7/28/2019 A new dimension of war
1/29
RESTRICTED
DSCSC/0782/SD
A NEW DIMENSION OF WAR: NETWORK-CENTRIC WARFARE
INTRODUCTION
1. The swelling evolutions in the fields of information technology (IT) and communication
have propelled a new dimension of war the Network-centric warfare (NCW). NCW now
commonly called Network-Centric Operations (NCO1), is a new military doctrineor theory
of war pioneered by theUnited States Department of Defense (DOD). It seeks to translate an
information advantage, enabled in part by information technology, into a competitive
warfighting advantage through the robust networking of well informed geographically
dispersed forces.
2. History clearly shows that any new technology, regardless of its original intentions, soon
finds its way into the arsenals of warriors. The advent of IT expands physical battle space
and the area of military operations far beyond traditional boundaries. The battlefield is no
longer defined merely along geographical boundaries. It extends to cyberspace. The
introduction of networking techniques into warfighting systems accelerates engagement
cycles and operational tempo at all levels of a warfighting system. This is achieved by
providing a mechanism to rapidly gather and distribute targeting information, and rapidly
issue directives.
3. During the recent Afghanistan and Iraq campaigns, weve seen a glimpse of NCW. It
created a decisive warfighting advantage and enabled the United States to defeat the ruling
regime of a country that was perceived to be unconquerablewith less than one-tenth the
force structure required in Desert Stormin less than two months. Armored forces racing
toward Baghdad in Operation Iraqi Freedom (OIF) used network-centric capabilities to
monitor the battlefield situation during horrendous weather conditions to accomplish the
most rapid military advance in history and to overthrow Saddam Husseins regime in a
1 Please note, however, that NCW can be construed to apply only to warfighting operations, whereasNCO applies to a broader array of operations that military forces can undertake, such aspeacekeeping and stability and support operations.
1
RESTRICTED
http://en.wikipedia.org/wiki/Military_doctrinehttp://en.wikipedia.org/wiki/Military_doctrinehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/Military_doctrine7/28/2019 A new dimension of war
2/29
RESTRICTED
matter of weeks. Therefore, NCW is much more than that and, not surprisingly, is very
demanding technologically.
4. Over the coming decade we will see the world divide into nations that employ NCW
techniques ,and others that do not , be it for reasons of ideology or operational/technological
incapacity. Military networking, especially between platforms, is far more challenging than
industry networking due to the heavy reliance on wireless communications, high demand for
security, and the need for resistance to hostile jamming. The demanding environmental
requirements for military networking hardware are an issue in their own right. It should
come thus as no surprise that the introduction of networking into military environments has
proven more painful and more protracted than the industry experience of over a decade ago.
5. The newmilitary doctrine of NCW and the growing network-centric capabilities are
transforming how we fight. Clearly, NCW is at the very heart of force transformation and the
emerging way of war. NCW has already been widely debated in many countries defense, so
it is important now to establish and disseminate a common view of NCW amongst the wider
defense community- the Armed forces, the civil service agencies, defense industry and
academia to help people to know and understand NCW.
AIM
6. The aim of this paper is to analyze relating theories of NCW and its effects on the armed
forces in order to develop a common understanding.
RELATED THEORIES OF NCW
Background
7. NCW can trace its immediate origins to 1996 when Adm. William Owens introduced the
concept of a system of systems in a paper of the same name published by the Institute
National Security Studies. Owens described the serendipitous evolution of a system of
intelligence sensors, command and control systems, and precision weapons that enabled
2
RESTRICTED
http://en.wikipedia.org/wiki/Military_doctrinehttp://en.wikipedia.org/wiki/Military_doctrinehttp://en.wikipedia.org/wiki/Military_doctrine7/28/2019 A new dimension of war
3/29
RESTRICTED
enhanced situational awareness, rapid target assessment, and distributed weapon assignment.
The same year, the joint chief of staff released Joint Vision 2010, which introduced the
military concept offull-spectrum dominance. Full spectrum dominance described the ability
of the U.S military to dominate the battlespace from peace operations through to the outright
application of military power that stemmed from the advantages of information superiority.
8. As a distinct concept, however, NCW first appeared publicly in a 1998 US naval
institute proceedings article by vice admiral Arthur K. Cebrowski and John Gartska. The
concepts were later given greater depth in the book, Network Centric Warfare coauthored
by Gartska, David S. Alberts (Director of Research, OASD-NII), and Fred Stein of the
MITRE corporation. Published by the Command and Control Research Program (CCRP),
the book derived a new theory of warfare from a series of case studies on how business was
using information and communication technologies to improve situation analysis, accurately
control inventory and production, as well as monitor customer relations.
9. NCW was followed in 2001 by Understanding Information Age Warfare (UIAW),
jointly authored by Alberts, Gartska, Richard Hayes of evidence based research and David S.
Signori of RAND. UIAW pushed the implications of the shifts identified by NCW in order to
derive an operational theory of warfare. Starting with a series of premises on how the
environment is sensed, UIAW posits a structure of three domains. The physical domain is
where events take place and are perceived by sensors and individuals. Data emerging from
the physical domain is transmitted through an information domain. Data is subsequently
received and processed by a cognitive domain where it is assessed and acted upon. The
process replicates the observe, orient, decide, act (OODA) loop first described by Col.
John Boyd of the U.S air force.
10. The publication dealing with the developing theory of NCW appeared in 2003 with
Power to the Edge, also published by the CCRP. Power to the Edge is a more speculative
work and easily the most revolutionary in terms of its implications for military operations. It
suggests that modern military environments are far too complex to be understood by any one
3
RESTRICTED
http://en.wikipedia.org/w/index.php?title=Joint_Vision_2010&action=edithttp://en.wikipedia.org/wiki/Full-spectrum_dominancehttp://en.wikipedia.org/wiki/Arthur_K._Cebrowskihttp://en.wikipedia.org/wiki/John_Gartskahttp://en.wikipedia.org/wiki/John_Gartskahttp://www.dodccrp.org/files/Alberts_NCW.pdfhttp://en.wikipedia.org/wiki/MITREhttp://en.wikipedia.org/wiki/MITREhttp://www.dodccrp.org/http://www.dodccrp.org/http://www.dodccrp.org/files/Alberts_UIAW.pdfhttp://en.wikipedia.org/wiki/OODAhttp://en.wikipedia.org/wiki/John_Boyd_(military_strategist)http://www.dodccrp.org/files/Alberts_Power.pdfhttp://en.wikipedia.org/w/index.php?title=Joint_Vision_2010&action=edithttp://en.wikipedia.org/wiki/Full-spectrum_dominancehttp://en.wikipedia.org/wiki/Arthur_K._Cebrowskihttp://en.wikipedia.org/wiki/John_Gartskahttp://www.dodccrp.org/files/Alberts_NCW.pdfhttp://en.wikipedia.org/wiki/MITREhttp://en.wikipedia.org/wiki/MITREhttp://www.dodccrp.org/http://www.dodccrp.org/files/Alberts_UIAW.pdfhttp://en.wikipedia.org/wiki/OODAhttp://en.wikipedia.org/wiki/John_Boyd_(military_strategist)http://www.dodccrp.org/files/Alberts_Power.pdf7/28/2019 A new dimension of war
4/29
RESTRICTED
individual, organization, or even military service. Modern information technology permits
the rapid and effective sharing of information to such a degree that edge entities or those
that are essentially conducting military missions themselves, should be able to pull
information from ubiquitous repositories, rather than having centralized agencies attempt to
anticipate their information needs and push it to them. This would imply a major flattening
of traditional military hierarchies, however. It is not yet clear whether the vision of Power to
the Edge is realizable, although Alberts and Hayes argue in the book that the establishment
of the Global Information Grid (GIG) is the first step to accomplishing it.
What is NCW
11. NCW is the term used in military circles to define information-based warfighting. It is
military operation that is enabled by the networking of the force. NCW provides a force with
access to a new, previously unreachable region of the information domain. The ability to
operate in this region provides warfighters with a new type of information advantage, an
advantage broadly characterized by significantly improved capabilities for sharing and
accessing information. NCW enables warfighters to leverage this information advantage to
dramatically increase combat power through self-synchronization and other network-centric
operations. In essence, NCW translates information superiority into combat power by
effectively linking knowledgeable entities in the battlespace.
12. NCW uses computers and communications to link people through information flows
that depend on the interoperability of systems used by all armed forces. Objectives of NCW
include the following:
a. Self-synchronization, or doing what needs to be done without traditional
orders;
b. Improved understanding of higher commands intent;
c. Improved understanding of the operational situation at all levels of command;
4
RESTRICTED
http://en.wikipedia.org/wiki/Power_to_the_Edgehttp://en.wikipedia.org/wiki/Power_to_the_Edgehttp://en.wikipedia.org/wiki/Global_Information_Gridhttp://en.wikipedia.org/wiki/Power_to_the_Edgehttp://en.wikipedia.org/wiki/Power_to_the_Edgehttp://en.wikipedia.org/wiki/Global_Information_Grid7/28/2019 A new dimension of war
5/29
RESTRICTED
d. And, increased ability to tap into the collective knowledge of all armed (and
coalition)forces to reduce the fog and friction commonly referred to in
descriptions of fighting.
13. As a new source of power, NCW has a profound impact on the planning and conduct of
war by allowing armed forces to get inside an adversarys decision cycle, changing the rules
of warfare, and dictating the pace of military operations. NCW provides an edge at all three
levels of military operations:
a. Strategy. It selects a competitive space and determines the scope, pace, and
intensity of the competition.
b. Operations . It determines the key competitive attributes and applies / masters
them.
c. Tactics. It executes in the battlespace.
Three Categories of NCW
14. NCW focuses on the tactical and operational levels of warfare, but they impact all
levels of military activity from the tactical to the strategic. The impacts of NCW at the
operational and strategic levels of war are grouped in three categories:
a. Sensors. Sensors, such as the Hunter Unman Aerial Vehicle (UAV), the predator
UAV, the long advanced scout surveillance system, and others provided day or night,
all weather acquisition of enemy forces and real-time transmission of that data to the
operators. They extend the depth of the battlespace, provide greater situational
awareness for commanders and planners, and when coupled with long-range
weapons, compress the kill chainfind, fix, target, track, engage, and assess.
b. Connectivity. Connectivity is the key enabler for situational awareness by
providing the backbone for data from and between information systems and for voice
5
RESTRICTED
7/28/2019 A new dimension of war
6/29
RESTRICTED
and video communications. It improves the quality of the command and control
network and information shareability, and enables wide dispersion between forces
and greater interactions and collaboration between those forces, leading to increased
situational awareness and understanding.
c. Information Systems. Information systems, enabled by the automatic transfer and
assimilation of data into near-real-time useable information, provide commanders
and staff with a Common Operational Picture (COP) a fused picture of the
battlespace, which enhance shared situational awareness and collaboration.
Taken together, new sensors, connectivity, and information systems enhanced the
ability of commanders to visualize the battlespace, increased collaboration and the speed of
command, and resulted in increased mission effectiveness.
TECHNOLOGIES THAT SUPPORT NCW
Network Architectures
15. NCW is highly dependent on the interoperability of communications equipment, data,
and software to enable networking of people, sensors, and manned and unmanned platforms.
Parts of NCW technology rely on line-of-sight radio transmission for microwave or infrared
signals, or laser beams. Other parts of the technology aggregate information for transmission
through larger network trunks for global distribution via fiber optic cables, microwave
towers, or both low-altitude and high-altitude satellites. The designs for this technology must
enable rapid communications between individuals in all services, and rapid sharing of data
and information between mobile platforms and sensors used by all military services. The
architectures must also have the ability to dynamically self-heal and re-form the network
when one or more communications nodes are interrupted.
Satellites
16. Satellites are crucial for enabling mobile communications in remote areas, as well as
6
RESTRICTED
7/28/2019 A new dimension of war
7/29
RESTRICTED
for providing imagery, navigation, weather information, a missile warning capability, and a
capability to reach back to the surface for added support. The Global Positioning System
(GPS) helps identify the location of armed forces, as well as target locations for launching
weapons, such as cruise missiles.
Radio Bandwidth
17. Digitization of communications is a key part for NCW.Digital technology makes more
efficient use of spectrum bandwidth for communications than analog technology. However,
since 1991, there has been an explosive increase in demand for bandwidth, due to efforts to
speed up the delivery of digital information. Whether the radio bandwidth supply available
to keep up with increasing military demands in the future will be a serious problem.
Unmanned Vehicles (UVs)
18. UVs, also known as UAVs, Ground Vehicles (UGVs), and Underwater Vehicles
(UUVs), are primarily used for surveillance; however their mission is evolving to also
include combat. During OIF, approximately 16 Predator and 1 Global Hawk UAVs were in
operation, and all were controllable remotely via satellite link from command centers in the
continental United States. UVs each require a large amount of bandwidth for control and for
transmission of reconnaissance images, and UVs also serve as nodes that can relay messages
through the NCW network.
Air Dominance
19. In UCW, the forces is highly-dependent on space assets for communications,
navigation, imagery, weather analysis, and missile early warning systems. Without early air
dominance, UAVs and other Intelligence Surveillance and Reconnaissance (ISR) aircraft
could not have been used to provide information needed for NCW systems. UAVs, and other
support aircraft, such as refueling support tankers, were nearly defenseless and reportedly
could not have operated deep in Iraqi air space without early air dominance.
7
RESTRICTED
7/28/2019 A new dimension of war
8/29
RESTRICTED
Computer Processor Chips
20. Gordon Moores Law of Integrated circuits predicts that every 18 months, computer
chips evolve to become twice as dense and twice as fast for about the same cost, meaning
they become almost 4 times as powerful every 18 months. Industries that use computer
technology rely on Moores Law as a guide for investing in future technology systems. Many
future NCW concepts now being developed also rely on the continued evolution in computer
processing power, and may also be affected by advances in other technologies, such as
nanotechnology.
Nanotechnology
21. New materials developed through nanotechnology may eventually change battlefield
equipment in ways hard to imagine. Weapons may become smaller and lighter, and new
miniaturized network sensors may detect, locate, identify, track, and target potential threats
more efficiently. Currently, we can use nanotechnology to create a heat-resistant coating that
extends the life of propulsion shafts for warships, and as an additive to boost the
performance of rocket propellant. Nanotechnology may eventually alter fundamental
concepts of warfare, perhaps even more than the invention of gunpowder. Some countries
are also making advances in nanotechnology.
Software
22. Software is an important component of all complex defense systems used for NCW.
The globalization of the economy dictates a global process for software development. The
contractors often outsource software development to other smaller private firms, and in some
cases, programming work may be done by offshore companies. This raises questions about
the possibility of malicious computer code being used to subvert computer systems. We
should investigate ways to strengthen policy mechanisms to increase confidence in the
security of both foreign and domestic software products.
8
RESTRICTED
7/28/2019 A new dimension of war
9/29
RESTRICTED
ADVANTAGES OF NCW
23. A warfighting force that can conduct NCW has these advantages: All elements of the
force are robustly networked achieving secure and seamless connectivity; The force has thecapability to share, access, and protect information to a degree that it can establish and
maintain an information advantage over an adversary; The force has the capability to
collaborate in the information domain, which enables a force to improve its information
position ; The force has the capability to develop high quality awareness and share this
situational awareness; The force has the capability to self-synchronize its operations.
24. The combat power is increasingly derived from information sharing, information
access, and speed. This view has been supported by results of recent military operational
experiences showing that when forces are truly jointed, with comprehensively integrated
capabilities and operating according to the principles of NCW, they can fully exploit the
highly path-dependent nature of information age warfare. Some resulting military
advantages of NCW include the following:
a. Networked forces can consist of smaller-size units that can travel lighter and faster,
meaning fewer troops with fewer platforms and carrying fewer supplies can perform
a mission effectively, or differently, at a lower cost.
b. Networked forces can fight using new tactics. During OIF, U.S. Army forces
utilized movement that was described by some as swarm tactics. Because
networking allows soldiers to keep track of each other when they are out of one
anothers sight, forces could move forward in Iraq spread out in smaller independent
units, avoiding the need to maintain a tight formation. Using swarm tactics, unit
movements are conducted quickly, without securing the rear. All units know each
others location. If one unit gets into trouble, other independent units nearby can
quickly come to their aid, swarming to attack the enemy from all directions at
once. Benefits may include the following:
9
RESTRICTED
7/28/2019 A new dimension of war
10/29
RESTRICTED
(1). Fewer troops and less equipment are needed, so waging war is less expensive;
(2). It is harder for an enemy to effectively attack a widely dispersed formation;
(3). Combat units can cover much more ground, because they do not have to
maintain a formation or slow down for lagging vehicles;
(4). Knowing the location of all friendly units reduces fratricide during combat
operations;
(5). Swarming allows an attack to be directed straight into the heart of an enemy
command structure, undermining support by operating from the inside, rather
than battling only on the periphery.
c. The way individual soldiers think and act on the battlefield is also changing. When
a unit encounters a difficult problem in the field, they radio the tactical operations
center, which types the problem into an online chat room, using Microsoft chat
software. The problem is then swarmed by experts who may be located far away.
d. The sensor-to-shooter time is reduced. Using NCW systems, soldiers in the field
have the capability to conduct an on site analysis of raw intelligence from sensor
displays, rather than waiting for return analysis reports.
PROBLEMS LIED IN NCW
The Information Problem
25. Networks are not a substitute for smart heads and commonsense. Therefore, the
information being distributed within a network may or may not be correct. When a sensor
misidentifies a target, it could well result in hundreds of force elements being simultaneously
10
RESTRICTED
7/28/2019 A new dimension of war
11/29
RESTRICTED
told that an opponent exists where there is none, or vice-versa.
26. Huge information resources may be overrated as an asset for creating effective military
operations, and that important military decisions may not always lend themselves to
information-based rational analysis. If we overwhelmingly focused on the rewards of
information, some issues will be raised:
a. Quantitative changes in information and analysis often lead to qualitative changes in
individual and organizational behavior that are sometimes counterproductive.
b. Reliance on sophisticated information systems may lead to management over
confidence.
c. An information-rich, opportunity-rich environment may shift the value of the
information, redefine the mission objectives, and possibly increase the chances for
perverse consequences.
The Connectivity Problem
27. In NCW, high levels of digital connectivity between units, platforms and headquarters
or other command elements will be provided. The forces in typical operations may be
scattered distant areas, with a need to gather intelligence, and distribute intelligence and
command directives to dozens or hundreds of fighting units that may be dispersed and
concentrated over hundreds of thousands of square miles of terrain. For the network to be
effective, it must function without interruption, even if force elements are on the move. Themore complex the terrain is, the more difficult this connectivity problem becomes.
28. There is a problem whether communications bandwidth supply can be made adequate
to match growing future military needs in NCW. When the supply of bandwidth becomes
inadequate during combat, military operations officers have sometimes been forced to
subjectively prioritize the transmission of messages. They do this by literally pulling the plug
temporarily on some radio or computer switching equipment in order to free up enough
11
RESTRICTED
7/28/2019 A new dimension of war
12/29
RESTRICTED
bandwidth to allow the highest-priority messages to get through. This can delay, or cancel
other messages or data transmissions, which are placed into in a lower priority, so that it
would delay information updates.
The Network Security Problem
29. With the growing threat from cyber attack, any network arrangement is subject to
breakdown. When the network becomes more complex and distributed, it will become more
vulnerable or fragile. The network architectures in NCW are the same. Meanwhile,
providing secure communications in NCW is difficult, since successful key managementfor
encryption is typically the most difficult aspect of cryptography, especially with mobile
systems. The problem is exacerbated with the need for speedy deployment and nimble
reconfiguration of military teams, to respond to rapidly changing conditions in the modern
battlespace. There is growing controversy about whether the armed forces should use general
purpose open source commercial computer software for the command, control, and
communications functions in advanced defense systems for tanks, aircraft and other complex
equipment. Some experts believe that open-source software violates many security
principles, and may be subverted by adversaries who could secretly insert Trojan horse
malicious code to cause complex defense systems to malfunction.
The Asymmetric Threats Problem
30. The term asymmetric, when referring to strategies in warfare, is often intended to
describe attacks launched by a weaker, or less-well-equipped enemy, as they learn to exploit
a stronger opponents vulnerabilities. Asymmetry sometimes leads to unanticipated
outcomes. Asymmetric countermeasures may include actions taken by an enemy to bypass
NCW sensors, or to negate the usefulness of high technology weapons. Some examples may
include:
a. Suicide bombings;
12
RESTRICTED
http://en.wikipedia.org/wiki/Key_managementhttp://en.wikipedia.org/wiki/Key_managementhttp://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Cryptographyhttp://en.wikipedia.org/wiki/Key_managementhttp://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Cryptography7/28/2019 A new dimension of war
13/29
RESTRICTED
b. Hostile forces intermingling with civilians used as shields;
c. Irregular fighters and close-range snipers that swarm to attack, and then disperse
quickly;
d. Use of bombs to spread dirty radioactive material;
e. Chemical or biological weapons.
The Fund and Training Problem
31. It will need a large number fund to establish the NCW architecture. Financial
constraints will be a considered problem. In training, it is difficult to fully incorporate the
warfighters into the development of NCW. People will require appropriate education and
training to utilize increasingly-available information. They will need to use all available
system tools to exploit information, and they will need time to adapt to a more open culture,
requiring greater sharing and trust between colleagues and coalition partners. The procedural
and technical challenges should not be underestimated.
THE DEVELOPMENT OF NCW
32. Military organizations worldwide are researching and developing NCW. Some
countries, such as Sweden which uses the term Network-Based Defense, may view NCW
concepts and the promise of more efficiency and effectiveness through networking with
coalition partners, as a way to reduce military budgets. Denmark, Norway and the
Netherlands have all adopted the term Network Centric Warfare; Australia uses the term
Network-Enabled Warfare; the U.K uses the term Network-Enabled Capability; and, the
armed forces of the Republic of Singapore uses the term Knowledge -Based Command and
Control.
33. NCW is a new military doctrine or theory of war pioneered by the United States DOD.
It is a key component of DOD planning for transformation of the military. In U.S., there are
13
RESTRICTED
http://en.wikipedia.org/wiki/Military_doctrinehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/Military_doctrinehttp://en.wikipedia.org/wiki/United_States_Department_of_Defense7/28/2019 A new dimension of war
14/29
RESTRICTED
following key programs related to NCW that are identified as program elements for research,
development, test and evaluation.
a. Net Centricity. The Net Centricity program is intended to support information
technology activities for network-centric collaboration. Horizontal Fusion is a
component that determines how quickly DOD and intelligence community programs
can be extended to a net-centric operational environment. The GIG Evaluation
Facility is a component that tests interoperability of key systems in an end-to-end
manner, including the Joint Tactical Radio System (JTRS) and the Global Information
Grid Bandwidth Expansion programs.
b. Global Information Grid (GIG). The GIG supports DOD and related intelligence
community missions and functions, and enables sharing of information between all
military bases, mobile platforms, and deployed sites. The GIG also provides
communications interfaces to coalition, allied, and non-DOD users and systems.
Older messaging systems, such as the Defense Message System (DMS), Global
Command and Control System (GCCS), and the Global Combat Support System
(GCSS) will all be made accessible via the GIG. By 2008, military communications
equipment use the new Internet Protocol version 6 (IPv6) as the standard for all
transmission through the GIG. The new IPv6 protocol will reportedly offer greater
message security and better tracking of equipment, supplies, and personnel through
use of digital tags.
c. Air Force Advanced Tactical Targeting Technology (AT3). The AT3 system
combines information collected by an airborne network of sensors to identify the
precise location of enemy air defense systems. The system relies on coordination of
information from different systems aboard multiple aircraft.
d. Air Force Link 16. Tactical Data Links (TDLs) are used in combat for machine-
to-machine exchange of information messages such as radar tracks, target
information, platform status, imagery, and command assignments. The purpose of
14
RESTRICTED
7/28/2019 A new dimension of war
15/29
RESTRICTED
this program element is to insure the interoperability of Air Force TDLs. TDLs are
used by weapons, platforms, and sensors of all services. Other TDLs include Link
11, Situational AwarFY2eness Data Link (SADL), and Variable Message Format
(VMF). Navy Cooperative Engagement Capability (CEC). The CEC system links
Navy ships and aircraft operating in a particular area into a single, integrated air-
defense network in which radar data collected by each platform is transmitted on a
real-time (i.e., instantaneous) basis to the other units in the network. Each unit in the
CEC network fuses its own radar data with data received from the other units. As a
result, units in the network share a common, composite, real-time air-defense picture
CEC will permit a ship to shoot air-defense missiles at incoming anti-ship missiles
that the ship itself cannot see, using radar targeting data gathered by other units in the
network. It will also permit air-defense missiles fired by one ship to be guided by
other ships or aircraft.
e. Joint Tactical Radio System (JTRS). DOD has determined that future military
radio frequency communications systems should be developed in compliance with
the JTRS architecture. JTRS is a family of common, software-defined,
programmable radios that will initially become the Armys primary tactical radio for
mobile communications, including radios that are capable of communicating via
satellite. The new JTRS devices will have routers built-in to support networks in the
battlefield, with the capability to dynamically re-form communications links
whenever one or more nodes or routers are interrupted. Reportedly there is some
disagreement among planners about whether the military should use laser-based
communications or JTRS radio waves for the space-to-ground communications link.
Currently, the military services use different radio waveforms that have yet to be
made interoperable.
34. NATO is currently building a capability for dynamic interoperability with U.S forces in
the future and is developing a framework for high-technology warfare using the combined
forces of multiple nations, called NATO Network Enabled Capabilities, similar to the U.S.
15
RESTRICTED
7/28/2019 A new dimension of war
16/29
RESTRICTED
militarys Joint Vision 2020. Other NATO hinitiatives for coalition operations include the
Multinational Interoperability Program, the Cross System Information Sharing Program, and
the Multi-functional Air-based Ground Sensor Fusion Program.
NCW CASE STUDY
General
35. This is a case study designed to further the examination of the tenets of NCW, which
hypothesizes that a robustly networked force improves information sharing, collaboration,
quality of information, and shared situational awareness resulting in significantly increased
mission effectiveness.
36. In the next case study, we shall compare the performance and capabilities of the
Stryker brigade to that of the baseline unit in a number of key dimensions so that we could
research about the NCW capabilities of the brigade. The Stryker brigade is equipped with the
current generation of army digital terrestrial and satellite communications systems and
evolving current-generation battle command systems. Perhaps the most important, it utilizes
a new organizational structure and a new information-centric concept of operations. A
baseline unit, which we select to use as a comparison to the Stryker brigade, is a non-
digitized light infantry brigade.
37. We shall use the NCO Conceptual Framework (CF)specifically, the measures and
metrics that it containsfor assessing the NCW capabilities exhibited by the brigade. The
NCO CF provides detailed and precise elaboration of the NCW hypotheses1. Figure.1
illustrates the NCO CF. It depicts key NCW capabilities or attributes and their relationships,
influences, and feedback mechanisms.
16
RESTRICTED
7/28/2019 A new dimension of war
17/29
RESTRICTED
Figure.1 the NCO Conceptual Framework
38. We shall examine key NCO concepts essential to this NCW hypothesis to determine
how and to what extent they increase the combat effectiveness of the Stryker brigade. The
key NCO concepts we examine are:
* Degree of networking
* Quality of individual and shared information
* Quality of interactions and collaboration
* Speed of command (a measure of C2 agility)
* Degree of command and force synchronization
* Several measures for overall unit force effectiveness.
Examination of the NCO Concepts
Degree of Networking
39. Degree of networking measures the extent to which force entities are interconnected
17
RESTRICTED
7/28/2019 A new dimension of war
18/29
RESTRICTED
and the quality (speed, accuracy, reliability, and assurance) of those connections in
exchanging data under a variety of possible scenarios.
40. Here, we shall compare the capabilities of the light infantry brigade network to the
network available in the Stryker brigade. The Stryker brigade network provides substantial
capabilities to the soldiers and commanders of this unit and is a significant improvement
over the voice-only network in the baseline unit equipped only with Frequency modulation
(FM) radio. Table.1 provides an overall summary comparison of the networking and battle
command capabilities of Stryker and light infantry brigades.
Table.1 Comparison of Networking and Battle Command Capabilities
41. From above comparison, we can conclude:
a. It is apparent that the Stryker brigade has significantly greater capabilities in
several areas. The Stryker brigade digital network is far more capable than the analog
voice network available in light infantry brigades. Much less information can be
transmitted over voice networks.
b. It also shows the limited information automation support available to soldiers in a
light infantry brigade. This means information must be written down to be retained if
18
RESTRICTED
7/28/2019 A new dimension of war
19/29
RESTRICTED
it cannot be memorized or remembered by individual soldiers in such units. In
contrast, Army Battle Command System (ABCS) enables the soldiers of the Stryker
brigade to accurately and quickly post and retrieve information.
Quality of Individual and Shared Information
42. Quality of individual information assesses the quality of the information each individual
in the force has in his or her possession from all sources, whether generated organically,
transmitted over the technical network, or heard in a conversation; Degree of shared
information assesses the quality of the information held in common by groups of force
members. In addition to assessing quality, this concept assesses the extent to which the
information is shared across the group and to what degree of consistency.
43. Through a series of interviews, we shall compare the quality of individual and shared
information in the Stryker brigade versus the light infantry brigade in the Shughart-Gordon
attack. These interview questions mainly concerned the NCW metric completeness, the
NCW metric accuracy, the metric currency.
44. The primary interview results are following:
a. The Stryker brigade had much more complete information (relative to ground
truth) before the Shughart-Gordon attack than the light infantry brigade did.
Information about the enemy forces increased from 10 percent to 80 percent. Because
of the ABCS network, this situational awareness information was easily shared
among the staff and subordinate units within the Stryker brigade.
b. Where it used to take 12 hours to receive accurate information about enemy
forces in a light infantry brigade, now any observer in the Stryker brigade can send a
spot report in two minutes. Likewise, where it used to take four hours to receive
accurate information about friendly forces in the light infantry brigade, now unit
location and status are updated every two minutes or 500 meters moved in the
19
RESTRICTED
7/28/2019 A new dimension of war
20/29
RESTRICTED
Stryker brigade. Further, the Stryker brigade can adjust these Force XXI Battle
Command: Brigade and Below (FBCB2) settings to the desired level.
Quality of interactions and Collaboration
45. Quality of interactions assesses the degree to which force members interact with each
other and the quality of those interactions. This concept applies to all interactions between
force members, not just technical network-supported data exchanges. It is concerned with
interactions between force members at multiple levels, ranging from basic information
sharing to detailed characterizations of how effectively an organizations members work
together to accomplish mission objectives. Consequently, this concept has many influences
throughout the NCO CF, starting with contributing to the quality of information an
individual receives from across the force.
46. In the light infantry brigade, the commander was either forward with his subordinate
units before battle to ensure they were prepared and understood his intent or he was in the
command post collaborating with his staff during the MDMP. This was an either/or choice.
However, in the Stryker brigade, the brigade commander can leverage the network
capabilities to do both important tasks. He can be forward with subordinate units and still
collaborate with his staff by video-teleconferencing (VTC) in his commanders vehicle. This
allows significantly more interaction between commander and staff during planning, making
the process better at supporting the commanders decisionmaking and more grounded in
reality.
47. The Stryker brigade network significantly improves the quality of interactions and
collaboration compared to that of a non-digital light infantry brigade. Where there was
limited interaction by FM radio or group meetings in the light infantry brigade, widespread
interaction occurred in the Stryker brigade because every leader is on the ABCS network.
48. The practice of Military Decision Making Process (MDMP) in a nodigital light infantry
brigade was generally linear, methodical, and time-consuming. In the Stryker brigade, it is
20
RESTRICTED
7/28/2019 A new dimension of war
21/29
RESTRICTED
more abbreviated and flexible. The commander and staff often rapidly move through the
MDMP steps issue by issue. Interaction between commander and staff and between brigade
and battalions in the Stryker brigade also significantly increased. For example, the brigade
staff shared ideas during mission analysis with the brigade commander who was forward
checking on battalions. The brigade commander discussed the situation with the battalion
commander. Later, the brigade commander shared his concepts for three courses of action
with subordinate commanders, asking for their assessment of the situation and
recommendations.
49. The Brigade Synchronization Meeting is a key collaboration event for both the light
infantry brigade and the Stryker brigade. In the baseline meeting, the brigade staff and
subordinate unit liaison officers arrive with their vastly different understandings of the
situation based on limited accurate information, receive a briefing of the friendly and enemy
situation using a map, and then wargame interaction with the enemy to identify tasks for
friendly forces to synchronize combined-arms effects during the next 2448 hours. In the
Stryker brigade meeting, the participants arrive with a much-improved shared understanding
of the situation, access the ABCS to have real-time accurate understanding of the situation
during the planning meeting, and conduct wargame interactions with the enemy to identify
tasks for friendly forces to synchronize combined-arms effects. The key differences are that
time available for planning is better spent and that planning is based on a more accurate
starting point, so future plans are more likely to be relevant and effective. The product of the
Stryker brigade synchronization meeting is an order that is easily understood and executable
by subordinate units based on shared anticipatory awareness.
Quality of Shared Awareness and Understanding
50. Quality of shared awareness and understand assesses the extent to which the
information is shared across the group and to what degree of consistency.
51. In the light infantry brigade, each leader estimated his own and enemy locations by
21
RESTRICTED
7/28/2019 A new dimension of war
22/29
RESTRICTED
land navigation techniques. Widely different spot reports about friendly and enemy locations
are sent via FM radio to higher headquarters. Because no post-and-retrieve capability resides
on these voice nets, leaders may miss important information from monitoring two nets
simultaneously. The bottom line: there is no COP in the baseline, which results in a very low
level of shared awareness and understanding.
52. In contrast, ABCS provides each leader in the Stryker brigade with a COP containing
relatively accurate and timely information about friendly and enemy forces. The various
kinds of information display the represent COP. This COP represented by the MCS screen
easily facilitates shared awareness. Meanwhile, the Striker brigade uses the Command
Information Centers (CIC) at brigade and battalion levels as the primary tool to build shared
awareness and understanding within the command posts and among members of the unit.
The light infantry brigade has no equivalent CIC. This system manages the critical
information the brigade needs to know to win the fight.
53. Another valuable tool used to build shared awareness and understanding in the Stryker
brigade are digital military overlays in FBCB2 and Maneuver Control System (MCS).
Military overlays are the pictures that build the COP and accompany the text of operation
orders; they are used to understand the situation and the plan. In the light infantry brigade,
overlays were reproduced by hand, copied individually onto acetate, and displayed on
distinct paper mapsan extremely cumbersome process that was inaccurate, untimely, and
largely irrelevant.
Agile Decisionmaking and Self-Synchronization
54. Agile Decisionmaking and Self-Synchronization assesses the forces ability to operate
effectively and efficiently in an uncertain environment and whether the complete set of
decisions made by the force are synchronized with each other (i.e., mutually reinforcing) or
at least deconflicted.
55. The NCW capabilities in the Stryker brigade afford the commander agile
22
RESTRICTED
7/28/2019 A new dimension of war
23/29
RESTRICTED
decisionmaking. The Stryker brigade made more effective use of the time available through
abbreviated collaborative planning, sending digital mission-type orders, conducting effective
brigade reconnaissance, sharing understanding of the situation, fielding agile, self-
synchronizing infantry battalions. In contrast, the light infantry brigade requires more time
for planning and distributing detailed paper orders to subordinates and conducting battalion
reconnaissance and has the difficulty sharing understanding of the plan and the requirement
to rehearse planned force synchronization.
56. One example of improved self-synchronization and tempo during the Shughart-Gordon
attack facilitated by NCW capabilities was this decision to attack early. The Reconnaissance,
Surveillance, and Target Acquisition (RSTA) squadron successfully identified enemy forces
in the disruption zone and in Shughart-Gordon. The lead infantry battalion bypassed enemy
forces in the disruption zone and quickly isolated the objective. The main-effort infantry
battalion planned to attack at 0400 on May 25, but actually attacked at 1500 on May 2413
hours early.
Force Effectiveness
57. Force effectiveness assesses the forces actions by evaluating the forces achievement
of mission objectives and avoidance of costs.
58. Here, supposed that both the Stryker brigade and the light infantry brigade receive the
mission at the same time (1200 on Day 1) and have same No Later Than time to attack
(0400 on Day 4), we shall compare both units mission accomplishment. A time line of key
events is shown at figure 2.
59. From above the analysis of mission accomplishment, we can see that NCW capabilities
in the Stryker brigade actually afford the commander greater control of the speed of
command. He can decide to act faster to maintain tempo and retain the initiative or he can
delay selection of a course of action to conduct reconnaissance and shaping operations based
on which affords him the greatest tactical advantage. The Stryker brigade demonstrated
23
RESTRICTED
7/28/2019 A new dimension of war
24/29
RESTRICTED
improved mission accomplishment and survivability.
Figure.2 A Time Line of Key Events
CONCLUSIONS
60. The emergence of the concept of NCW represents a significant milestone in the
evolution of military thinking on how to integrate information technology into military
operations. Studies have shown that networking enables forces to undertake a different range
of missions than non-networked forces, by improving both efficiency and effectiveness of
operations. NCW uses computers and communications to link people through information
flows that depend on the interoperability of systems used by all armed forces. NCW involves
collaboration and sharing of information to ensure that all appropriate assets can be quickly
brought to bear by commanders during combat operations. NCW has been advanced as a
means of transforming information superiority into an advantage on the physical battlefield.
24
RESTRICTED
7/28/2019 A new dimension of war
25/29
RESTRICTED
The concept of NCW covers a wide range of issues. It seeks to further exploit information
technology and significantly enhance the combat power. (Paragraphs 7-14)
61. The technology supporting NCW is inherently complex. It focuses on using advanced
information technology computers, high-speed data links, and networking software. A host
of information technologies provide capabilities needed to facilitate the sharing of
information, the creation of high quality awareness, and the development of shared
situational awareness. These falls into the following categories: collection, exploitation,
storage, retrieval, distribution, collaborative environments, presentation, information
operations and assurance, and the technologies that help extract knowledge and
understanding from data and information. These knowledge-related technologies include a
variety of analyses, modeling, simulation, problem solving, and other decision support tools.
Enormous advances in information technology have enabled the development of Network-
Centric Warfare in recent years. (Paragraphs 15-22)
62. The ultimate advantage of NCW is the ability to generate better actions to realize better
effects and thus lead to success on operations. In the short term, as network capability
improves, shared information will become more readily available. Routine tasks will be
automated, and the new standard operating procedures and working practices will enable
higher-tempo operations. With the ability to reach back and across to a broad range of
information sources, we will be able to develop a better shared understanding of the
situation. This will enable improvements to the quality and tempo of decision-making, which
in turn will lead to more coherent, co-current and responsive actions, resulting in more
timely and appropriate effects. (Paragraphs 23-24)
63. While NCW may improve both the efficiency and effectiveness of combat operations,
it still have some questions, such as, the information overloaded, the information overrated,
the interoperability of information systems for joint and coalition forces, a shortage of
available bandwidth to support NCW operations, the network architectures vulnerabilities,
asymmetric threats to counter NCW, and the fund and training problem, etc. These problems
25
RESTRICTED
7/28/2019 A new dimension of war
26/29
RESTRICTED
interfere with true NCW application. (Paragraphs 25-31)
64. The development of NCW is essential. It specializes in designing and building physical
security and emergency response systems coupled with the cost-efficient use of hardware
and software. Some key military programs for implementing NCW are developing in U.S. At
the same time, other countries also are researching and developing NCW. (Paragraphs 32-34)
65. By conducting NCW, the armed forces will gain and exploit and information advantage
to result in significantly increased mission effectiveness. We compare the Stryker brigade
that is one of the newest units in the U.S. Army to a non-digitized light infantry brigade.
Thought this case study, we will understand the extent to which NCW capabilities are a
source of combat power for the Stryker brigade and to determine the extent to which the
tenets of the NCW hypothesis are realized by this new type of unit. (Paragraphs 35-59)
RECOMMENDATIONS
66. From the above study on NCW, we can see that NCW is a theory that is being tested as
part of an ongoing research program. The following four key actions are recommended to
develop NCW in the coming years:
a. Setting the NCW-related targets and milestones;
b. Establishing the network that will link engagement systems with sensor and
command and control systems;
c. Develop the human dimension of the networked force by changing doctrine,
training and education to prepare Defense personnel to operate in a NCW environment;
d. And accelerate the process of change and innovation through the Rapid
Prototyping, Development and Evaluation (RPDE, or RAPID) agency, with an
increased use of experimentation to accelerate the development of NCW capability.
26
RESTRICTED
7/28/2019 A new dimension of war
27/29
RESTRICTED
67. In recognizing the risk of over-dependence on the tools, the ability to operate
independently (or at a platform centric level) must be maintained and practiced. While
redundancy and security of the network are being addressed in establishing the NCW
construct, the warfighters must continue to train to function in a non-NCW environment.
NCW is a long-term change programme. It will be some years until the communications
systems, information systems, operational procedures and knowledge will come together
into this improved approach to military operations.
Mirpur Cantonment Liu Jizhou
Major
November 2007 Student Officer
27
RESTRICTED
7/28/2019 A new dimension of war
28/29
RESTRICTED
BIBLIOGRAPHY
1. Department of Defense, The Implementation of Network-Centric Warfare.
Washington, D.C., (2005).
2. U.S. Department of Defense, Network Centric Warfare: Background and Oversight
Issues for Congress, CRS report for congress, (2004).
3. Daniel Gonzales, Michael Johnson, Jimmie McEver, Dennis Leedom, Michael Tseng,
Network-Centric Operations Case Study, the RAND Corporation, (2005).
4. Alberts, Davis S.; John J. Garstka; and Frederick P. Stein, Network Centric Warfare:
Developing and Leveraging Information Superiority, Washington D.C.,CCRP Publication
Series, (1999).
5. Cebrowski, Vice Admiral Arthur K, Network-centric Warfare: An Emerging Military
Response to the Information Age, Command and Control Research and Technology
Symposium, (1999).
6. Fulghum, David A, Rumsfeld Pushes Network Warfare, Aviation Week & Space
Technology, (2002).
7. Signori, David, John Hollywood, Gina Kingston, and Daniel R. Gonzales, A
Conceptual Framework for Network Centric Warfare, RAND Corporation, (2004).
8. John Garstka, Network-Centric Warfare Offers Warfighting Advantage, Signal
Forum,Signal Magazine, (2003).
9. Stryker Brigade Combat Team, Joint Readiness Training Center Certification Exercise
(CERTEX) Database, Government publication, (2003).
10. Signori, David A., et al., A Conceptual Framework for Network Centric Warfare, The
Technical Cooperation Programs Network Centric Warfare/Network Enabled Capabilities
Workshop, Virginia, ( 2002).
11. Alberts, David S., and Richard E. Hayes, Power to the Edge: Command, Control in
the Information Age, Department of Defense Command and Control Research Program
(CCRP), (2003).
12. Alberts, David S., Richard E. Hayes, and David A. Signori, Understanding
Information Age Warfare, Washington, D.C., CCRP Publication Series, (2001).
13. Cebrowski, Vice Admiral Arthur K., USN, and John J. Garstka, Network Centric
28
RESTRICTED
http://www.oft.osd.mil/library/library_files/document_387_NCW_Book_LowRes.pdfhttp://www.oft.osd.mil/library/library_files/document_387_NCW_Book_LowRes.pdf7/28/2019 A new dimension of war
29/29
RESTRICTED
Warfare: Its Origin and Future, U.S. Naval Institute Proceedings, (1998).
14. Cody, Lieutenant General Richard A., Department of the Army, Deputy Chief of Staff,
Study of Network Centric Warfare Conceptual Framework and the Stryker Brigade Combat
Team (SBCT), Washington, D.C., (2003).
15. Light Infantry Brigade Joint Readiness Training Center Rotation, Take Home
Package (Anonymous Unit), Government publication, (2003).
16. Dr. Kimberly Holloman, Evidence Based Research, Inc., The Network Centric
Operations Conceptual Framework, Presentation at the Network Centric Warfare 2004
Conference, Washington, D.C., (2004).
17. VADM Arthur K. Cebrowski, USN, and John J. Garstka., Network Centric Warfare:
Its Origin and Future, Proceedings of the Naval Institute, (1998).
18. Frederick Stein, Presentation on Network Centric Warfare Operations, 4th Annual
Multinational C4ISR Conference, McLean, Virginia, (2004).
19. Edward A. Smith, Network Centric Warfare: Wheres the Beef?, the U.S. Naval War
College Review, (2000).
20. John Garstka, Network-Centric Warfare Offers Warfighting Advantage, Signal
Forum,Signal Magazine, (2003).
21. Lt. Colonel Edmund Blash, Network-Centric Warfare Requires a Closer Look,
Signal Forum, Signal Magazine, (2003).
22. Martin Burke, Information Superiority Is Insufficient To Win In Network Centric
Warfare,Joint Systems Branch, Defense Science and Technology Organization, (2001).
23. Dan Cateriniccia and Matthew French, Network-Centric Warfare: Not There Yet,
Federal Computing Week, (2003).
24. Jefferson Morris, GAO: DOD Needs New Approach to Buying Bandwidth,
Aerospace Daily, (2003).
25. PA Consulting Group, Network Centric Case Study: US/UK Coalition Operations
During Operation Iraqi Freedom, (2004).
26. Http://en.wikipedia.org/wiki/Network-centric_warfare.