Ana səhifə

Network centric warfare transforming the u. S. Army


Yüklə 226.5 Kb.
səhifə9/9
tarix24.06.2016
ölçüsü226.5 Kb.
1   2   3   4   5   6   7   8   9
; Internet, accessed 11 November 2003. Although Kagan acknowledges that NCW provides the means to enhance some military operations, he argues against over emphasizing it as a new way of war. His article highlights some of the challenges with this information age concept – and concludes with the believe that it will do little to fundamentally alter the nature of warfare.

9 Cebrowski, “New Rules for a New Era”: 5.

10 David S. Alberts, John J. Garstka, and Frederick P. Stein, Network Centric Warfare: Developing and Leveraging Information Superiority 2nd ed. (Washington, DC: CCRP Publication Series, February 2000), 88.

11 Robert Metcalfe, the primary architect of the Ethernet protocol, postulated that the potential power of a network is “proportional to the square of the number of people using it.” Simply put, each user that is added to a network creates significant growth in potential interactions between existing network nodes. As such, the more users that are connected to the network – the more information you can exchange.

12 Internet Society, “A Brief History of the Internet,” available from ; Internet, accessed 22 Nov 2003.

13 Roger Roberts, “Network Centric Operations”, Speech given at the Network Centric Operation 2003 Conference, 2003, Apr 16 2003, available from ; Internet, accessed 10 November 2003. Roger Roberts is Senior Vice President, Boeing IDS Space and Intelligence Systems.

14 Roger Roberts, “Network Centric Operations” Speech, available from ; Internet, accessed 10 November 2003.

15 Arthur L. Money, Report on Network Centric Warfare Sense of the Report, March 2001. Available from ; Internet, accessed 10 November 2003.

16 Department of Defense, Network Centric Warfare, Report to Congress, iv.

17 Money, 9

18 Department of the Army, Army Vision 2010, (Washington D.C.; Department of the Army), 1, available from ; Internet, accessed 10 November 2003.

19 Caterinicchia, 2.

20 Bradley C. Logan, “Technical Reference Model for Network-Centric Operations,” Crosstalk, August 2003 [journal on-line]; available from ; Internet, accessed 24 October 2003

21 Joint Chiefs of Staff, Joint Operations Concepts (Washington, D.C.: Joint Staff J-7, November 2003): 9, available from Internet, accessed 8 November 2003.

22 Joint Chiefs of Staff, Joint Vision 2020, (Washington, D.C.: Joint Staff, J-5, June 2000): 11, available from ; Internet, accessed 10 November 2003.

23 “Information Superiority Drives Network-Centric Operations,” Sun Microsystems Boardroom Minutes, available from ; Internet, accessed 24 October 2003.

24 Department of Defense, Transforming America’s Military: Net-Centric Warfare, White Paper (Washington D.C., Assistant Secretary of Defense Command, Control, Computers and Intelligence) available from ; Internet, accessed 16 November 2003.

25 “About Network Centric Operations,” Strategic Architecture, [journal on-line]; available from ; Internet, accessed 24 October 2003.

26 Joint Chiefs of Staff, Unified Action Armed Forces, Joint Pub 0-2, (Washington, D.C.: Joint Staff J5, 10 July 2001): xiii.

27 Full spectrum dominance is the defeat of any adversary or control of any situation across the full range of military operations.

28 Department of Defense, Joint Vision 2020, 2.

29 Department of Defense, Network Centric Warfare, Report to Congress, iv.

30 Ibid, v.

31 Ibid.

32 Department of Defense, Network Centric Warfare - Creating a Decisive War fighting Advantage, Brochure (Washington, D.C., Director, Force Transformation, Office of the Secretary of Defense, Winter 2003): 1, available from ; Internet, accessed 10 January 2004.

33 Ibid.

34 Ibid.

35 Ibid.

36 Ibid.

37 Ibid.

38 Ibid

39 Steven W. Boutelle, “Global and Pervasive Information for Joint Warfighters,” Army, October 2003, 143. Lieutenant General Boutelle is the U.S. Army G6.

40 Department of Defense, Transformation Planning Guidance, (Washington, D.C., Department of Defense, April 2003): 3.

41 Joint Chiefs of Staff, An Evolving Joint Perspective: US Joint Warfare and Crisis Resolution In the 21st Century, White Paper (Washington, DC, Joint Staff, J7: 28 January 2003), 33, available from ; Internet, accessed 10 November 2003.

42 Alberts, Garstka, and Stein, 94.

43 Joint Chiefs of Staff, An Evolving Joint Perspective: US Joint Warfare and Crisis Resolution In the 21st Century, 33.

44 C4ISR is a Department of Defense acronym that stands for Command, Control, Communications, Computer, Intelligence, Surveillance, and Reconnaissance. Its definition is generally equivalent to the term “enterprise architecture” used in the commercial sector.

45 Joint Chiefs of Staff, Enabling the Joint Vision (Washington D.C.: Department of Defense, Joint Staff, C4 Systems Directorate, May 2000): 12. available at ; Internet, accessed 22 November 2003.

46 Ibid, 2.

47 Jim Garamone, “Joint Vision 2020 Emphasizes Full-Spectrum Dominance”, DefenseLink News Article, 2 June 2000, available from ; Internet, accessed 10 November 2003.

48 Robert K. Ackerman, “Special Operations Forces Become Network-Centric”, Signal Magazine, March 2003 [journal on-line]; available from ; Internet, accessed 7 December 03.

49 Ibid

50 Robert K. Ackerman, “Iraq War Operations Validate Hotly Debated Theories,” Signal Magazine, (July 2003): 31, [database on-line]; available from ProQuest; accessed 2 November 2003.

51 Ibid.

52 David C. Hardesty, “Fix net centric for the operators,” Proceedings, (September 2003): 68, [database on-line]; available from ProQuest; accessed 2 November 2003.

53 Cebrowski, ”Network Centric Warfare: Its Origin and Future.”

54 Fredrick P. Stein, “Observations on the Emergence of Network-Centric Warfare”, Information Paper: 3, available from ; Internet, accessed 16 November 2003.

55 Kim Burger, “What Went Right,” Jane’s Defence Weekly (30 April 2003) [database on line]; available from Jane’s Defence Magazines; accessed 10 January 2004.

56 Ibid.

57 Robert K. Ackerman, “Tactical Operations Enable and Benefit from Network-Centric Warfare”, Signal Magazine, 15 Oct 2003 [journal on-line], available from ; Internet, accessed 16 November 2003

58 Hunter Keeter, “Cebrowski: Iraq Shows Network Centric Warfare Implementation”, Defense Daily (23 April 03) [database on-line]; available from ProQuest; accessed 7 November 2003.

59 David S. Alberts and Richard E. Hayes, Power to the Edge: Command and Control in the Information Age (Washington, DC: CCRP Publication Series, June 2003), 35.

60 David S. Alberts, Information Age Transformation: Getting to a 21st Century Military (Washington, DC: CCRP Publication Series, June 2002): 32.

61 Ackerman, “Special Operations Forces Become Network-Centric.”

62 Ibid.

63 Roxana Tiron, “Army’s Blue-Force Tracking Technology was a Tough Sell,” National Defense, (December 2003): 20 [database on-line]; available at ProQuest; accessed 10 January 2004.

64 Department of Defense, Network Centric Warfare - Creating a Decisive War fighting Advantage, 2.

65 Robert Ackerman, “Special Operations Forces Become Network-Centric.”

66 Matthew French, “Iraq shows IT work needed,” Federal Computer Week, 5 September 2003: 1 [journal on-line]; available at ; Internet, accessed 26 October 2003. French credits this statement to Marine Major General James Nattis, commanding general of 1st Marine Division during Operation Iraqi Freedom.

67 One emerging impediment is the practical matter of increasing the number of Internet Protocol (IP) addresses available for routing on the network to support NCW. Routing (controlled movement of data packets) across the network currently relies on node-unique IP addresses known as IP version 4 (IPv4). IPv4 is a 32-bit addressing scheme that supports approximately 4 billion unique addresses. Most of these are already permanently assigned to specified users. According to the Assistant Secretary of Defense for Networks and Information Integration (ASD-NII) John Steinbit, DoD will need to migrate to IPv6 to support the transition to network centric operations. IPv6 uses a 128-bit addressing scheme that will provide a virtually unlimited number of IP addresses. Although DoD intends to transition to IPv6 by 2008, there will likely be some “speed bumps” along the way that will push this transition out to 2010 or beyond. Similarly, systems that are not compatible with this new protocol will have to be replaced.

68 Thomas P.M. Barnett provides a good summation of impediments and risks associated with applying NCW in “The Seven Deadly Sins of Network Centric Warfare” published in the U.S. Naval Institute’s Proceedings, January 1999: 36-39, available from ; Internet, accessed 16 November 2003.

69 David S. Alberts et al., Understanding Information Warfare (Washington, DC: CCRP Publication Series, July 2002): 286.

70 Ibid.

71 Ibid.

72 Megan Scully, “Communications Snags Plagued U.S. Troops,” Defense News, 19 Jan 2004: 8, available from ; Internet, accessed 28 January 2004.

73 Dawn S. Onley, “Army Reviews Bid for Tactical Net,”, Government Computer News, 20 May 2002 [journal on-line], available from ; Internet, accessed 14 January 2004.

74 Patrick Rayermann, “Exploiting Commercial SATCOM: A Better Way”, Parameters, Winter 2003-2004: 54-55.

75 Ibid.

76 Ibid.

77 The Joint Tactical Radio System (JTRS) is a family of software programmable radios that will provide reliable multi-channel voice, data, imagery and video communications, virtually eliminating communications problems caused by stovepipe legacy systems. It is designed to support the attainment of information superiority. A fact sheet on the JTRS is available from ; Internet, accessed 3 December 2003.

78 Alberts, Information Age Transformation: Getting to a 21st Century Military, 32.

79 Network security threats to the envisioned C4ISR infrastructure include both internal and external actors ranging from unsophisticated “script kiddies” to more technologically advanced hackers, terrorists or state sponsored actors. The CRS Report to Congress on Cyber warfare lists China, Russia, France and Germany as examples of state sponsored actors who may use cyberspace to conduct industrial espionage or disrupt the operation critical infrastructure to their advantage. These actors seek to gain unauthorized access to disrupt operations, corrupt data, or steal sensitive information. They employ malicious code to disable networks and use tools to map and exploit vulnerabilities in Microsoft and Unix-based software applications and operating systems that were unintentionally created during software program development. According to statistics provided by the Carnegie Mellon sponsored Computer Emergency Response Coordination Center (CERTCC), over 4,100 such vulnerabilities were reported last year, with the top 10 known vulnerabilities being the most exploited.

80 “Success in Iraq May Affect Defense C4ISR Investment Plan, New Report Says,” C4ISR News, 24 June 2003, [database on-line]; available from ProQuest; accessed 7 November 2003.

81 Frederick W. Kagan, “The Art of War,” The New Criterion: 8, available at ; Internet, accessed 11 November 2003.

82 “Near Term Budget Decisions to Map NCW Approach for DoD,” C4I News, (30 October 2003) [database on-line]; available from ProQuest; accessed 7 November 2003.

83 Kagan, 8.

84 Folke Rehnstrom, “Moving Towards network centric warfare,” Military Technology, (August 2002) [database on-line]; available from ProQuest; accessed 7 November 2003.

85 Kagan, 9.

86 Christopher J. Toomey, “Army Digitization: Making it Ready for Prime Time”, Parameters, Winter 2003-2004: 49. Colonel Toomey served as Chief, C4ISR and Battle Command, Army Transformation Task Force at Fort Lewis, Washington.

87 Ibid.

88 French, 1.

89 Department of Defense, Transformation Planning Guidance, 1.

90 Department of the Army, Army Transformation Roadmap, (Washington D.C.: Department of the Army, 2002): 7, available from ; Internet, accessed 10 January 04

91 Department of the Army, The Way Ahead, Our Army at War…Relevant and Ready, White Paper, (Washington D.C.: Department of the Army, Army Strategic Communications, 2003): 12.

92 Department of the Army, Army Knowledge Management Version 2.1, A Strategic Plan for an Agile Force, White Paper, (Washington D.C.: Department of the Army, 2001): 3.

93 Alberts, Information Age Transformation: Getting to a 21st Century Military, 32.

94 Department of Defense, Joint Vision 2020, 11.

95 Alberts, Information Age Transformation: Getting to a 21st Century Military, 55.

96 Ted Hendrickson, “Evolution of Technology Aids Cost Estimating,” 2 May 2003, available from ; Internet, accessed 17 January 2004.

97 Joint Chiefs of Staff, Command and Control for Joint Air Operations Joint Pub 3-30, (Washington D.C.: Joint Staff, 5 June 2003): III-19 – III-21. This reference provides a summary of the current Air Tasking Order (ATO) cycle and targeting processes. It is interesting to note that this doctrinal reference was published after the NCW concept was adopted by DoD as the focus for transformation – suggesting that current doctrine is out of step with the application of NCW concepts.

98 Joint Chiefs of Staff, Enabling the Joint Vision, White Paper, (Washington D.C.: Joint Staff, J-6, May 2000): 16, available from ; Internet, accessed 22 November 2003.

99 Department of Defense, Network Centric Warfare, Report to Congress, B-1.

100 Arthur K. Cebrowski and Thomas P.M. Barnett, “The American Way of War,” Proceedings, January 2003: 42 [database on-line]; available from ProQuest; accessed 16 January 2004.

101 Jim Garamone, “Joint Vision 2020 Emphasizes Full-spectrum Dominance,” Defenselink News Article, 2 June 2000, available at ; Internet, accessed 10 November 2003.

102 Curt Copley, “A Commander’s Network-Centric Odyssey,” Proceedings, January 2003, [database on-line]; available from ProQuest; accessed 16 January 2004.

103 Clyde T. Wilson, “Training Transformation to Future Combat System (FCS),” Armor, (Jan/Feb 2003): 24 [database on-line]; available from ProQuest; accessed 17 January 2004.

104 Toomey, 43.

105 Defense and the National Interest discussion board, “Will Army Digitization Work? – Mud Soldiers Sound Off,” available at ; Internet, accessed 16 January 2004.

106 Dennis J. Reimer, “Dominant Maneuver and Precision Engagement,” Joint Forces Quarterly, Winter 1996-97: 13.

107 William S. Scott and David Hughes, “Nascent Net-Centric War Gains Pentagon Toehold,” Aviation Week & Space Technology, (27 Jan 2003): 50 [database on-line]; available from ProQuest; accessed 16 January 2004.

1   2   3   4   5   6   7   8   9


Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©atelim.com 2016
rəhbərliyinə müraciət