{"id":7659,"date":"2021-04-16T11:17:17","date_gmt":"2021-04-16T14:17:17","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7659"},"modified":"2021-04-16T11:17:17","modified_gmt":"2021-04-16T14:17:17","slug":"reclutamiento-y-entrenamiento-militar-para-las-nuevas-amenazas","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7659","title":{"rendered":"Reclutamiento y entrenamiento militar para las nuevas amenazas"},"content":{"rendered":"<p>Hoy en d\u00eda, cualquier persona con acceso a una computadora o un dron est\u00e1ndar puede causar un da\u00f1o tan significativo como el armamento convencional, mientras que al mismo tiempo no provoca una respuesta convencional ni es reconocido como un acto formal de agresi\u00f3n.\u00a0Adem\u00e1s, estos actores tambi\u00e9n son m\u00e1s dif\u00edciles de identificar que los enemigos convencionales.\u00a0Para las organizaciones militares, defenderse de las amenazas emergentes de la zona gris significa asegurarse de que su personal tenga el conocimiento y las habilidades que coinciden con los de los posibles actores de amenazas.\u00a0Esto requiere un cambio de mentalidad en el proceso de contrataci\u00f3n. A medida que se expande la gama de habilidades y roles necesarios en una organizaci\u00f3n militar, la red debe ampliarse para reclutar a una generaci\u00f3n nativa digital que puede no considerar el sector de defensa como el hogar natural para su conjunto de habilidades.<\/p>\n<hr \/>\n<section id=\"miliary_trainig_grey_zone_intro\" class=\"area  area-section   \" data-name=\"section\" data-template=\"section\" data-area-name=\"intro\">\n<div class=\"append-here\">\n<section id=\"miliary_trainig_grey_zone_text-5\" class=\"area  textbox  style_TEXT_2020_bodytext_comment \" data-name=\"text\" data-template=\"text\" data-area-name=\"text-5\">\n<section data-elkey=\"textbox\" data-html-edit=\"textbox\">The democratisation of technology has made it possible for society to navigate seismic shocks like those seen during the Covid-19 pandemic, but for those in defence, it presents new challenges in the form of the rise of hybrid or grey zone warfare.<\/p>\n<p>This battleground is one in which the weapons are not the conventional rifle or tank, but rather cheap computers which give bad actors the ability to inflict considerable economic and physical damage on their targets.<\/p>\n<p>Nowadays, anyone with access to a computer or an off-the-shelf drone can cause as significant harm as conventional weaponry, while at the same time not provoking a conventional response or being recognised as a formal act of aggression. In addition, such actors are also harder to identify than conventional enemies.<\/p>\n<p>The weaponisation of everyday technologies is blurring the lines between the skills applied and tools used by those within and outside the military, often combining both. Take cyberattacks, for instance. In the civilian world, they can bring a small business to its knees. On the military side, the Royal Navy is preparing for the HMS Queen Elizabeth to come under various cyberattacks as it sails towards China on its maiden voyage this year.<\/p>\n<p data-elkey=\"headline\" data-html-edit=\"headline\">While the tools and skillsets behind these threats are the same, the distinction of what is a military skill and what is not presents a major challenge to the defence sector.<\/p>\n<p data-elkey=\"headline\" data-html-edit=\"headline\"><strong>Changing mindsets to meet new threats<\/strong><\/p>\n<\/section>\n<\/section>\n<\/div>\n<\/section>\n<section id=\"miliary_trainig_grey_zone_body-1\" class=\"area  area-section   \" data-name=\"section\" data-template=\"section\" data-area-name=\"body-1\">\n<div class=\"append-here\">\n<section id=\"miliary_trainig_grey_zone_text-6\" class=\"area  textbox  style_TEXT_2020_bodytext_comment \" data-name=\"text\" data-template=\"text\" data-area-name=\"text-6\">For military organisations, defending against emerging grey zone threats means ensuring their personnel have the knowledge and skillsets matching those of potential threat actors. This requires a change of mindset in the recruitment process.<\/p>\n<p>As the range of skills and roles needed in a military organisation expands, the net must be cast further to recruit a digitally native generation who may not regard the defence sector as the natural home for their skillset. Recruiters must convince potential candidates that a job in the defence sector is a worthwhile career choice, as they will be competing directly for recruits with fintechs and other technology sectors that can offer huge salaries.<\/p>\n<p>However, the tech talent pool in the UK may not be ready to meet the demand. Research from recruitment firm Robert Walters Group found that the pandemic has put pressure on demand, with 58% of hiring managers putting information security as their most required skill, while only 10% of IT professionals have the skills needed to fulfil the roles.<\/p>\n<p data-elkey=\"headline\" data-html-edit=\"headline\">With a small talent pool, the focus must also be put on a second approach: targeted investment into reskilling current personnel to give them the tools needed to counter emerging threats. This means mindsets in military training also need to shift.<\/p>\n<p data-elkey=\"headline\" data-html-edit=\"headline\"><strong>Train like you fight<\/strong><\/p>\n<\/section>\n<\/div>\n<\/section>\n<section id=\"miliary_trainig_grey_zone_body-2\" class=\"area  area-section   \" data-name=\"section\" data-template=\"section\" data-area-name=\"body-2\">\n<div class=\"append-here\">\n<section id=\"miliary_trainig_grey_zone_text-8\" class=\"area  textbox  style_TEXT_2020_bodytext_comment \" data-name=\"text\" data-template=\"text\" data-area-name=\"text-8\">\n<p data-elkey=\"textbox\" data-html-edit=\"textbox\">The linear process of \u2018train \u2013 deploy \u2013 return \u2013 train again\u2019 no longer matches the constant nature of grey zone campaigns or the unpredictability of their impact. Training should be a constant process, not a set piece of timed activity.<\/p>\n<p>Defence and security forces need to continuously adapt to changes in the environment and incorporate new skills into the way they operate. Critical training should take place during deployment to shorten the timeframe for achieving the maximum strategic effect. This is particularly important when force numbers are reduced but the strategic effect needs to be maintained.<\/p>\n<p>Secondly, a wider spread of learning and development tools is needed to make the most of emerging technologies including mixed reality, AI and autonomy. This is increasingly necessary as defence and security forces will be training across multiple generations and incoming personnel are likely to be more comfortable with new digital ways of learning.<\/p>\n<p>It also enables a shift from basic \u2018muscle memory\u2019 training to more cognitive training, which in turn enables individuals to shift more easily between traditional fighting skills to those required for effective protection, deterrence, assurance and civil support.<\/p>\n<p data-elkey=\"headline\" data-html-edit=\"headline\">Finally, training should be more collaborative. Regular training with allies reinforces the message of how powerful integrated responses can be and provides a visible deterrent for adversaries no matter what novel tactics they may be exploring for grey zone conflict.<\/p>\n<p data-elkey=\"headline\" data-html-edit=\"headline\"><strong>Navigating the expanding grey zone<\/strong><\/p>\n<\/section>\n<\/div>\n<\/section>\n<section id=\"miliary_trainig_grey_zone_body-3\" class=\"area  area-section   \" data-name=\"section\" data-template=\"section\" data-area-name=\"body-3\">\n<div class=\"append-here\">\n<section id=\"miliary_trainig_grey_zone_text-9\" class=\"area  textbox  style_TEXT_2020_bodytext_comment \" data-name=\"text\" data-template=\"text\" data-area-name=\"text-9\">\n<section data-elkey=\"textbox\" data-html-edit=\"textbox\">The increasing speed at which new consumer technologies now move to market continues to lower the bar for entry for potential grey zone actors, and we are likely to see a growing number of individuals with the capabilities and technology to act within the grey zone. There is really no limit to the potential growth of the grey zone. What\u2019s more, it\u2019s becoming increasingly clear that we are set to see both state and non-state actors become willing to operate within it to achieve their goals.<\/p>\n<p>The British Armed Forces have already begun their immediate response to the new forms of battle, as Royal Marine commandos begin to deploy on covert missions overseas with the specific task of operating in the space between peace and war to disrupt enemy activity.<\/p>\n<p>Nevertheless, a further cultural shift is needed and can be achieved by establishing a recruitment and training framework that ensures personnel are prepared for grey zone threats. While in the short term tactical recruitment will go some way to helping, in the long term, the necessary capabilities can only be delivered through a focussed and modernised training programme.<\/p>\n<\/section>\n<\/section>\n<\/div>\n<\/section>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/defence.nridigital.com\/global_defence_technology_apr21\/miliary_trainig_grey_zone\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/defence.nridigital.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hoy en d\u00eda, cualquier persona con acceso a una computadora o un dron est\u00e1ndar puede causar un da\u00f1o tan significativo como el armamento convencional, mientras&hellip; <\/p>\n","protected":false},"author":1,"featured_media":7660,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7659"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7659"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7659\/revisions"}],"predecessor-version":[{"id":7661,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7659\/revisions\/7661"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/7660"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}