In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This article discusses various asymmetries associated with institutions, nations and organizations that influence the ICT-national security nexus. Regulative, normative and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries. Integrative approaches that combine policy and technological measures at various levels are likely to make the world more secure.
Information and communications technologies (ICTs) play a critical role in the national security game (e.g., English, 2005, Metz, 2001 and Zhou, 2005). The vulnerability to threat as well as the capability to strategically deploy ICTs vary across entities. The characteristics of organizations, nations and institutions superimpose in a unique interaction with ICTs' nature that influence the ICT-security nexus.
The focus of this paper is on asymmetry (see Table 1 for definitions of terms) associated with ICTs from the perspective of national security. Asymmetry created by ICTs (more broadly: technologies) is among six forms of asymmetry identified by Metz and Johnson (2001). Nations and organizations can exploit asymmetric advantages by strategically employing ICTs in war against enemies (e.g., cyber attacks) as well as by using ICTs in facilitating other functions contributing to attack and defense such as communications, detection of threats from enemies, gathering intelligence, etc. The Internet as well as non-Internet ICTs such as wireless telephony, satellite TV, satellite phones and supercomputers can be employed in the management of asymmetries Thefocusofthispaperisonasymmetry(see
Table 1
fordefinitionsofterms)associatedwithICTs
from the perspective of national security. Asymmetry created by ICTs (more broadly: technologies)
is among six forms of asymmetry identified by
Metz and Johnson (2001)
. Nations and organizations
can exploit asymmetric advantages by strategically employing ICTs in war against enemies (e.g.,
cyber attacks) as well as by using ICTs in facilitating other functions contributing to attack and
defense such as communications, detection of threats from enemies, gathering intelligence, etc. The
Internet as well as non-Internet ICTs such as wireless telephony, satellite TV, satellite phones and
supercomputers can be employed in the management of asymmetries (see
Table 2
).
In the history of warfare, there are several examples
1
of strategic uses of asymmetric
technologies (
Metz, 2001
) that have provided
b
a decisive advantage over an opponent in
combat
Q
(
Rosenberger, 2005
). Consistent with history and theory, organizations and nations
have spotted opportunities to employ ICTs to gain and exploit asymmetric advantages and to
counter asymmetric weaknesses. For instance, in the Iraq war, powerful ICT tools such as
Analyst’s Notebook allowed U.S. investigators to convert huge amount of data into actionable
intelligence. The intelligence helped to track the wanted Iraqis. Analyst’s Notebook also helped
to trace the creator of
b
love bug
Q
computer virus of 2000 (
Yousafzai and Hirsh, 2004
). U.S.
military and intelligence officials are using the same technology to track Osama Bin Laden’s
network. Bin Laden’s network, on the other hand, has been reportedly using symmetric and
asymmetric technologies
2
including satellite phones, the Internet and advanced encryption
methods to recruit followers, raise money, formulate plans and operations and to communicate
securely (see
Box 1
).
The objective of this paper is to explore the nature of ICT-related asymmetries of
organizations, nations and individuals that influence national security. The remainder of the
paper is structured as follows: The next section discusses some positive and negative
asymmetries that ICT tools can create. Then, we develop some propositions on institutional
and organizational factors linked with positive and negative asymmetries. Finally, we provide
managerial and policy implications and suggest directions for future research.