It was not until the late 19th and early 20th century that weaponry advanced in leaps and bounds to the armaments mankind witnesses today, however even then industry was relatively independent of the government and military. World War I and World War II were two important factors that led to the consequent military-industrial complex. Eric Hobsbawm in his book Age of Extremes outlines how categorically countries like Japan, USA and Russia had to develop their own military industry to support their militaristic efforts,5 creating a complex whereby the economies then straddled on this arms industry. Consequently, the procurement of missiles, ballistics, nuclear weapons, destroyers and submarines shows a marked difference between the ancient acquisitions of countries.
At the dawn on the 21st century, the world has seen an emergence of digital equipment in the use of warfare, spanning from satellite surveillance systems all the way to dedicated agencies such as United States Cyber Command fully equipped with thousands of professionals manning computers on a 24/365 basis in order to prevent a cyber attack.
The use of computers has long been an essential tool in warfare, however as warfare moves from the traditional frontiers of land, sea, air and space to "cyber space" the use of computers is becoming not only essential but vital. Gregory Rattray, author of Strategic Warfare in Cyberspace, explains how the history of warfare in the Information Age is far reaching and is well beyond military operation including financial crime and economic espionage.6 The history of this cyber warfare shows that it crosses global boundaries and encompasses political agendas, attacks on the USA such as Titan Rain show an attack from networks and computers situated in China for example. As the age of digital warfare progressed it has become evident that human reliance on technological equipment to monitor essential utilities such as our electricity grids has proven cataclysmic.7 As the threat became increasingly relevant, the emergence of big corporate players on the MDC scene including names such as Symantec, McAfee and traditional defense contractors such as Northrop Grumman and Lockheed Martin,8 as the cyber threat grows so does mankind's reliance on corporate players such as the aforementioned, creating an iron triangle among government, military and these global security corporations.
"Washington Post Official Site - Cyber Operations". Washington Post. Retrieved 2011-03-11. http://projects.washingtonpost.com/top-secret-america/functions/cyber-ops ↩
"Cyber war in the fifth domain". The Economist. 2010-07-01. Retrieved 2010-07-19. http://www.economist.com/node/16478792 ↩
"military digital complex revealed". risky.biz. Retrieved 2010-07-10. http://risky.biz/wapost ↩
"Cyber war shortage threatens US security". NPR. Retrieved 2010-07-19. https://www.npr.org/templates/story/story.php?storyId=128574055 ↩
"The Age Of Extremes, Eric Hobsbawm". www.history.ac.uk. Retrieved 2011-01-01. http://www.history.ac.uk/reviews/review/28 ↩
Strategic Warfare in Cyberspace. Massachusetts Institute of Technology. 2001. ISBN 9780262182096. Retrieved 2011-03-11. 9780262182096 ↩
"Spies hack US electricity Grid". CNET. Retrieved 2009-04-08. http://news.cnet.com/8301-11128_3-10214898-54.html ↩
"Pentagon plans new Cyberspace war command". Reuters. 2009-05-29. Retrieved 2009-05-29. https://www.reuters.com/article/us-security-cyberspace-sb-idUSTRE54S0XQ20090529 ↩