Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
5 pages
1 file
Is it possible that ISIS is using the whole world as their 'edge'? Has western civilization been experiencing sustained attacks utilizing net centric warfare concepts without our even being aware this was happening? If we have been unable to connect the dots because we have not known where to look, or what we were looking for, then it might be easy to miss the fact that our very own command and control concepts have been used against us, so skillfully; we could not disseminate the true nature of the attacks. As western military and police forces, we are trained to be consumed with immediate action drills for tactical physical responses, for each separate individual occurrence, oblivious to the fact that each isolated incident is actually a force multiplier in a larger scheme of strategic warfare being levied against us. The model of ISIS/ identity warfare is sophisticated in its unsophistication. It is infinitely complex to unravel, because of the nature of its simplicity. Allow individuals to pull what they need to conduct operations, per unit doctrine when and as required, without the necessity for any input, command, initiation or tasking instructions. The larger aim is known to all and self-activation is as effective as large scale, multiple resource plots. They are in fact better, because they stretch resources and confuse the analysts. The only common thing about recent terror attacks is that they are all different. That in itself is an indication that something much larger is at stake. It is possible we are the recipients of a lethal type of net-centric warfare which our existing intelligence infrastructure has been incapable of spotting precisely because defense and law enforcement is trained to fight an enemy it can see. Unconnected things confuse agencies and are dismissed by law enforcement. Connectivity is the very thing which this enemy uses to its advantage because its connected nature and lack of individual physical connection is both its greatest strength and our biggest weakness. We are not configured to deal with unconnected things. Our defense and law enforcement posture is tactical and defensive and applied against a known physical enemy. What if we did not realize that we were on the receiving end of the ultimate hybrid, net-centric enemy? Welcome to the world of nodes and self-synchronization. Welcome to terrorism that we did not realize was terrorism because we did not know what to look for. ISIS' inspired attacks have been buried under assumptions of terrorist organizational structure, connections, relationships and autonomous action. When we look for terrorists we see what we expect to see and label the attacks' lone wolf', 'domestic terrorism 'or 'unconnected,' if and when they do not fit the definitions and expectations of an International terrorist agenda. Such expectations include the existence of 'masterminds' and coordinators who cross the globe, slipping in and out of countries on the direction of a terrorist 'central command'. What if we were under sustained attack by an entity with ultimate organizational agility-an enemy whose edge was the globalized, connected world and net centric warfare was literally using 'the net' not to direct but to share enough information that absolutely anyone with an axe to grind could self-activate, in the name of the cause. In the world of law enforcement the name for this is chaos. The concept of' Power to the edge' in net centric warfare is " the ability of the total force to dynamically synchronize their actions in order to achieve Command and Control (C2) " (Phister and Plonisch 2010) The objective is to shift the center of gravity as far as possible in the network, in
Future Wars (futurewars.rspanwar.net), 2017
In 21st Century warfare literature, the term “Network Centric Warfare/ Operations (NCW/ NCO)” is often used while discussing warfighting doctrines and transformational measures being taken towards modernising present-day militaries. However, there is often an inadequate understanding of this concept. Indeed, more often than not, the term is used synonymously with “networking”, whereas the concept is much deeper, and the connotations of acquiring net-centric capabilities pretty complex and far-reaching in nature. In this article, an attempt is made to throw some light on the core concept of NCW as propounded by its original authors.
The Revolution in Military Affairs (RMA) in the last decade has affected the way we live, work and fight. Advancements in the information age, coupled with the ongoing RMA, are poised to make a dramatic impact over automation, network centricity and communication security. Net-Centric Warfare (NCW) is an established theory of war that seeks to translate the gains of information gathered into a competitive war-fighting advantage through the robust networking of geographically dispersed forces. NCW is the military’s expression of information age warfare and its impacts across all the levels of war, and can be viewed as a war-fighting concept based on the premise that networking enables leveraging relevant information to maximise the mission effectiveness of diverse and geographically separated military capabilities
Future Wars (futurewars.rspanwar.net), 2018
While networks and information management are central to the concept of Network Centric Warfare (NCW), it is important to emphasize that NCW is essentially a Command & Control concept. Further, NCW is also related to the notions of Self-Synchronisation of forces, “Power to the Edge”, Effects Based Operations (EBO) and the concept of Agility. All of these are various facets of how command & control is effected on the battlefield. In this write-up, these ideas are stitched together and discussed.
Future Wars (futurewars.rspanwar.net), 2017
Network Centric Warfare (NCW) is an emerging theory of war in the Information Age. The term “network centric warfare” broadly describes the combination of strategies, emerging tactics, techniques and procedures, as well as organizations that a networked force can employ to create a decisive warfighting advantage. NCW provides a military the ability to attain a high level of shared battlespace awareness that is exploited to achieve strategic, operational, and tactical objectives in accordance with the commander’s intent. This write-up gives an overview of the origin, development and main characteristics of this 21st Century warfighting concept.
In many respects, that revolution and the internet have given individuals, organizations and nation’s incredible new power, based on constantly developing networking technology. Force becomes less usable, states have to negotiate with other actors to achieve their goals, and the very identity of the state as an actor is called into question. States are no longer closed units and they cannot control their economies. The nature of sovereignty and the processes of government have been changed. Communications have fundamentally revolutionized the way we deal with the rest of the world. Electric communications alter our notions of the social groups we work with and live in. The operations of criminals and other non-legitimate groups have become more complex, spread over a wider geographical area, and increased in scale, because the improvements in communications have made it so much easier to transfer people, money, weapons and ideas on a transnational basis. Terrorism has been particular to individual countries, have transnational aspects, or be carried out by groups in a transnational network, but it is not a single political force.
Arising from fundamental changes in American society and business, military operations increasingly will capitalize on the advances and advantages of information technology.
Nodes, Net centric warfare and the woolly mammoth: The story or ISIS against the west Consider a group of cavemen leaving the cave to go hunting a woolly mammoth. The woolly mammoth is bigger, stronger and faster. Death is certain for the cavemen and yet with spears and rocks the woolly mammoth is felled-the team splitting into three groups and surrounding the woolly mammoth without a word spoken or any communication between them. We –the western liberal world-are the woolly mammoth and ISIS is the group of cavemen hunting us. This is the best image to understand how ISIS operates internationally. Like the woolly mammoth hunters ISIS have no radios, no internet chatter, no centralised C2 (command and control) leakage once deployed. Domain awareness is provided by local knowledge, by virtue of the hunters being native to the territory. They may often have an older more experienced woolly mammoth hunter leading them, to show how to deliver the death blow. But this more experienced hunter will have trained and briefed the group before leaving the cave. They would have practised on smaller woolly mammoths and other game extensively before setting out. ISIS is a unique proposition in the modern era. It is the opposite of everything that is modern. Even its methods of engagement overseas demonstrate its basis in pre modern thinking and strategy. Force and brutality and the ability to hide in plain sight, ensures their lethality when the attack commences. ISIS operators will have had extensive experience in combat zones and be seasoned in the art of warfare. Instead of hiding on the internet these operators hide behind the proverbial trees of the pre modern woolly mammoth hunter era-they blend into the local population to hide their tracks. It is impossible to pick them out unless you know exactly what you are looking for because they are our community members. Their success rate comes from their ability to operate in isolation and silence but with a doctrinal understanding of each other's' ultimate objective. NATURE OF THREAT ISIS does have a formidable ability to conquer and control populations in their assumed territory. This comes from their functionality and the ability to deliver specialised services to their dominated populations. It is governing space with a population of 8 million. Services and jobs and salaries are provided for this population. Law and order, such as it is, is maintained. There are jails and public punishments and laws and practices which are upheld by morality police. This is a functioning society with banks and business. ISIS is therefore neither a terrorist group nor a state but it displays aspects of both. For example it has both a paid standing army as well as asymmetric expertise on land. State responders usually have to deal with one or the other but not both, simultaneously. This makes it a unique threat to states engaging with it. States think like states and fight like states but states fighting a non-state actor are at a disadvantage. To begin with non-state actors don't have to follow state rules of engagement or consider international law in shaping their tactics and behaviour.
Future Wars (futurewars.rspanwar.net), 2018
In an earlier two-part write up on “The Changing Nature of Warfare”, it was brought out how, over the centuries, warfare has undergone significant transformation due to new discoveries and innovative application of technologies, and how these inventions and discoveries have resulted in dramatic changes in military doctrine as well as operational and organisational concepts. In another post titled “21st Century Warfare: From ‘Battlefield’ to ‘Battlespace’,” the complex nature of the “arena” in which 21st century warfare is conducted, was examined. In this piece, an attempt is made to analyse the concept of Network Centric Warfare (NCW) as it relates to warfighting and battlespace concepts which have been discussed earlier.
“Teima: Revista galega de información xeral” (Santiago de Compostela), núm. 15 (24-31 de março de 1977), pág. 8.
Journal of Historical, Archaeological and Anthropological Studies, 2023
Comment réduire pauvreté …, 2002
Journal of Family Issues, 2014
Sustainability, 2024
Historia y Política, 49 (2023/1; January-June): pages 117-151., 2023
A Bethlen Gabor trontra lepesenek 400. Evfordulojan rendezett konferencia tanulmanyai, Cluj, 2014, p.48-55, 2014
Isokinetics and Exercise Science, 2006
Giros espacio-temporales: repensando los entrelazamientos globales desde América Latina, 2019
Psychoanalytic Psychology, 2015
Frontiers in Child and Adolescent Psychiatry
Advances in Nursing Science, 1988
Lingua Cultura, 2018
European Journal of Medicinal Chemistry, 2009
BMC Endocrine Disorders, 2019
International Journal of Current Microbiology and Applied Sciences
Journal of thrombosis and haemostasis : JTH, 2018