h+ Magazine

Spring 2009

Issue link: http://cp.revolio.com/i/356

Contents of this Issue

Navigation

Page 54 of 71

55 WWW.hPLUSMAgAzIne.CoM SAnCTIoneD ACTIon Chain of command is based on top-down hierarchies in which information and actions are strictly controlled by commanders on the chain. In a network-centric military, information moves much more quickly, and therefore actors lower on the chain are often more informed (or informed more quickly) than their superiors. As a result, rapid actions with no direct sanction are the norm. enter "swarming," which is an algorithmic way to design actions and build-in sanction without the constant and immediate presence of command. brian Friel, in his Spring 2002 government executive article, "hierarchies and networks," describes it as everyone knowing their job, like on a football team — but the moment the ball is in the opposite team's hands, every team member breaks loose and runs them the hell down. In Alexander Kott's book, battle of Cognition: the Future Information- Rich Warfare and the Mind of the Commander, Richard hart Sinnreich, former Director of the Army's School of Advanced Military Studies, writes about the temporal "compression" that happens in today's engagements: attacks "begin more precipitately, transpire more rapidly, and terminate more abruptly than they have for centuries." In such a world, dated information is deadly. Commanders must allow unmediated decisionmaking whereby the swarm, perhaps a squad or a platoon (10 to 50 warriors or so), stays with the prescribed duty up to the point they eyeball the enemy. Then, all at once, and in some variation on a well-drilled choreography, they kill the bad hat with the ball. There's your tactical agility. There's your post-network pack of lions. genDeR, MInD ALTeRATIon, AnD eVeRYThIng eLSe gays in the military. Lesbians in the shipyards. Lesbians who used to be men working the galley: yummy stuff, comrades. As the physical distinctions between men and women grow fuzzy through technology and technique, so do the psychological, sociological, and cultural roles of men and women. because warrior culture relies on very clearly defi ned gender roles, it will be an important transhuman proving ground for gender modifi cation and alteration. Military relationships are overwhelmingly about trust — and it's hard for most to trust another sailor if you can't even tell "what" s/he is. If we have the right to change our gender, to take things even further, maybe we have the right to change our minds neutraceutically or entheogenically. All this opens the possibilities of identities and behaviors that would have traditionally been seen as diffi cult to manage and useless in wartime. You've got to know them to trust them. It's hard to know or trust them when they're all mercurial and post-identity. but, in for a penny we are, and the use for the tools has the requisite built-in buy-in to the ethos of their use. our tools change us, and the same is true for the tools that warriors use. networks are changing command sequences. The wider suite of traditional "transhuman" interests, like information technology, will change military culture. .MIL heADS WITh DeCISIonS To MAKe It is clear that technology is changing people — physically, mentally, and (most pertinent here) culturally. We can't see where we are going, and the military, for all its operative intelligence, is driving forward while looking in the rear view mirror (to borrow a line from McLuhan) like all the rest of us. but well- moneyed militaries (and guerrillas) have an opportunity unlike any other group on earth to create unparalleled destruction and chaos. Most of us grew up in a nihilistic-nuclear-freakout kind of world, and the idea of mechanized auto- extinction is nothing new to mankind in 2009. Perhaps it is through the adoption and mutation of elements from a transhuman world that the military powers may become something altogether new and different. The shape of what it becomes will be determined by whether — and to what extent — the need for organized aggression and defense exists in a post-human world. but the network, the technology, its deployment, and its embodiment — these all have their vulnerabilities too. In fact, they may attract attack. According to Thomas K. Adams, author of The Army After next: the First Postindustrial Army, the "criticality and vulnerability" of lightweight relay/transmission vehicles make it "worth considerable effort" to take out these (often mission- critical) nodes in the network. Whether or not the strengths of networks will counterbalance their emerging weaknesses is a very big question. Maybe we'll answer it before the Singularity, and if not, who'll be around to give a damn anyway? Imagine "terrorism" dripping from our nostrils in the form of black goo — pirated neural nodes fatally overrun by malware. evolving with the viruses may cost more lives than we're willing to offer up. As new strengths and weaknesses develop and establish space in the minds of commanders and their marines, airmen, sailors, and soldiers, new twists on old ways of establishing dominance and trust are likely to develop in the warrior cultures. grudge matches become guitar hero beatdowns. Torpedo Juice drinking games get spiked with hgh. And as genders, machines, and genes get blurred beneath the uniform, "crossing the line" rituals take on new dimensions. The future of the military is in the hands of tomorrow's geek-kids playing Kdice and Tower Defense games, swilling their taurine, and fi guring out what it means to be a man in a world gone emo. They will be the ones hugging the inside track as they speed along the curve toward Singularity. They will be the networked warriors who understand Al Qaeda well enough to, fi nally, burn it completely from the face of the earth. The future of the military is in the hands of tomorrow's geek-kids playing Kdice and Tower Defense games, swilling their taurine.

Articles in this issue

Links on this page

Archives of this issue

view archives of h+ Magazine - Spring 2009