beginning of the transformation of sea power into air power as the basis of the Anglo-Saxon military geo-strategy. The Star Wars project, which was actively promoted under Ronald Reagan, is a logical continuation of the US idea of ​​achieving total domination. However, judging by the works of George Friedman from Stratfor, combat space platforms are a matter of the future, they will be possible thanks to the joint efforts of the US military-industrial complex and the Pentagon.

Technique of network-centric warfare

Now specifically about how to lead the battle according to the new concept of war. In 1996, Admiral William Owens published an article titled “The Emergence of the US Systems System,” in which he pointed out exactly how new battles should be fought. “The merging of growing capabilities to continuously gather information in any weather in real time with an increasing ability to process and understand this voluminous data creates superiority on the battlefield,” he wrote. “Thanks to new technologies, we can automatically recognize targets and receive information about the enemy’s operational plans.”

Another author who influenced the transformation of the US armed forces is Vice Admiral Arthur Sebrovsky, who, in conjunction with United States military analyst John Garstka, published an article entitled “Network-centric War: Its Origin and Future” in 1998. The work had the effect of a bombshell in the military and scientific circles of the United States. Since the third period of globalization and the transition from the industrial to the information era affect mainly developing countries, the authors noted, information is the most effective weapon. And since the predominant type of human behavior in the information age is network behavior, the network-centric warfare fits perfectly. According to the Pentagon Doctrine, the core of such a war is at the intersection of the social, physical, informational, and cognitive areas. If information is still associated with a specific infrastructure, then the cognitive sphere is the least material of all four areas, because it exists in the human mind. It is associated with learning, experience, public opinion, beliefs, values ​​and understanding of the situation. But most importantly, the cognitive sphere is the area where decisions are made, and it is directly related to intellectual capabilities. As Sebrovski said, all wins and losses first occur in our brain ...

Dr. David Alberts, who works for the American defense industry and investigates the phenomena of network wars, agrees with his colleagues: in his opinion, the goal of a network war is human intelligence.

The future war itself, as Alberts wrote (that is, what is happening now), consists of three main types of actions. First, it is the perfection of the traditional battle. Secondly, this is the evolution of what has been called non-traditional missions, i.e. a fairly diverse set of actions, including humanitarian assistance, special operations and low-intensity conflicts, peacekeeping operations and actions aimed at preventing the proliferation of weapons. And third, the birth of a unique form of war for the information age.

National states or combinations of national states are not the only possible players in such conflicts. Non-state actors (including political, ethnic and religious groups, organized crime, international and transnational organizations, and even individuals equipped with information technology) are able to organize information attacks and build information strategies to achieve their desired goals.

This is done as follows. In an ideal form, network war actors are networks of small, diverse types of associations resembling cells. They are dispersed, but interrelated. The network should be amorphous - without heart and head, although not all nodes of the network should be equivalent to each other. The best tactics of combat in the literal and figurative sense - swarming. Like a swarm of bees, groups of people united by a common idea simultaneously begin to attack a target, be it a state or a transnational corporation. The target, superior in strength and potential of its opponents, is nevertheless forced to react to every smallest “bite”, and if the attackers possess a certain technique and are tempted in the conflict, then the outcome is almost predetermined. In other words, against one Goliath, not only David goes to battle, but many.

The sphere of cyberspace is very interesting and beneficial for offensive purposes, since digital war has, in essence, similar characteristics that military planners aspire to. These include low cost, precision, distance and cunning, which cannot be achieved in the real world.

Network war in Syria

A vivid example of a network war is the situation in Syria. In addition to the network-centric tactics used by terrorists (seeping in small groups, organizing terrorist attacks and sabotage at various industrial sites), coordination is carried out through communications received from Western countries. Tactical network-centric radio stations have long been adopted by the US Army, and now American instructors are training militants to interact in real time and obtain information about the location and location of the enemy using similar network sensors and sensors. Since the Syrian army does not have the experience of counter-terrorism operations and opposing the militants' network activity, they have to use the same tactics used in Grozny during the Chechen conflict - to use heavy equipment and often remove civilians and cover with firepower the areas where the alleged action movies.

In many cases, it turns out that direct combat contact with the enemy does not exist. The attacks of terrorists alternate with the return fire of government troops. Then everything repeats. As a result, civilians are the main victims of such a conflict. However, the civilian side of the Syrian war is also fully involved, and at the international level. Countless pro-Western non-governmental organizations with headquarters from Istanbul and Doha to London and Washington form public opinion not in favor of the Assad government. The ethno-religious factor is also actively exploited. In addition to radical Islam, whose representatives in the face of Wahhabis and al-Qaeda are conducting attacks on Christians, manipulations are being carried out with various ethnic groups, from Caucasian Circassians to Kurds and Armenians. The case of the Turkmen of Syria, which Turkey began to patronize before the conflict, is quite indicative. Now three organizations are actively functioning there - the Syrian Turkmen Bloc, the Syrian Democratic Turkmen Movement and the Syrian Turkmen Platform, with the latter officially promised the support of the Turkish government.

And, of course, social networks, where armed and more moderate opposition spreads their appeals and misinformation, are an important element of this war.

Drones and combat robots

As already mentioned, network-centric warfare is based on superiority in logistics and adequate feedback. But in addition to communication channels, databases and their processing, one element of this area is most effective and has been used for many years. These are unmanned aerial vehicles (UAVs), the use of which led to numerous casualties and subsequent international scandals.

The first known case of the use of a UAV as a fighter belongs to November 2001 of the year, when one of Al Qaeda’s military commanders in Afghanistan, Mohammed Atef, was killed with the help of the Predator drone. The idea of ​​creating UAVs for use against specific people or groups appeared in the 2000 year, when the Pentagon decided to place the Hellfire anti-tank weapon on the Predator reconnaissance drone.

Remarkable is the fact that Sen. Lindsay Graham in his speech in February 2013, said that the number of persons killed by American UAVs is 4700 people, which is about 1 thousand people more than in the report of the Council on Foreign Relations dedicated to UAV, which was released a month earlier. According to experts, there is a strong lobby in the US Congress that pushes through all kinds of UAV programs, i.e. formally compels the federal authorities to buy them for various purposes, even if this is not necessary.

Because of this, the US government officially announced that in the future it is counting on the widespread use of drones for various military tasks and considers the UAV program to be one of the foundations of the revolutionary transformation for future wars. Drone lobbyists say that drones are beneficial because there are no casualties among contingents during missions. On the other hand, the unambiguous use of such systems leads to a violation of territorial sovereignty, there is no transparency and accountability, there is a further weakening of political restrictions associated with the war. In the opinion of Richard Falk, President of the American Nuclear Energy Peace Fund, unregulated dispersion of weapons in the public and private sectors with a likely strategic role may occur, leading to undermining traditional international restrictive laws on warfare and public order or the emergence of a non-proliferation regime for unmanned aerial vehicles. that will allow all states to own and use unmanned reconnaissance aircraft in a sovereign space, and some countries will Rent drones selectively for attacking targets anywhere until a specific set of rules is agreed.

True, there have already been cases of hacking UAVs. In Iraq, the rebels managed to intercept radio signals from drones and send them to false targets, while the Iranians put an American reconnaissance drone without damage and examined it. On the other hand, UAVs are constantly being improved. Insect-sized drones have already been created, there are underwater and land robots capable of performing a variety of tasks, from shooting and cargo delivery to research of objects and territories. Unmanned Ground Vehicles (UGV) ground robots are actively used in both Afghanistan and Iraq for detecting mines and bombs and for fighting, for example 3 SWORDS (Special Weapons Observation Remote Direct-Action System), armed with M249 machine guns. The Future Combat Systems program was launched in the US as early as 2003, but it was frozen in 2009 due to lack of funds. Nevertheless, the budget for the production of combat UAVs in the United States from year to year increases, which corresponds to the Anglo-Saxon logic of air power. Each drone has its own special functions: some are created solely for tracking a certain territory and transmitting information (for example, balloon probes), others are more mobile and capable of maneuvering in the air. These include the relatively small Raven UAV and the large Global Hawk, one of which oversees North Korea’s nuclear program, while the Predator and Reaper are combat fighter drone capable of carrying missiles and bombs.

Although traditional martial art began to deteriorate in the era of the First World War, which the German philosopher Ernst Jünger noted with regret, the war will remain a constant component of human civilization. And modern technology is designed to replace people in their conflicts and interests. However, it is hardly possible that sometime the two sides will put exclusively robots on the battlefield against each other, and then, based on the results of the battle, sign a surrender agreement, because politics is a lot of society, not technology. And the new military gadgets and inventions will be sent exclusively to conquer or destroy manpower. At least, industrialized countries are counting on it, although their leaders hide behind a screen of democracy and humanistic values.
Author:
Originator:
http://www.geopolitika.ru/article/beskontaktnye-i-setevye-voyny
21 comment
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. Vanek
    Vanek April 17 2013 07: 07 New
    +2
    I still insist that NATO and the United States will not be able to wage a normal, offensive war. They can’t !!!
    1. UFO
      UFO April 17 2013 07: 17 New
      +5
      "Your words are yes ....". But it is harmful for us in the issue of cyberwar to take a position "from defense", with our computer scientists! And opportunities to harm in cyberspace - SEA. China, by the way, has long been "plowing this field", stealing all sorts of secrets from the "striped" ones. Well, Assange - for an example of confrontation. hi
      1. Averias
        Averias April 17 2013 07: 35 New
        +6
        Quote: UFO
        with our computer people!

        I would argue with you. For example: Calculations of the orbits of satellites and the influence of the Earth's gravity (carried out on computers, when there was only a vague idea about them) we came up with. Modeling of atomic reactions, including thermonuclear fusion (Tokamak, work on it has been carried out since the 70s), again, we. We were the first to introduce the use of computer units (guidance, tracking, warning about targets) on combat aircraft. An optical computer (there was a working prototype, the West made titanic efforts to ruin this project) - our development. Controlling reactors using a computer - and again we are the first. And finally - all the famous "Tetris", and again we. Even in spite of the difficulties in the field of microelectronics, unique devices were created.
        1. UFO
          UFO April 17 2013 08: 33 New
          +3
          And what is the contradiction? You yourself supplemented me. I will also add that the intellectual potential that we "spill" around the planet, in particular in "Silicon Valley", allows us to hope that in the issue of "cyberwar", Russia should occupy one of the leading positions.
          1. Averias
            Averias April 17 2013 12: 30 New
            0
            No, it's not about contradictions. Simply, the quote - "with our computer scientists" sounds like condemnation or censure. The interpretation looks like - they say why take something from our computer scientists.
    2. 101
      101 April 17 2013 12: 54 New
      0
      You mean a bayonet attack or something. Well, it’s only possible. How do you think, and how can our troops fight a modern offensive war? I emphasize a modern and large-scale war.
  2. fenix57
    fenix57 April 17 2013 07: 27 New
    +3
    The contactless war between Russia and the United States has been going on for 68 years (since 1945). And the end-edge is not visible to her. hi
    1. sergo0000
      sergo0000 April 17 2013 08: 13 New
      +2
      fenix
      And between Russia and the Naglosaks, this war has been going on for several centuries!
      The first information weapon was used when teachers poured into our schools from the West in a continuous stream to Russia. That's where they caused serious damage, attacking the young minds of Russia with their teachings, making them completely forget the true history of the Russian people!
      And now I am trying to transform the consciousness of children by throwing more and more hypotheses of the emergence of Russia. And from such a mess in the heads of our children, any desire to learn our history disappears.
    2. alexng
      alexng April 17 2013 08: 14 New
      +1
      The non-contact structure is doomed to failure, since it is a very vulnerable thing. This is a two-way street. Yes, for the war with the Papuans it all works, but no more. Oh, yes, also for cutting dough, and computer games for adult uncles who have not said goodbye to childhood. All these modern information technologies are effective only in conditions of peaceful coexistence. In other cases, this is an illusion and self-deception in its power, and rests only on arrogance, and confidence in its illusory impunity, for the time being. Intercepting a promising drone in Iran, immediately sobered the hawks in (C) Shakali and there they realized that they could not do without pills if they snooped. Ostsuda, and changes in emphasis and the rejection of Western dominance in the Middle East and the transfer of its center of gravity to the East and Southeast Asia. But it seems to them that nothing shines there either. So the Jedi are only Jedi in the movies, but in reality they turned out to be ordinary diapers. And in case of danger, their diapers immediately for some reason change color. bully
      1. Ezhaak
        Ezhaak April 17 2013 13: 39 New
        0
        Quote: alexneg
        And in case of danger, their diapers immediately for some reason change color

        You know, I would be careful with such statements. You can say that only by knowing a likely adversary well. Who works for these virtual wars, we do not know what they are capable of, specifically we can only speculate. Yes, and the Israeli troops imprisoned for virtual wars are alarming. What of this is in the states or Russia, we do not know. I in particular. So I'm careful. Thank.
  3. CCA
    CCA April 17 2013 07: 31 New
    +2
    Quote: UFO
    But it is harmful for us in the issue of cyberwar to take a position "from defense", with our computer scientists!

    I completely agree and even more, in addition to cyber defense, we must actively develop the other elements of non-contact action (drones, robots, GLONASS and Strategic Missile Forces in cooperation with the first ones listed). Which, in principle, is being done (there would be more speed and quality) ...
    1. Ascetic
      Ascetic April 17 2013 08: 51 New
      +5
      Quote: KKA
      Which, in principle, is being done (there would be more speed and quality) ...


      In the early eighties, the General Staff of the USSR Ministry of Defense and the Joint Chiefs of Staff of the United States issued two identical technical tasks. Americans - FMC Corp. (in the future - United Defense with an annual turnover of tens of billions of dollars), and ours - to the Volgograd Tractor Plant. The task was to create a combat vehicle with tank firepower for the airborne troops. The machine must land from the aircraft, and most importantly - to swim and shoot afloat and at the same time be light, suitable for landing machine.
      After 10 years, almost simultaneously, the rivals gave the finished product. The Americans are a light M-8 tank equipped with a 105 mm M-35 cannon. Ours - self-propelled anti-tank gun 2C25 "Octopus - SD" with 125 mm smoothbore gun 2A75.
      Octopus ”- an 18-ton unique landing vehicle designed to destroy enemy tanks, floating, and most importantly, capable of firing afloat at any angle of rotation of the tower.


      The M-8 tank also weighs 18 tons and has a 105 mm gun, which was subsequently used in the modifications of the M-1 tank.

      1. Ascetic
        Ascetic April 17 2013 09: 14 New
        +6
        But here is the trouble. The tank still had to be taught how to swim and shoot. It was taught to swim with grief in half, but a miss came out with shooting. When fired with the slightest turn of the tower, he hid a cannon with a tower under water and showed everyone the tracks.
        How will our constructor judge? He will by all means lower the center of gravity and smear the machine (increase its area and reduce height), using all his imagination for this. The Americans leave everything as it is and hire a smart company, make up a mathematical model of the tank, then rent a supercomputer and take a short look at this model. According to the result, the placement of aggregates is adjusted, forgetting that the mathematical model was made by the same digitized guys as they were. As a result, the tower was taught to turn around by 20 degrees and that's it. Realizing that this was a failure, they corrected the technical characteristics of buoyancy on water barriers up to one meter in the blue eye. Five years later, they generally declared that it was an experiment and closed the program. A good experiment with a length of 15 years.
        To say that we did not have such problems, it is impossible - there were some more. After all, our gun was used much more powerful than the American one. About computers (not even super) then had no idea at all - the most advanced technique was a programmable calculator. In short To achieve the goal, a large-scale model was made, which was lowered into the pool, where it was swinged and balanced. Sometimes they even rocked with a foot (not from a good life). Of course, everything depended on the talent, the eye and the quick wit of the engineer working with the model (this is like a virtuoso musician). The result is obvious.
        The most interesting thing happened at one of the exhibitions in Europe - I know this from the lips of our director. The head of United Defense approaches him with his retinue, shakes hands, congratulates him on his success, and asks a unique question. What mathematical model did you use to balance the machine like that? Our director suddenly realizes that he cannot tell the truth to the American. Not because it’s a secret, but because the American simply won’t believe him - he’s not able to believe the story about the pool and the model swinging with his foot. The director thought, made a serious face and said that it was a state secret so far. Oddly enough, the American was delighted. Said, "Oh, I understand you!" And he left satisfied, with the understanding that the Russians have a secret mathematical model. They just have programmers a little better than in America! The American needed an explanation, and having received it, he calmed down ...
        link

        In any case, this story proves that, to put it simply, it is unacceptable to skew to the side. autonomous combat systems and control, excluding the human factor. It is also unacceptable and criminal to underestimate the robotic technology of warfare. We need a "golden mean". that is, automated weapon control systems where the human factor plays the main role and not a supercomputer or a programmed robot. Complete digitalization of thinking is not always as beneficial as yogurt.
  4. svp67
    svp67 April 17 2013 07: 39 New
    +4
    Quote: Vanek
    I still insist that NATO and the United States will not be able to wage a normal, offensive war. They can’t !!!


    What kind of war do you call NORMAL? The methods and techniques of warfare have recently undergone tremendous changes, which, in principle, is not surprising, and not to notice this is to doom yourself in advance to defeat. 08.08.08. The "Georgian side" tried to "play" according to the "new" rules, but it did not work out. But not because the method itself is bad, but rather the "player" who tried to play by the "new rules" turned out to be bad.
    But if our army and the state as a whole wants to win, then it is necessary not only to evaluate everything that has appeared new, but also to develop new methods ourselves. And the main thing is to teach the army to fight "in a new way", providing it with both weapons and all other the highest "world standards." And it is better to become their "legislators"
  5. Fl000d
    Fl000d April 17 2013 08: 03 New
    +2
    Everything changes, and such methods are more effective than physical, "contact" ones, because a spiritually and morally broken enemy, by definition, is not able to resist. But, IMHO, this cannot be called humane methods, as some believe :)
  6. Canep
    Canep April 17 2013 09: 59 New
    +1
    The Americans must be beaten, and beat them with their own weapons, with all the inherent Russian collective farm savvy.
  7. Gorchakov
    Gorchakov April 17 2013 11: 39 New
    +2
    The Russian people are smart people ... not a couple of Western pederasts ... We will understand ...
  8. elmi
    elmi April 17 2013 12: 10 New
    +3
    You don’t have to go far for examples - an Internet attack on Estonian portals when there was a confrontation for a bronze soldier, albeit at an amateur level, but the attacks were spectacular
  9. gregor6549
    gregor6549 April 17 2013 14: 51 New
    0
    Another nonsense. No network-centric wars. There are and will be wars in which data exchange is used at various levels of command and control of the aircraft and between these levels providing a more efficient use of traditional means (small arms, aviation artillery, ships, etc.). The concept of a network is also very arbitrary, since information networks in war conditions is a variable concept. You’ve just been online and in a minute already alone because the whole network was covered with a copper basin.
    1. Fl000d
      Fl000d April 17 2013 16: 11 New
      0
      What is it: 'if I don't know this, then this is not present'? Or rejection of innovation?
      1. gregor6549
        gregor6549 April 18 2013 15: 07 New
        0
        What innovations and what ignorance are we talking about? I just know what I'm talking about, since I devoted more than 30 years of my life to the creation of ACCS for various purposes, on which the newfangled concept of "network-centric wars" is built. And I saw how vulnerable these networks are both from various types of organized interference, and from EMP and from the elementary unreliability of individual nodes and channels of the network and from the insufficient literacy of those who work on these ACCS. And this vulnerability has been demonstrated more than once during various exercises, tests and local conflicts. And how many times did the same hackers penetrate the most secure information networks of various countries and these countries could not do anything with these intrusions, despite the fact that both the time and resources to protect information networks from unauthorized access are released immeasurably. It should be borne in mind that the case has not yet reached the full-scale use of interference, EMP, hacking and other "dirty tricks". So innovation is, of course, a good thing, but you shouldn't forget about reality either. And the reality is that with a 90% probability, all centralized cyber networks will crumble into many autonomous cells in the first half hour after the start of a full-scale war between highly developed countries. And a little later, these cells will order to live a long time and you will have to forget about all kinds of network-centric wars.
  10. Vtel
    Vtel April 17 2013 15: 05 New
    0
    If not for the "Fifth" column, we would have drones at least a dime a dozen. And then RUSNANO is controlled by the "red" Fox, Skolkovo - by Vekselberg, and they are so "cool" that they are "respected" from the West. Skolkovo has just begun to be built, so all Western companies - come visit, we are so happy to give our Western investors everything that our minds come up with. Like - you already keep an eye on us, otherwise we will do something like that. It will not seem a little to you, so they rub against us "benefactors".
  11. dizelniy
    dizelniy April 17 2013 20: 33 New
    0
    Valery. armed confrontation of states can be detailed without limit. It is necessary to distinguish between the actual armed confrontation and the military policy of the state, including economic, technical, political, social and other components of the country's daily life. The terms used by the author of the article do not correspond to the military strategy of Russia and the meaning of the combat units of the types of the armed forces of the Russian Federation. The applied term of network-centric wars is an introduced concept that does not reflect the essence of armed confrontation between states. losing its original meaning.