Since the culmination of the Cold War era, the use of military influence in a multi-polar world has become progressively complicated. Strategy, operational activities, and technology have become key matters in the debate over the role of the armed forces . Subscribers to this theory analyse the ways in which the Forces are deployed, notwithstanding the fact that their essential aim, to fulfil national policy, remains unchanged. In the last twenty years or so of the twentieth century and in the beginning of this century, we have seen insightful changes which altered our perception of the nature of forthcoming wars and conflicts and the structure and mechanisms for their resolution. The industrial-age wars have given way to a new kind of war revealed during the Gulf War of 1991and the operations of the final decades of the last century. Future wars will surely be dominated by information technology along with joint and integrated operations.
The 21st Century is witness to unprecedented revolution in the field of IT. Modern means of communication have turned the world into an integrated and seamless network of information. The recent telecom revolution has also dramatically catapulted Communication and IT fields to centre stage of national activities. Defence Services remain one of the largest users of Communication systems, spectrum and Infrastructure in any country. Each service is gaining technological advancement both in equipment and communication. However, these capabilities are working in isolation and are not interwoven together, to harmonise their full potential .
In the old ways (before ICT being widely used), the defence industry was synonym with dumb bombs, people-centric battlefields management, aftermath combat review, land and sea superiority, and hardware-based force multipliers.
The Internet brought something slightly different from the original telephone networks. These new networks now carry multimedia information (voice, database, text, and video) using satellites and microwave systems in addition to the traditional cable systems. There are an increasing number of automated systems in which machines communicate with machines with minimal human intervention. These “machines” control electric power systems, communications and a large number of tasks in factories or wherever easy and repetitive tasks are involved. Although these tasks are easy and repetitive, they are often vital. If one of these machines makes or if it is sabotaged, a whole city can be without power, a telephone network can become inoperable in a large area, or a bank can be without power, a telephone network can become inoperable in a large area..
This situation has contributed to the increasing importance of information warfare. If a person has the chance to access one of these “robots”, he or she can often neutralize its decision-making process. That, of course, will not directly cause anyone’s death, but the fact of the matter is that military systems use several of these automated systems. For example, it is estimated that 90% of military communications use commercial data connections. The individual user, the banking system and DoD all use the same telephone lines. Although most of the data is sent from a machine to another with no human intervention, it is possible to interfere in the process if we are able to access the system. We can use secret codes to send data, but these codes can be broken. Any computer network user is vulnerable.