Thursday, June 5, 2025
Advertise with us
Support us
Write for us
No Result
View All Result
claws
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
No Result
View All Result
CLAWS
No Result
View All Result
Home Intern Articles

Book Review | The Next World War: Computers Are the Weapons & Front Lines Everywhere

Ratnadityasinh ChavdabyRatnadityasinh Chavda
July 5, 2021
in Intern Articles
A A
0
Post Views: 68

The Next World War: Computers Are the Weapons & Front Lines Everywhere

The constant characteristic of the information environment has been one of cataclysmic change, driven by a seismic shift from the wired to the wireless worlds. James Adam’s effort to highlight how future battlefields will be dominated by bytes, not bullets, is reflected in his work, ‘The Next World War’. The primary focus of the book has been to freeze the debate that has been raging since the end of the Cold War. [1]  A world defined less by the equalizing influence of the constantly looming fear of Mutually Assured Destruction (MAD)[2], and more by the war in the ‘infosphere’. (Adam, 1998) According to Catherine A. Theohary, Information Warfare is defined as an activity undertaken by government groups or individuals to gain electronic access to information systems in other countries as well as activities undertaken to protect their information infrastructure. To embrace the work of the intelligence communities, the government, and those serving on the front lines, the author has adopted the broader definition of ‘information, and ‘warfare’. James Adam, in his conception of information warfare, has broken the term into three parts. The first is Perception Management, where information is the message. The second is Systems Destruction, where information is the medium. Lastly, Information Exploitation, where the information is a resource for the opponent to exploit. (Adam, 1998)

James Adam takes the reader on a comprehensive and illuminating tour of micro-electro-mechanical systems, non-lethal weapons, and instantaneous communications. The author takes the example of US peacekeeping missions in other countries. The first amongst these is the Gulf War where the first noted use of the techniques of information warfare that began with Operation Desert[3] Storm was implemented when control of the electronic spectrum created an insurmountable imbalance between the combatants. Moving on, the author takes the example of Somalia- a watershed moment in American foreign policy, Haiti and Bosnia. (Adam, 1998) These cases demonstrate the power of information not merely as a force multiplier but as a paradigm shifter. At the onset, I strive to shed light on the distinct features of the book and the important topics that it covers. Moving on, I focus on the drawbacks of the book.

The burgeoning use of information warfare questions the applicability and influence of theories of warfare propounded by intellectual heavyweights such as Sun Tzu and Carl von Clausewitz. Clausewitz has been an iconic figure in the United States military. While Clausewitz’s core belief that ‘war is politics by other means’ has stood the test of time, his theory seems outdated and redundant. Martin Van Creveld, a military scholar at the Hebrew University in Jerusalem, believed that from the end of the Second World War, Clausewitz became all the more irrelevant because his theory was centred around the ‘Wonderful Trinity’ of government, military, and people. Clausewitz’s traditional view held relevance until 1945 when fighting that engulfed Europe saw nations face each other on battlefields.[4]

Since the expanding use of information warfare, there has been an increasing focus on the writings of Sun Tzu from 500 BC. While Sun Tzu doesn’t exactly point to information warfare, he does lay out a framework that underscores the importance of information and knowledge. Sun Tzu writes, ‘Know the enemy and know yourself.[5] Sun Tzu’s use of words like, ‘know’ and ‘ignorant’ correlate neatly with concepts such as information, knowledge, and understanding. Sun Tzu’s work led to the realization that data could be converted into information, and that information could form the basis of a strategy and knowledge. Ultimately, this knowledge could be the building blocks of a predictive understanding of the battle. ( Adam, 1998)

Moving away from the ideology that defines warfare, the author goes on to shine a light on the technological advances and changes that have taken place. James Adam calls attention to two specific aspects that emanate from the information revolution. The first is the ability to make decisions faster and more efficiently while at the same time destroying the enemy’s ability to make decisions. ( Adam, 1998). The second is to move the soldier further away from the point of contact with the enemy while making the firepower that the soldier can deliver much more intense and accurate. In light of these underlying principles, the United States military has taken a substantial leap forward. While it may seem fictitious to think of re-engineered 707’s, militarised ants, and camouflage suits made of exoskeletons, the reality is however not too different. Drawing on the use of the ‘Land Warrior’, and the ‘Applique’, the author demonstrates how far the United States has come from the Cold War days and how instrumental have these technologies been in altering the face of warfare, based on the key principles highlighted above. But the question still stands amidst the rubble and dust of war, is it truly bytes and not bullets that pack the greatest punch? There is no denying that taking electronics out of information and warfare reverts to the days of runners, signal flags, and scraps of paper. ( Adam, 1998) However, despite the significant strides that have been made in this area, there persist several shortcomings. The United States Military for the first time tested Land Warrior and Applique in the field in March 1997 during an Advanced Warfighting Exercise at the Army’s National Training Center, Fort Irwin, California.

Having reflected on Soviet information machinery, James Adam in his conclusion shines a light on what information warfare means to the West. The end of the Cold War has strategically altered the playing field. Moreover, the disintegration of the Soviet block has left NATO struggling to find an identity. The author compares America post the cold war to the French Republic in 1871. Comparisons of the two military giants throw up lessons that can be learned. Across the world, ancient ethnic tensions that once were held in check by the overarching geopolitical imperative of the superpower rivalry are now causing conflicts in countries as diverse as Somalia and Bosnia. From a global perspective, the author notes that as a result of the information revolution, the fragile control that nations have over their people have begun to disintegrate as the concepts of country, loyalty, and national identity have eroded in the face of a promise of a different world where no such convenient restraints exist. ‘Dulce et decorum est pro portia mori’, is no longer the dictum governing a soldier’s behavior. This can partially be attributed to the lack of leadership ( Adam, 1998)  Through these distinct and precise points, James Adam has been successful in highlighting how the military establishment is falling behind the information curve.

There is no doubt that the author has scripted a masterpiece. However, as a reader, I felt that there were a few aspects that have been ignored and would have amplified the value of the book. The author has focused on military developments that have altered the face of battle but has failed to show how technology acting as a force multiplier has fuelled and driven this change.  The increasing importance of information runs parallel to advances in technology. Martin van Creveld believes that war is completely permeated by technology and governed by it. [6]Considering that computers are becoming more commonplace and that they are increasingly tied together via networks, it is important to consider how this affects the conduct of war and inter-state engagement.

Traditional warfare has been defined through the principle of ‘pacta sunt servanda’ of conventional international law and the consistent practice of customary international law. (Greenberg et al., 1998) However, as information warfare has taken war out of the physical, kinetic realms and brought it into an intangible, electronic one, it has become difficult to define, restrict and control the use of informational warfare through practices of international law. Three primary ways are burgeoning use of information warfare challenges in international law. The first amongst these is the intangible damage that such attacks cause may be different from the physical damage caused by traditional warfare. (Greenberg et al., 1998) Secondly, the ability of signals to travel across international networks or through the atmosphere challenges the concept of national and territorial sovereignty. Lastly, it is difficult to define targets of information warfare as military or civilian. (Greenberg et al., 1998)

In light of these points, the question remains how one can restrict and more importantly define the activities under the broad ambit of information warfare. A multilateral treaty is the most viable option. However, even with this, the problem remains of determining what international legal principles concerning informational warfare are likely to best serve long-term national interests. James Adam through his work has established that advances in information and communications technology have had unprecedented consequences on the very nature of warfare. War has been distinctly revolutionary owing to several factors brought about by the increasing use of information warfare. James Adam’s work has acted as a suitable reflection on information warfare as perceived by government and society. Citizens are shaping their ability to use information, for good and evil. Creating essentially an ‘electronic democracy’. James Adam has also importantly highlighted that information warfare is as much about attitude as about ammunition, as weapons were only a part of the picture. Rushing headlong into a gleaming technology-driven future without any guiding philosophy of leadership renders the giant vulnerable. (Tenet, 2004)

Endnotes:

Adam , J. (1998). Introduction . In The Next World War: Computers Are the Weapons & the Front Line is Everywhere. (Vol. 1, pp. 13–18 ). essay, Simon and Schuster, Inc. .

Adam , J. (1998). War in the Infosphere . In The Next World War: Computers Are the Weapons & the Front Line is Everywhere. (Vol. 1, pp. 22–34). essay, Simon and Schuster, Inc. .

Adam , J. (1998). March of the Revolutionaries . In The Next World War: Computers Are the Weapons & the Front Line is Everywhere. (Vol. 1, pp. 93–101). essay, Simon and Schuster, Inc. .

Adam , J. (1998). From Double Tap to Double Click. In The Next World War: Computers Are the Weapons & the Front Line is Everywhere. (Vol. 1, pp. 105–121). essay, Simon and Schuster, Inc. .

Adam , J. (1998). The New Arms Race. In The Next World War: Computers Are the Weapons & the Front Line is Everywhere. (Vol. 1, pp. 233–244). essay, Simon and Schuster, Inc. .

Adam , J. (1998). Conclusion. In The Next World War: Computers Are the Weapons & the Front Line is Everywhere. (Vol. 1, pp. 305–313). essay, Simon and Schuster, Inc. .

Tenet, G. (2004). Global Information Assurance Certification Paper. GIAC Certifications. https://www.giac.org/paper/gsec/3873/information-warfare-cyber-warfare-future-warfare/106165.

Greenberg, L. T., Goodman, S. E., & Soo Hoo, K. J. (1998). Information Warfare and International Law. http://www.dodccrp.org/files/Greenberg_Law.pdf. http://www.dodccrp.org/files/Greenberg_Law.pdf.

Joyner, C. C., & Lotrionte, C. (2001). Information Warfare as International Coercion: Elements of a Legal Framework. . European Journal of International Law , 12(5), 825–865.

[1] Adam , J. (1998). Introduction . In The Next World War: Computers Are the Weapons & the Front Line is Everywhere. (Vol. 1, pp. 13–18 ). essay, Simon and Schuster, Inc

[2] Principle of deterrence founded on the notion that a nuclear attack by one superpower would be met with an overwhelming nuclear counterattack such that both the attacker and the defender would be annihilated.

[3] The Gulf War was a war waged by coalition forces from 35 nations led by the United States against Iraq in response to Iraq’s invasion and annexation of Kuwait arising from oil pricing and production disputes.

[4] Creveld, M. van. (1990). Technology and War, Martin Van Creveld. 1988. Free Press (The Macmillan Co.), New York. 304 pages. ISBN: 0-02-933151-X. $22.95. Bulletin of Science, Technology & Society, 10(1), 47–48. https://doi.org/10.1177/027046769001000139

[5] Tipton, H. F., & Krause, M. (2007). Information Security Management Handbook, Sixth Edition (6th ed.). CRC Press.

[6] van Creveld, M. (1991). The Clausewitzian Universe and the Law of War. Journal of Contemporary History, 26(3), 403–429. https://doi.org/10.1177/002200949102600304

Tags: Bio-TechnologyBook ReviewCyber SecurityDefence StrategyGlobal SecurityHybrid-WarfareIndia’s National Security ChallengesInformation WarfareInternal SecurityMilitary Doctrine & StrategyMilitary ModernisationMilitary StrategyMilitary TechnologyMilitary Technology - Space & CyberMilitary-Technology and Defence AcquisitionNew TechnologyPLAAF Military DiplomacyWest Asia
Previous Post

07/07 | Invite for Book Release | The Concept of Active Defence in China’s Military Strategy

Next Post

Israel-Palestine Relations: Complexities and Challenges

Ratnadityasinh Chavda

Ratnadityasinh Chavda

Next Post

Israel-Palestine Relations: Complexities and Challenges

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Support Us Donate Now

Web Updates

List of Shortlisted Officers / Candidates: PhD Batch – 7

Field Marshal Manekshaw Essay Competiton 2025

Guidelines to Publish with CLAWS

Summer Internship Capsule 2025

Application Form – Study Mtrl for DSSC 2025

[NEW] Application Form for membership for PROMEX (PART B or D)

  • Trending
  • Comments
  • Latest

Summer Internship Capsule 2025

April 8, 2025
Pahalgam Response: Why India Must Fight Smart?

Pahalgam Response: Why India Must Fight Smart?

May 2, 2025
Results | Field Marshal Manekshaw Essay Competition – 2024

Results | Field Marshal Manekshaw Essay Competition – 2024

April 2, 2025
Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

May 21, 2025

Front Organisations: The Valley’s Homegrown ‘Resistance’ or Pakistan’s Evolving Terrorism Tactics?

2
RISING TENSIONS IN KATHUA

RISING TENSIONS IN KATHUA

1
The Art of Negotitations Three Day Capsule Course | 07th – 09th May

The Art of Negotitations Three Day Capsule Course | 07th – 09th May

1
Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

1
Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

May 31, 2025
Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

May 31, 2025

List of Shortlisted Officers / Candidates: PhD Batch – 7

May 30, 2025

Popular Stories

  • Summer Internship Capsule 2025

    0 shares
    Share 0 Tweet 0
  • Pahalgam Response: Why India Must Fight Smart?

    0 shares
    Share 0 Tweet 0
  • Results | Field Marshal Manekshaw Essay Competition – 2024

    0 shares
    Share 0 Tweet 0
  • Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

    0 shares
    Share 0 Tweet 0
  • Field Marshal Manekshaw Essay Competiton 2025

    0 shares
    Share 0 Tweet 0

About us

CLAWS

The Centre for Land Warfare Studies (CLAWS), New Delhi, India is an independent think tank on strategic studies and land warfare. The mandate of CLAWS covers national security issues, conventional military operations and sub-conventional warfare.

Follow Us

Browse by Category

  • Articles
  • Autumn 2019
  • Autumn 2020
  • Books
  • CLAWS Focus
  • CLAWS Journal
  • Essay
  • Events
  • External Publications
  • FMMEC
  • Intern Articles
  • Issue Briefs
  • Jottings by Director General Emiritus
  • Manekshaw Papers
  • Newsletter
  • Round Tables
  • Scholar Warrior
  • Seminars
  • Uncategorized
  • Web Updates
  • Winter 2019
  • YouTube Podcast

Recent News

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

May 31, 2025
  • Site Map
  • Tenders
  • Advertise With Us
  • Terms of use
  • Privacy Policy
  • Other Think Tanks

© 2008-2024 Centre for Land Warfare Studies (CLAWS).

No Result
View All Result
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact

© 2008-2024 Centre for Land Warfare Studies (CLAWS).