Network-centric warfare

Last updated

Network-centric warfare, also called network-centric operations [1] or net-centric warfare, is a military doctrine or theory of war that aims to translate an information advantage, enabled partly by information technology, into a competitive advantage through the computer networking of dispersed forces. It was pioneered by the United States Department of Defense in the 1990s.

Contents

Background and history

In 1996, Admiral William Owens introduced the concept of a 'system of systems' in a paper published by the Institute for National Security Studies in the United States. [2] He described a system of intelligence sensors, command and control systems, and precision weapons that provided situational awareness, rapid target assessment, and distributed weapon assignment.

Also in 1996, the United States' Joint Chiefs of Staff released Joint Vision 2010, which introduced the military concept of full-spectrum dominance. [3] Full Spectrum Dominance described the ability of the US military to dominate the battlespace from peace operations through to the outright application of military power that stemmed from the advantages of information superiority.

Network Centric Warfare

The term "network-centric warfare" and associated concepts first appeared in the United States Department of Navy's publication, "Copernicus: C4ISR for the 21st Century." The ideas of networking sensors, commanders, and shooters to flatten the hierarchy, reduce the operational pause, enhance precision, and increase speed of command were captured in this document. As a distinct concept, however, network-centric warfare first appeared publicly in a 1998 US Naval Institute Proceedings article by Vice Admiral Arthur K. Cebrowski and John Garstka. However, the first complete articulation of the idea was contained in the book Network Centric Warfare : Developing and Leveraging Information Superiority by David S. Alberts, John Garstka and Frederick Stein, published by the Command and Control Research Program (CCRP). [4] This book derived a new theory of warfare from a series of case studies on how business was using information and communication technologies to improve situation analysis, accurately control inventory and production, as well as monitor customer relations.

The information revolution has permeated the military world as well, with network-centric warfare replacing traditional combat methods. Technology is now at the forefront of battlefields, creating a new era of warfare - network-centric.

It's a new level of communication and coordination through what is known as tactical interoperability. From human soldiers to smart weapon systems, command & control systems, automatic sentry systems, and platforms on land, air, and space - all these elements are seamlessly connected in a single communication fabric, with encompass battle management systems for all services, catering to individuals from General HQs to soldiers on the field.

Understanding Information Age Warfare

Network-centric warfare was followed in 2001 by Understanding Information Age Warfare (UIAW), jointly authored by Alberts, Garstka, Richard Hayes of Evidence Based Research and David A. Signori of RAND. [5] UIAW pushed the implications of the shifts identified by network-centric warfare in order to derive an operational theory of warfare.

Starting with a series of premises on how the environment is sensed, UIAW describes three domains. The first is a physical domain, where events take place and are perceived by sensors and people. Data emerging from the physical domain is transmitted through an information domain. It is processed in a cognitive domain before being acted upon.

The process is similar to a "observe, orient, decide, act" loop described by Col. John Boyd of the USAF.

Power to the Edge

The last publication dealing with the developing theory of network centric warfare appeared in 2003 with Power to the Edge , also published by the CCRP. [6] Power to the Edge is a speculative work suggesting that modern military environments are far too complex to be understood by any one individual, organisation, or even military service.

Modern information technology permits the rapid and effective sharing of information to such a degree that "edge entities" or those that are essentially conducting military missions themselves, should be able to "pull" information from ubiquitous repositories, rather than having centralised agencies attempt to anticipate their information needs and "push" it to them. This would imply a major flattening of traditional military hierarchies, however.

Power To The Edge's radical ideas had been under investigation by the Pentagon since at least 2001. In UIAW, the concept of peer-to-peer activity combined with more traditional hierarchical flow of data in the network had been introduced.

Shortly thereafter, the Pentagon began investing in peer-to-peer research, telling software engineers at a November 2001 peer-to-peer conference that there were advantages to be gained in the redundancy and robustness of a peer-to-peer network topology on the battlefield.

Network-centric warfare/operations is a cornerstone of the ongoing transformation effort at the Department of Defense initiated by former Secretary of Defense Donald Rumsfeld. It is also one of the five goals of the Office of Force Transformation, Office of the Secretary of Defense.

See Revolution in Military Affairs for further information on what is now known as "defense transformation" or "transformation".

German Army Leopard 2A6M that incorporates systems designed to be used in conjunction with a networked battlefield Leo2A6M li.jpg
German Army Leopard 2A6M that incorporates systems designed to be used in conjunction with a networked battlefield

The US DOD has mandated that the Global Information Grid (GIG) will be the primary technical framework to support US network-centric warfare/network-centric operations. Under this directive, all advanced weapons platforms, sensor systems, and command and control centers are eventually to be linked via the GIG. The term system of systems is often used to describe the results of these types of massive integration efforts.

The topic Net-Centric Enterprise Services addresses the applications context of the GIG.

A number of significant U.S. military programs are taking technical steps towards supporting network-centric warfare. These include the Cooperative Engagement Capability (CEC) of the United States Navy and the BCT Network of the United States Army.

Net-Centric Enterprise Solutions for Interoperability (NESI) provides, for all phases of the acquisition of net-centric solutions, actionable guidance that meets network-centric warfare goals of the United States Department of Defense. The guidance in NESI is derived from the higher level, more abstract concepts provided in various directives, policies and mandates such as the Net-Centric Operations and Warfare Reference Model (NCOW RM) and the ASD(NII) Net-Centric Checklist.

Doctrinal tenets in United States

The doctrine of network-centric warfare for the United States armed forces draws its highest level of guidance from the concept of "team warfare", meaning the integration and synchronization of all appropriate capabilities across the various services, ranging from Army to Air Force to Coast Guard. This is part of the principle of joint warfare.

The tenets of network-centric warfare are: [7]

Net-Centric operations are compatible with Mission Command doctrine, which theoretically allows considerable freedom of action for combat troops, [8] [9] and with more decentralized approaches to Command and Control (C2). [10]

Some architectural and design challenges

International activities

There is significant need to harmonize the technical and operational aspects of net-centric warfare and net-centric operations among multiple nations, in order to support coalition activities, joint operations, etc. The NATO Command Structure and many NATO and non-NATO nations have joined the Federated Mission Networking (FMN) initiative and work together under the FMN Framework Process to coordinate the design, development and delivery of operational and technical capabilities required to conduct net-centric operations. Within the Alliance the NATO Interoperability Standards and Profiles (NISP) provides the necessary guidance and technical components to support project implementations and Federated Mission Networking. Individual Standardization Agreements are the coordinating vehicle for establishing shared technical standards among NATO nations.

See also Partnership for Peace for information on extending coordination efforts to non-NATO nations that are keen to support military operations other than war activities, such as international peacekeeping, disaster response, humanitarian aid, etc.

Supporting comments

"With less than half of the ground forces and two-thirds of the military aircraft used 12 years ago in Desert Storm, we have achieved a far more difficult objective. ... In Desert Storm, it usually took up to two days for target planners to get a photo of a target, confirm its coordinates, plan the mission, and deliver it to the bomber crew. Now we have near real-time imaging of targets with photos and coordinates transmitted by e-mail to aircraft already in flight. In Desert Storm, battalion, brigade, and division commanders had to rely on maps, grease pencils, and radio reports to track the movements of our forces. Today, our commanders have a real-time display of our armed forces on their computer screen."

—former Vice President Richard Cheney.

"Net-centric warfare's effectiveness has greatly improved in 12 years. Desert Storm forces, involving more than 500,000 troops, were supported with 100 Mbit/s of bandwidth. Today, OIF forces, with about 350,000 warfighters, had more than 3,000 Mbit/s of satellite bandwidth, which is 30 times more bandwidth for a force 45 percent smaller. U.S. troops essentially used the same weapon platforms used in Operation Desert Storm with significantly increased effectiveness." [11]

Lieutenant general Harry D. Raduege Jr, director, Defense Information Systems Agency.

Contradictory views

"Our incipient NCW plans may suffer defeat by [adversaries] using primitive but cagey techniques, inspired by an ideology we can neither match nor understand; or by an enemy who can knock out our vulnerable Global Positioning System or use electromagnetic pulse weapons on a limited scale, removing intelligence as we have construed it and have come to depend upon. Fighting forces accustomed to relying upon downlinks for information and commands would have little to fall back upon."

Charles Perrow, Information Assurance , National Defense University, May 2003

The aspiration of the Australian Defence Force (ADF) to embrace network-centric warfare is outlined in the document ADF Force 2020. This vision has been criticized by Aldo Borgu, director of the Australian Strategic Policy Institute (ASPI). By developing interoperability with U.S. systems, in his view, the three arms of the Australian Defence Force could end up operating better with their sister United States services than with each other. [12]

Network centric warfare is criticized by proponents of Fourth Generation Warfare (4GW) doctrine.[ citation needed ]

Also, since Network-centric warfare focuses so much on distributing information, one has to be wary of the effect of false, misleading, or misinterpreted information entering the system, be it through enemy deception or simple error. Just as the usefulness of correct information can be amplified, so too can the repercussions of incorrect data entering the system achieve much greater non-positive outcomes.[ citation needed ]

One way that this can happen is through errors in initial conditions in an uncorrected, closed system that subsequently skew result-sets; the result-sets are then reused, amplifying the initial error by orders of magnitude in subsequent generations of result-sets; see chaos theory.[ clarification needed ]

Other possible failure modes or problem areas in network-centric warfare include the occurrence of the Byzantine generals' problem in peer-to-peer systems; problems caused by an inadequate or a shallow understanding of (or general disregard for) self-regulation, self-organization, systems theory, emergent behavior and cybernetics; in addition to this, there are potential issues arising from the very nature of any complex, rapidly developed artificial system arising from complexity theory, which implies the possibility of failure modes such as congestion collapse or cascading failure.[ citation needed ]

See also

Related Research Articles

<span class="mw-page-title-main">Defense Information Systems Agency</span> US Department of Defense combat support agency

The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and contractors. DISA provides information technology (IT) and communications support to the President, Vice President, Secretary of Defense, the military services, the combatant commands, and any individual or system contributing to the defense of the United States.

<span class="mw-page-title-main">United States Joint Forces Command</span> Former U.S. Unified Combatant Command (1999–2011)

The United States Joint Forces Command (USJFCOM) was a Unified Combatant Command of the United States Department of Defense. USJFCOM was a functional command that provided specific services to the military. The last commander was Army Gen. Ray Odierno and the Command Senior Enlisted was Marine Sergeant Major Bryan B. Battaglia. As directed by the President to identify opportunities to cut costs and rebalance priorities, Defense Secretary Robert Gates recommended that USJFCOM be disestablished and its essential functions reassigned to other unified combatant commands. Formal disestablishment occurred on 4 August 2011.

<span class="mw-page-title-main">United States Army Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance and Reconnaissance Center</span> Military unit

The Combat Capabilities Development Command (CCDC) C5ISR Center, formerly the Communications-Electronics RD&E Center (CERDEC), is the United States Army information technologies and integrated systems center. CCDC C5ISR Center is headquartered at Aberdeen Proving Ground in Maryland, with activities at Fort Belvoir in Virginia and Joint Base McGuire-Dix-Lakehurst in New Jersey.

<span class="mw-page-title-main">Global Information Grid</span> Communications project of the United States Department of Defense

The Global Information Grid (GIG) is a network of information transmission and processing maintained by the United States Department of Defense. More descriptively, it is a worldwide network of information transmission, of associated processes, and of personnel serving to collect, process, safeguard, transmit, and manage this information. It is an all-encompassing communications project of the United States Department of Defense. The GIG makes this immediately available to military personnel, to those responsible for military politics, and for support personnel. It includes all infrastructure, bought or loaned, of communications, electronics, informatics, and security. It is the most visible manifestation of network-centric warfare. It is the combination of technology and human activity that enables warfighters to access information on demand.

Net-Centric Operations Warfare describes how the United States Department of Defense will conduct business operations, warfare, and enterprise management in the future. It is based on the information technology (IT) concept of an assured, dynamic, and shared information environment that provides access to trusted information for all users, based on need, independent of time and place. NCOW is an information-enabled concept of operations that generates increased combat power by networking sensors, decision makers, and shooters. This enables shared awareness, increased speed of command, higher tempo of operations, greater lethality, increased survivability, and a degree of self-synchronization. In essence, network-centric warfare translates information superiority into combat power by effectively linking knowledgeable entities in the battlespace.

<span class="mw-page-title-main">NetOps</span>

NetOps is defined as the operational framework consisting of three essential tasks, Situational Awareness (SA), and Command & Control (C2) that the Commander (CDR) of US Strategic Command (USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to operate, manage and defend the Global Information Grid (GIG) to ensure information superiority for the United States.

John Joseph Garstka is the acting CISO for acquisition and sustainment at the Department of Defense

Battlespace or battle-space is a term used to signify a military strategy which integrates multiple armed forces for the military theatre of operations, including air, information, land, sea, cyber and outer space to achieve military goals. It includes the environment, timeframe and other factors, and conditions that must be understood to successfully apply combat power, protect the force, or complete the mission. This includes enemy and friendly armed forces, infrastructure, weather, terrain, and the electromagnetic spectrum within the operational areas and areas of interest.

<span class="mw-page-title-main">Command and control</span> Military exercise of authority by a commanding officer over assigned forces

Command and control is a "set of organizational and technical attributes and processes ... [that] employs human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or enterprise, according to a 2015 definition by military scientists Marius Vassiliou, David S. Alberts, and Jonathan R. Agre. The term often refers to a military system.

<span class="mw-page-title-main">Battlefield Airborne Communications Node</span> US Air Force airborne communications relay and gateway system

The Battlefield Airborne Communications Node (BACN) is a United States Air Force (USAF) airborne communications relay and gateway system carried by the unmanned EQ-4B and the manned Bombardier E-11A aircraft. BACN enables real-time information flow across the battlespace between similar and dissimilar tactical data link and voice systems through relay, bridging, and data translation in line-of-sight and beyond-line-of-sight situations. Its ability to translate between dissimilar communications systems allows them to interoperate without modification.

The Command and Control Research Program (CCRP) was an active DoD Research Program from 1994 to 2015. It was housed within the Office of the Assistant Secretary of Defense (NII) and it focused upon (1) improving both the state of the art and the state of the practice of command and control (C2) and (2) enhancing DoD's understanding of the national security implications of the Information Age. It provides "Out of the Box" thinking and explores ways to help DoD take full advantage of Information Age opportunities. The CCRP served as a bridge between the operational and technical communities and enhanced the body of knowledge and research infrastructure needed for future progress.

Thales-Raytheon Systems Company LLC is an aerospace and defence company co-headquartered in Massy, Paris, France and Fullerton, California, United States. It is operated as a 50:50 joint venture between Raytheon Technologies and Thales Group.

David Stephen Alberts is a former American Director of Research for the Office of the Assistant Secretary of Defense for Networks and Information Integration (NII).

Area of responsibility (AOR) is a pre-defined geographic region assigned to Combatant commanders of the Unified Command Plan (UCP), that are used to define an area with specific geographic boundaries where they have the authority to plan and conduct operations; for which a force, or component commander bears a certain responsibility. The term may also be used in other countries worldwide but it originated within the United States Armed Forces. This system is designed to allow a single commander to exercise command and control of all military forces in the AOR, regardless of their branch of service.

LandWarNet (LWN) is the United States Army’s contribution to the Global Information Grid (GIG) that consists of all globally interconnected, end-to-end set of Army information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand supporting warfighters, policy makers, and support personnel. It includes all Army and leveraged Department of Defense (DOD)/Joint communications and computing systems and services, software, data security services, and other associated services. LandWarNet exists to enable the warfighter through Mission Command, previously described as Battle Command. Other U.S. service equivalent efforts to LandWarNet include the Navy's "FORCEnet" and the Air Force's "C2 Constellation."

<span class="mw-page-title-main">FCS Network</span>

The FCS Network - Brigade Combat Team (BCT) Network consists of five layers that deliver data to forward-deployed Army units.

<span class="mw-page-title-main">Battle command</span> Military discipline

Battle command (BC) is the discipline of visualizing, describing, directing, and leading forces in operations against a hostile, thinking, and adaptive enemy. Battle command applies leadership to translate decision into actions, by synchronizing forces and warfighting functions in time, space, and purpose, to accomplish missions. Battle command refers both to processes triggered by commanders and executed by soldiers and to the system of systems (SoS) that directly enables those processes.

Project Scorpion is a multinational military modernization program which uses military-run experimentation for acquisition of new armaments. Project Scorpion also tests new military behaviors such as effects-based operations, network-centric warfare, and irregular warfare and civilian-military concepts.

For military strategy, intent is the desired outcome of a military operation. It is a key concept in 21st century military operations and is a vital element to facilitate subordinates' initiative and collaboration and cooperation amongst team members in joint operations.

<span class="mw-page-title-main">Joint Deployable Analysis Team</span>

The Joint Deployable Analysis Team (JDAT) is part of the J6 Directorate of the Joint Chiefs of Staff.

References

  1. Congressional Research Service NCO Background and Oversight Issues for Congress Archived 2011-11-06 at the Wayback Machine 2007, p. 1.
  2. Owens, William A. (February 1996). "The Emerging U.S. System-of-Systems". Strategic Forum. Institute for National Strategic Studies. Archived from the original on January 5, 2010.
  3. "Joint Vision 2010" (PDF). Defense Technical Information Center. U.S. DoD, Joint Chiefs of Staff. p. 25. Archived from the original (PDF) on December 24, 2016.
  4. Alberts, David S.; Garstka, John J.; Stein, Frederick P. (August 1999). Network centric warfare : developing and leveraging information superiority (PDF) (2 ed.). CCRP. ISBN   1-57906-019-6. Archived (PDF) from the original on July 6, 2017. Retrieved June 7, 2017.
  5. Alberts, David S.; et al. (August 2001). Understanding information age warfare (PDF). CCRP. ISBN   1-893723-04-6. Archived (PDF) from the original on December 22, 2016. Retrieved June 7, 2017.
  6. Alberts, David S.; Hayes, Richard E. (June 2003). Power to the Edge: Command and Control in the Information Age (PDF). CCRP. ISBN   1-893723-13-5. Archived from the original (PDF) on November 29, 2007. Retrieved June 7, 2017.
  7. Alberts, D.S., (2002), Information Age Transformation: Getting to a 21st Century Military Archived 2007-06-15 at the Wayback Machine , Washington, DC, CCRP Publications. pp. 7-8. First published 1996.
  8. United States Army (2003). Mission Command: Command and Control of Army Forces. Washington, D.C.: Headquarters, United States Department of the Army, Field Manual No. 6-0.
  9. United States Marine Corps (1996). Command and Control. Washington, D.C.: Department of the Navy, Headquarters, United States Marine Corps, Doctrine Publication MCDP 6.
  10. Vassiliou, Marius, David S. Alberts, and Jonathan R. Agre (2015). "C2 Re-Envisioned: the Future of the Enterprise." New York: CRC Press.
  11. Lt. Gen. Harry D. Raduege Jr., "Net-Centric Warfare Is Changing the Battlefield Environment" Archived 2004-11-19 at the Wayback Machine , Defense Information Systems Agency
  12. Blenkin, Max. AAP General News [ dead link ] (Australia), 9/17/2003