PRCC eht tuobA sah )PRCC( margorP hcraeseR evitarepooC RSI4C ehT the mission of improving DoD’s understanding of the national security implications of the Information Age. Focusing upon improving both the state of the art and the state of the practice of command and control, the seitinutroppo eht fo egatnavda lluf ekat DoD spleh PRCC seusrup PRCC ehT .seigolonhcet gnigreme yb dedroffa noitamrofni ni sisylana dna hcraeser fo margorp daorb a superiority, information operations, command and taht stpecnoc lanoitarepo detaicossa dna ,yroeht lortnoc eht evorpmi ot ssenerawa derahs egarevel ot su elbane effectiveness and efficiency of assigned missions. An important aspect of the CCRP program is its ability to serve as a bridge between the operational, technical, analytical, and educational communities. The CCRP provides leadership for the command and control research community by: issrueeassrce;traiirctcuihlc aatli ng n working to strengthen command and control n infrastructure;research ;aisopmys dna spohskrow fo seires a gnirosnops n serving as a clearing house for command and n crroeenflstuaaerntnaodedrlidc n hg ; eht edulcni taht sevitaitini hcaertuo gnitanimessid n PublCSiCecRraPit eiso.n This is a continuation in the series of publications produced by the Center for Advanced Concepts and Technology (ACT), which was created as a “skunk works” with funding provided by the CCRP under the auspices of the Assistant Secretary of Defense (C3I). This program has demonstrated the importance of having a research program focused on the national security implications of the Information Age. It develops the theoretical foundations to provide DoD with information superiority and highlights the importance of active outreach and dissemination initiatives designed to acquaint senior military personnel and civilians with these emerging issues. The CCRP Publication Series is a key element of this effort. Check our website for the latest CCRP activities and publications. www.dodccrp.org DoD C4ISR Cooperative Research Program ASSISTANT SECRETARY OF DEFENSE (C3I) Mr. Arthur L. Money SPECIAL ASSISTANT TO THE ASD(C3I) & DIRECTOR, RESEARCH AND STRATEGIC PLANNING Dr. David S. Alberts Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors. They do not necessarily represent the views of the Department of Defense, or any other U.S. Government agency. Cleared for public release; distribution unlimited. Portions of this publication may be quoted or reprinted without further permission, with credit to the DoD C4ISR Cooperative Research Program, Washington, D.C. Courtesy copies of reviews would be appreciated. Library of Congress Cataloging-in-Publication Data Alberts, David S. (David Stephen), 1942- Volume III of Information Age Anthology: The Information Age Military David S. Alberts, Daniel S. Papp p. cm. -- (CCRP publication series) Includes bibliographical references. ISBN 1-893723-03-8 97-194630 CIP March 2001 V III OLUME I A NFORMATION GE ANTHOLOGY: The Information Age Military E DITED BY D S. A AVID LBERTS D S. P ANIEL APP TABLE OF CONTENTS Acknowledgments ................................................ v Preface ................................................................ vii r —renyatorW p ia—eantt1ghiai ACmlerihoMtfnI divaD .S streblA dna leinaD .SppaP ................... 1 traPno ietncOudortnI ......................................... 29 noita my rgdoenf tandaInr atrrSeGt—p2ahC leinaD—erafraWeruoG ...................................... 41 retpahC ehT—3 raW retfA elteyaBhciM—ytiC Vlahos ................................................................. 73 re tnp oa niheatCrCaa—mf4rroafWneIB Deterred?—Stephen Blank .............................. 125 yy rgraenettotia iplrdtaitnahMSamC—r5ofnI War—Future of VisAilotTneesrc nhantoilvoeg y: nevetSzteM ....................................................... 159 IntroductionTwo Part ...................................... 199 Chap6t—eJro Viinst2i 0o1n0 .......................... 213 retpahC ymrA—7 noisiV0102 ......................... 239 thefoVri s8iEC—onhGngal apAogt beeamrle nt: ts 1y2rutne CriAecroF ..................................... 271 Ch9a—pFtoerrwS aeradt…hFer om ............... 293 ret p.aSh.CU— 0n:1oyivtaeaNrmarforfanWI Strategic Plan ................................................... 313 i rleatnpoaihtC arreevpuOe—n1a1M morfeht CPortnohfcAjSeoNe ee rapca vtot:a fi l on rewoPerohsA ................................................... 341 QuDaedfreennstnehiea l o1f2 —CRheappotretr mailliW—weiveR .SnehoC .............................. 357 Part Three Introduction .................................... 403 er ur: tertutanFpWe— am3nhs1ACfsoessA 2010 in CampAaeirgonssp ace (excerpts) — Jeffrey R. Barnett ............................................. 413 Chapter 14—Network-Centric Warfare: Its Origin and Future—Arthur K. Cebrowski and John J. Garstka ............................................... 469 NetCwho1oDafSS5rep ei—katvnT-deeshlrn ey Centric Warfare—Thomas P. M. Barnett ........ 489 n o ritetatuhp lWyano—rhiv6aCe1tRiliM nmhaeiolHliW—?sriaffA .................................. 503 noitcudor trn uItorFaP ...................................... 537 Chapter 17—A Failure of Vision (retrospective) —Fred Kennedy, Rory Welch, and Byron Fessler ......................................... 549 Sub-fSrtToahmtr eeatI W1 C8h—aTphtee r :spuorG wyer randnAniAl—phiccasoirdprpeAtnI ,llemhtaR drahciR ,llirevO ozneroL ,irelaVdna nos rnaheoGJ ................................................... 577 rneotiptaahmCr oefrnaIf—r9a1W nilaretalitluM PeacOep erationCsAa: sS et udoSyfo malia— nkacni nRdenraB .R nasviEllE ...................... 607 ii IntegraBtoisnngi2a0:— TargCehta pter noitam rsoefintIivitcA ni ecaeP—snoitarepO PascCaolmeb elSlieesg el ............................... 657 fo htyM tnerruC eht dna ovosoK—12 retpahC samohT .L yhtomiT—ytiroirepuS noitamrofnI .... 907 noitcudor ten vItirFaP ...................................... 741 andTechno2l2o—gIyn formatioCnh apter KingdUonmi,ted The FraAnfcfeMa,ii lrist:a ry NAPThOi—lDlainpiasenldl e ........................... 749 UndoefRrusstsain2ad3ni— nTgCh hea pter noita ms rndoonfiantI anroeiptOamrofnI ThWoamrafsarLe.— Timothy .......................... 777 2C4h—aIpntfeotrrh meatiaoWnnad-r Bfaasreed .M—CR PnashEirarhA ..................................... 815 RevolMuitliiotna—ryT hird 25—TheC hapter ne’hCnauH ....................................................... 831 Policy:Defense of FCuotnucrleu sion—The andPapTpr enIdSns.fA— ogDream naiteilo n divaD .SstreblA ................................................ 845 iii ACKNOWLEDGMENTS T he editors wish to thank and acknowledge the following publishers for granting permission to reproduce these important articles in Volume III Information Age Anthology : MicVCbAhBliyfayatW tet“hyaeleTo”rr hs e, couCrtethoneSefftst o eyrrr a teagnidc MIanstsetarhcneha Suattsniuedodt nitaesls InsTteicothfun toefl roogmy WashTihneg ton Quarterly 2S0p:1r29,i,9 n 7g “ MulPteialcaetiIennr Wfaaolrr fmaartei on OperatiCoaSnAsts Seu:oo d fmy a lia by” Rick BrennaaERnnv.d Ea lnl is cooufr te,s y Science ApIpnltCieo1crr9anp9tao6itroianotsni aoln , “InforMm.atbiyPo RnC-tW”Bha aears nfedad r e AEhhrsaarni , eaaprapvlneei aaresrosr efi do n t“ehCsaihsAssiat nbyPtee rets onoevt ei ve InfSotroWumfada retfniatorsne ,” Jane’s wei veecRnegilletnI , May 1997, and “U.S. MiliSttarraPyte eNrPgesRywptC eh:ce to inv es InfForroomnfat tiieornsW- aBra,s”e d naisA Survey , December 1997 v PREFACE I meht thgif taht yratiliM eht dna sraw lliw syaw tahw n be different in the Information Age than in earlier mUi.tlSahfmtwiW.geoehith e railaas nslrt? y ? the of volume third this In AnthologyAge Information , eseht ot srewsna gnirolpxe fo ksat eht ot yllanif nrut ew vsqseiutxmbepaipusrtntlttoeghty ivd ah oi,tend se d impetus for the first two volumes of the Information Age Anthology . fo seussi redaorb eht fo emos denimaxe ew ,I emuloV nI ti woh ;si egA noitamrofnI eht tahw :egA noitamrofnI eht snaem ti tahw ;ecivres dna ,ssenisub ,ecremmoc stceffa stcef ftw aiod hn;ayratil ie mhd tntanemnrev oe ghrtof .metsys lanoitanretni eht dna srotca lanoitanretni In Volume II, we turned to the impacts and consequences of the Information Age on national ytiruces lanoitan fo erutan eht :denifed yldaorb ytiruces seitinutroppo dna ot staerht eht ,egA noitamrofnI eht ni noitamrofnI eht ni egreme yam taht ytiruces lanoitan rof ofdegree thei ntdeiarfbpforeuertti antgai nodn s Age, tcepxe thgim ew taht seussi ytiruces lanoitan ni egnahc acttuoea nlIclntoyfhu oeinr ntm earAt gieo.n Now, in Volume III, we concentrate on defense, conflict, and warfare in the Information Age. What characteristics will an Information Age military need to possess to meet current and future challenges? If gniod tnemhsilbatse yratilim .S.U eht si tahW ?woh ,os to prepare for change? How do military analysts in vii
Description: