Adapting Warfare to Social and Technological Change Some Tentative Thoughts Bob McDaniel Full Impact of Information Revolution Yet to Come • Electrification did not raise productivity until the structure of factories changed. • Information Revolution’s primary impact will come only after other fundamental organizational changes. • We have not yet used technology to change our essential relationship to machines, but only to perform more efficiently existing processes. Steam to Electricity • Old system designed to reduce friction: machines were grouped around a prime mover (steam engine) - power transmitted by belts, gears and axles. • New system: each machine has its own power source and, in order to facilitate the flow of production, machines laid out in most efficient manner to achieve that end. Sundering of the Nation-State • World is organizing itself into a series of interconnected networks. • Simultaneously, nation states find themselves torn in two directions - upward toward international security, trade, and social organizations and downward by subnational movements that want to splinter the state. Emergence of the Small • Empowerment of the individual entrepreneurship, free agency • Downsizing, outsourcing, networking of businesses • Growth of regional and cultural consciousness • Biotechnology - the Genome Project • Nanotechnology - nanomachines • Non-linear complex systems and the significance of small events (tipping points or "points of singularity") The implication for small armed forces, such as Canada's, is that a technologically capable force is now a real possibility. Large/Few vs. Small/Many • In time, the large, the complex, and the few will have to yield to the small and the many. • Systems composed of millions of sensors, emitters, microbots, and miniprojectiles, will, in concert, be able to detect, track, target, and land a weapon on any military object large enough to carry a human. • Analysts talk about the mesh, a system of systems including not only links between people and computers, but also weapons systems, aeroplanes, remote cameras, automated factories and warehouses, intelligent buildings, hospitals, weather stations, satellites, and so on. Parallel with the Economy • First was the Agrarian Revolution. • Then followed the Industrial Revolution with mass production and mass warfare. • If we are now in the process of transforming the way we create wealth, from the industrial to the informational, there is a parallel change taking place with warfare. • It is logical to assume the fourth generation of war will also take its shape from society. • Fourth-generation warfare is highly irregular. "Asymmetric" operations — in which a vast mismatch exists between the resources and philosophies of the combatants. Many small firms can outdo the giants through their agility. • Emphasis is on bypassing an opposing military force and striking directly at cultural, political, or population targets. Many businesses thrive by exploiting niches that the giants find difficult or costly to service. • the implementation of ‘dominating manoeuvre’ by ‘agile’ military forces deployed on a ‘just-intime’ basis parallels agile manufacturing and justin-time production systems. Paradigm Shift Paradigm Shift = Machine -----> Organism (Top down (Bottom up Design) Design) Each cell "knows" what to do based on its context. Mathematics and Change Type of Problem War Operations Economy Line/Area Tactics of line and column Agriculture Calculus Dynamics Massed firepower Industrial (Steam) Matrix Algebra Complex Linear Manoeuvre Assembly Line Fractals Chaos Complex NonLinear Swarming E-Commerce Mathematics Geometry Chaos Wars If you look around the world today, you can list approximately 51 significant conflicts going on somewhere at any given time. US military forces are active in about five places. But big conflict, big war seems to be a thing of the past. Are we in a new era of lots of persistent low-level conflicts, what could be called the "era of chaos wars"? Why Canadian Forces Excel Tuesday November 27, 2001 The Guardian "What we are looking at is chaos and ambiguity," says Air Vice-Marshal Brian Burridge, describing what senior officers in the military face in a world of low-intensity warfare and collapsed states. It is their responsibility to see that those who will be called upon to command in these circumstances are able to cope. Comments about the Canadian Military From A Soviet Document: "One of the serious problems in planning against Canadian doctrine is that the Canadians do not read their manuals nor do they feel any obligation to follow their doctrine." A German General Officer: "The reason that the Canadian Army does well in wartime, is that war is chaos, and the Canadian Army practises chaos on a daily basis." Anonymous 1st Canadian Division Staff Officer: "If we don't know what we are doing, the enemy certainly can't anticipate our future actions!" The Mesh • Combat requires doing two things: finding targets and hitting them (while avoiding the same fate). • PGMs allow their possessors to hit most anything. • Tomorrow's meshes will allow their possessors to find anything worth hitting. Every trend in information technology favours the ability to collect more and more data about a battlefield, knitting a finer and finer mesh which can catch smaller and stealthier objects. Dominant InfoAge Social Structure is the Network • Exploration of emergent social structures leads to an overarching conclusion: dominant functions and processes in the information age are increasingly organized around networks. • New information technology paradigm provides material basis for network's pervasive expansion throughout the entire social structure. Hierarchy to Network Evolution of Street Gangs Local International Global 1st Generation 2nd Generation 3rd Generation Turf Gang Drug Gang Mercenary Gang Turf Protective Market Penetration Power/Financial Acquisition ProtoNetWarrior Emerging NetWarrior NetWarrior Citizen Activists • Ordinary citizens have used the handheld video camera, the telephone, the fax and other communications technologies to make their causes known: Philippines, South Africa, Zapatistas, ban landmines movement. • Anti-WTO activists in Seattle were systematic, well-organized and well-funded. Using modern communications, including the Internet, they were able to execute simultaneous actions by means of pulsing and swarming tactics coordinated by networked and leaderless "affinity groups". Empowering Disparate Groups • A new generation of communications satellites will inexpensively link virtually every part of the globe. Importantly, one report noted that for "disadvantaged regions of the world . . . The coming satellite communications revolution could be one of those rare technological events that enable traditional societies to leap ahead." Decline in Distinction Between Military and Civilian The distinction between war and peace will be blurred to the vanishing point. It will be nonlinear, possibly to the point of having no definable battlefields or fronts. The distinction between "civilian" and "military" may disappear. Civilian/Police Counter-Terrorism • Los Angeles has set up a Terrorism Early Warning Group (TEW), a hybrid organization blending networked organizational features with traditional government structures: law enforcement, fire services and health authorities at all levels of government. • TEW serves as a mechanism for monitoring terrorist trends and potentials, and rapidly disseminating alerts and warnings. • TEW uses an "intelligence toolbox" consisting of virtual reachback to technological specialists and advanced methodologies to help project consequences. A New Mode of Conflict • Cyberwar means operating in small, dispersed units, so well internetted that they can coordinate, coalesce, and then disperse again in repeated swarming attacks. • Initially, light ground units infiltrate and take up dispersed positions. As areas cleared, helicopter insertions made more frequently. • Units may then act as scouts and guides (sensors), calling in accurate air, artillery and missile fire on multiple targets. Ever since the end of the Cold War Western forces have lagged in developing the correct military response to 4GW—a response that calls for reliance on smaller units versed in manoeuvre warfare. This kind of fighting eschews heavy firepower, attrition, and long-range, high-altitude bombardment. It favours joint-service operations and close-quarters combat involving small, fast-moving units with lighter equipment. In tactical terms, this means coordinating intelligence on a global scale. It means rapier thrusts against 4GW bases and cells, slicing up the networks linking the cells, and taking out the fanatics who supply the brains and the resources to conduct this kind of indiscriminate warfare. Because the nation-state no longer holds a monopoly on destructive force, a most important change in how 4GW is confronted is to henceforth ordain that the sanctuary of "national sovereignty" is no longer sacrosanct, can no longer be honoured when employed as a facade for sheltering, endorsing and provisioning non- national 4GW assets and formations. As in any conflict, the military task must be to disarm the enemy and neutralize his offensive capability, employing the weapons and tactics appropriate for the task. To understand the potential shape of the fourth generation of war, we must look at the political, economic, and social changes in society as well as the changes in technology since the advent of the third generation of war. Politically the world has undergone vast changes. The third generation of war developed when international relations were defined in terms of the European nation states that dominated them. In contrast, the fourth generation of war is coming of age during a period of exponential increase in the number and type of players on the international scene. Emergence of Netwar • Conflicts will increasingly be "netwars" or clashes involving networks rather than traditional, hierarchical adversaries. Network of 9/11 Hijackers Frequency Distribution of Links Log/Log Graph of HiJacker Net Network Analysis 1 3 4 1 1 1 2 1 1 1 3 2 4 5 2 3 1 1 4 1 1 5 5 1 1 Bombnet is a group of social network analysts studying the structure and potential vulnerabilities of terrorist networks. Netwar vs. Cyberwar Netwar - focuses on new processes enabled by technology (Networks: Nodes/Links) Cyberwar - technologizes present structures. • Cyberwar is concerned with traditional military aspects like Command, Control, Communications and Intelligence, also called C3I. • Netwar refers to information-related conflict at a grand level between nations and societies. The Evolution of Flows and Forces • Melée — the primeval state of war with no discernible organization, no need for C2, and no technologies beyond the visual and the aural acuity of the combatants. Aerial dogfights in both World Wars are examples. • Massing — where written messages and primitive signaling enabled a hierarchically organized central authority to command and to control dispersed mass forces, achieving maximum shock and firepower. These tactics were last seen in attrition war on the linear battlegrounds of World War I, World War II, and in Korea. • Manoeuvre — exploiting electronic communication and sensing technologies for command and control of complex, synchronized, multilinear operations that surprised, penetrated and flanked, and focused on the decisive point. These have been described as twoway technologies that turned armed forces into sensing as well as fighting units and were most recently seen as AirLand doctrine in operation Desert Storm. • Swarming — "a seemingly amorphous, but deliberately structured, coordinated, strategic way to perform military strikes from all directions … sustainable pulsing of force or fire … from a myriad of small, dispersed, networked manoeuvre units", and where information and sensing technologies empower lower level units to function more effectively without hierarchical command levels. Swarming It will work best — perhaps it will only work — if it is designed mainly around the deployment of myriad, small, dispersed, networked manoeuvre units (called "pods" organized in "clusters"). Tactics of Swarming Swarming can be conceptually broken into four stages: locate, converge, attack, and disperse. Swarming forces must be capable of sustainable pulsing: Swarm networks must be able to come together rapidly and stealthily on a target, then redisperse and be able to recombine for a new pulse. It is important that swarm units converge and attack simultaneously. Each individual swarm unit (pod) is vulnerable on its own, but if united with other friendly units, overall lethality can be multiplied, because the phenomenon of the swarm effect is greater than the sum of its parts. Swarming + PGMs • Vulnerability of massed formations on the ground to airpower and WMD (Weapons of Mass Destruction), makes the Dispersed Swarm manoeuvre more appropriate for the future. • Swarm units can use indirect standoff weapons (both organic - carried on their persons - and nonorganic - a remote asset that has to be called to) such as missile-launched "smart" munitions or offshore naval platforms deep in the rear. • Shift from direct-fire to indirect-fire weapons will improve the mobility of the individual unit on the ground and reduce its signature. Some Recent Examples • The al Qaeda network recognizes the effectiveness of swarming. It exploits the nonlinear nature of the battle space and sees the value of attacking from multiple directions with dispersed units. • Small bands of widely distributed Kosovo Liberation Army fighters and, to a lesser extent, allied special forces, provoked the Serbs to manoeuvre and fire, instantly making them vulnerable to being attacked from the air. BattleSwarm • Cyber/netwar means operating in small, dispersed units, so well internetted that they can coordinate, coalesce and then dissever in repeated swarming attacks. • In order effectively to disorganize enemy forces, it would require mobilizing - and deploying in "BattleSwarm" - a force only one tenth the size of the enemy forces. • In a hierarchy, people are defined by the boxes they fill on the organizational chart. In a network, people change their roles depending on the situation. • Future armed forces look like hordes of cyberMongols. • Arrayed not in platoons or battalions but in "clusters" and "pods." • Call in airstrikes and direct cruise missiles remotely. • Infiltrating the landscape in copters and off-road buggies, they float like butterflies but sting like sledgehammers. Offensive Swarming Swarming Attack Pattern Chaos (Hidden Order) Break Off & Reorganize Maelstrom (Pattern Recognition) Situational Awareness System “Ride the Wave” From Mars to Minerva • RAND Corporation researchers Arquilla and Ronfeldt describe information as a physical property, on a par with matter and energy. • Derive a new conception of power, and therefore of war. Instead of being based on material resources, from now on power resides in relations between people, and thus in organization. From the brute power of the god Mars we are passing to Minerva, the goddess of wisdom. • Shift from war based on mutual capacities for destruction, to war in which the capacity for disruption, or disorganization, assumes equal importance. • Researchers distinguish four levels of what they call their "vision". • At the conceptual level, information gives form to structure. • A major consequence of the information revolution - the rise of network forms of organization. • The core of their military doctrine is the notion of "BattleSwarm". With each combatant in contact with all others, and unit commanders communicating with air force commanders and with other units it should be possible to employ fewer personnel with greater effectiveness. • The overall strategy is what may be called "guarded openness". The free circulation of information serves the interests of the Allies and victory in tomorrow's wars will go to those who can tell the best story. It will be a dirty, noholds-barred propaganda war of competing worldviews and alternative visions of the future (Meme Wars). Power of Mind • Military power resides in the domain of the mind and the will: thinking, valuing or attitude, and insight or imagination. • Military power can increase in effectiveness even as it decreases in violence. • May be called neocortical warfare. Telematic Laws Moore's law states that microprocessor chips will either halve in price or double in power every 18 months. Gilder's law states that total bandwidth of communications systems will triple every 12 months. Metcalfe's law explains, in global constellations such as the Internet, the value of the network increases geometrically with the number of people who use it. Grosch's law held that doubling the cost of a computer multiplied its power fourfold. Since then, the cost- performance ratio of computers has flipped; it is greater at the lower end than the upper end. Microprocessors deliver more mips (million instructions per second) for the buck than their more sophisticated mainframe or even supercomputer rivals. Tactical Command, Control and Communication Systems (TCCCS) Athene IRIS -- [Battalion] Situation Awareness System Athene - Command & Control at the battalion and above level for use in harsh combat conditions. SAS- situational awareness system displays battlefield information in real time at the Battalion Battle Group and below level. Situational Awareness System • Enables the battlefield commander to track and direct all his assets in near real-time, using global positioning satellites (GPS). • Instantaneous moving map manipulation and display on a theatre-wide scale. • Detailed maps are scanned and stored. • Boosts by a factor of up to 25 times the amount of geographic information available to today's soldier on the battlefield. Digital Mapping • Enables commanders and planners to view maps at the exact scale and level of detail most appropriate to the task being considered. • Geographic Information Systems (GIS) capabilities allow the latest physical and objective data to be overlaid, together with dispositions of own and opposition resources. • Transmit map data to operational units for local production, on-screen viewing. Head Mounted Display The helmet HUD (heads-up display) allows maps to be displayed with relative positions of pod mates, or three-dimensional layouts to be superimposed in their field of vision. Such wearable computers link together components such as a radio system, a rifle-mounted video camera and thermal sight, and GPS. battleWEB Vehicle Tactical Infosphere • Tactical infosphere is a term for information on demand, or information pull as opposed to push. • SAS and Athene programmes designed to provide a portion of the information required to fill the infosphere. • Almost every Canadian tactical vehicle and selected soldiers on foot will be part of the continuously updated database. • In the future, enemy locations may be entered by sensors, including soldiers, and passed automatically throughout the system. • Disparate pieces of information must be integrated into a cohesive system. • Involves pulling different types of sensor information into this infosphere, processing this information in different places, transporting it and presenting it in a manner that permits a commander to make an intelligent decision based on the data. Real-Time Warfare • Knowledge army does not require co-location of cells to plan, direct and monitor the progress of operations. • Complete sharing of available information and using the information-pull principle means that up-to-date information is being added to the infosphere continually. • Commander and his staff will be separated geographically so they are in the location that best supports their individual functions. • Video conferencing and electronic white boarding will enable these virtual CPs to operate in real-time. Virtual Reality Training for War • Modified version of the popular game "Doom" enables troops to interact and practise fairly realistic small unit tactics and fireteam drills. • Computer simulator makers have developed workstations that allow company, battalion, brigade, and even division level officers to practise large unit engagement techniques in realistic virtual circumstances. • Develop interactive skills that are useful in practising modern "Air-Land-Battle" doctrine, that is needed in today's extremely fluid battlefield environment. Peer-to-Peer (P2P) Computing • By linking together hundreds of soldiers, each equipped with a head-mounted display that broadcasts details of a virtual environment, it would be possible for military units to accurately simulate various scenarios. • Section/pod could virtually practise an attack while out in the field, before carrying it out for real. "Your training system suddenly becomes your mission-planning system. Before I go attack that hill. I'm going to run a simulation of it with my squad over the next 10 minutes, and simulate it virtually while we're waiting here for orders." Information Warfare • "Info War" is not the same as intelligence operations, although it is clearly related to intelligence. • An attack on an adversary’s entire information, command and control, and, indeed, decisionmaking system. • Directed at shrinking or interfering with the enemy’s Observe, Orient, Decide, Act (OODA) loop while expanding and improving our own. • Planners describe the objective of information war as "information dominance." There are 7 different forms of Information Warfare: (i) command-and-control warfare (which strikes against the enemy's head and neck), (ii) intelligence-based warfare (which consists of the design, protection, and denial of systems that seek sufficient knowledge to dominate the battlespace), (iii) electronic warfare (radio- electronic or cryptographic techniques), (iv) psychological warfare (in which information is used to change the minds of friends, neutrals, and foes), (v) "hacker" warfare (in which computer systems are attacked), (vi) economic information warfare (blocking information or channelling it to pursue economic dominance), and (vii) cyberwarfare (a grab bag of futuristic scenarios). All these forms are weakly related. Distributed Intelligence • Most of the recent benefits of information technology are going, not into more powerful computers, but into more widely distributed intelligence. • Computers can be slaved to sensors and networked. Role of Unattended Sensors • Unattended sensors in a future theatre of operation detect enemy movements, identify and locate targets, and feed that information via unmanned aerial vehicle communications network nodes to the command centre. • Commanders collate their data with other information from space and Allied-based sources, then signal unattended battlefield and airborne weapons to launch against enemy assets. • “Precision weapons without current, precise knowledge of target locations are pretty useless.” Sandia advocates networking small gadgets that might package a global positioning locator, sensor, RF communicator, and a small computer. These relatively inexpensive devices would be widely distributed and in contact with each other to give a comprehensive picture of enemy movements. • A fractal approach — small patterns that repeat larger patterns — to integrating security will help autonomous groups integrate data currently in separate boxes. Targeted groups include law enforcement, intelligence, public health, first responders, scene commanders, local governments, and private citizens. Information on Demand The military is seeking ways to help soldiers on the ground in places such as Afghanistan get information faster. The idea is to let them establish ad hoc computer connections with forces, say, inside helicopters in Uzbekistan, or with officers back home and even with allies abroad, without getting bogged down in multiple security levels and incompatible software systems. Rapid Prototyping: Parts on Demand • Today armies depend on pre-positioned supplies or a gigantic logistics tail to provide, say, spare helicopter parts. • Future armies, relying on advanced computing and "rapid prototyping," will before long be able to make many needed items on the spot. The technology can build objects of any desired shape out of metal, paper, plastic, or ceramics, according to instructions transmitted from data bases thousands of miles away. • This will reduce the need for permanent foreign bases or supply depots. Grid Technology • Related to Rapid Prototyping will be the widespread implementation of Internet2 technology, enabling computer users to order computing power from the grid. • Super-high-bandwidth Internet2 and readily available supercomputing power promises to deliver applications like streamed high-definition video, telemedicine, research collaboration, and distance learning. • This will facilitate "reachback", the remote contacting of any information source, civilian or military, from the battlefield. Platform-Centric vs. Net-Centric There is a parallel in the way Western forces fight battles today and the way computing worked in the 1980s. Just as you and your friend worked on incompatible operating systems and software, the military operates on independent weapons platforms. Carrier groups are platforms, as are Leopard tanks and F-18 aircraft, each operating with their own standards. And just as you and your friend wasted time trying to coordinate your different platforms, military experiments have found that platform-centric warfare takes twice as long to destroy 50 percent fewer targets than does network-centric warfare. Net-Centric Warfare Value of Netcentricity • Allows for vast global connectivity, real-time collaboration, and rapid and convenient information exchange. • It has produced a significant byproduct as well reduced costs. Moving information is far less costly than moving people and things. • For the individual networked soldier the numerous elements of support: weapons, intelligence, medical services, etc. may be viewed simply as peripherals, to be contacted instantaneously as required. Netcentricity has allowed companies to downsize while simultaneously increasing productivity. For example, FedEx's PowerShip customer tracking software boosted both customer volume and satisfaction while allowing for an 80-percent reduction in customer service representatives. For the military, the promise of being able to mass effects rather than forces, to leave people and machines where they are, and to create smaller, intheatre footprints, are just a few of the benefits to be derived from its version of netcentricity: Net-Centric Warfare (NCW). NCW describes how the military will organize and fight in the Information Age. By networking sensors, decision makers, and shooters, a shared awareness is created, which enables faster decision-making, higher tempo operations, greater lethality, increased survivability, and self-synchronization. And because NCW promises a better distribution of resources to tasks than was possible in the past, operations, which may have been impossible under a traditional warfare model, might become feasible in the future. New Weapons and Countermeasures • • • • • • • Precision-Guided Munitions (PGMs) Non-Lethal Weapons Unmanned Combat Aerial Vehicles Stealth Technology Anti-Ballistic Missile System Bluetooth and Networking of Sensing Devices Space Technology New Infantry Weapon • Removable top barrel hurls 20mm high-explosive airbursting fragmentation rounds more than a half-mile. The lower barrel shoots NATO-standard 5.56mm ammunition. These rounds provide accurate single-round or bursts to about 500 yards. Laser-guided electronics as sophisticated as on a modern tank. Lasers of Lead • Australian inventor Mike O'Dwyer has developed a machine gun that can fire bullets at a rate of 1 million rounds per minute. • Rather than use mechanical firing pins to shoot bullets one by one, O'Dwyer's gun holds multiple bullets in the barrel -- one behind the other. • Electronic charges set off in different parts of the barrel, just fractions of a second apart, fire the bullets in fast succession using traditional gunpowder. • The all-electronic handgun uses the technology to ensure the gun can only be fired if its user is wearing a special ring that emits an electronic signal. This means the gun would be worthless if it is taken from a policeman or soldier by an assailant. Counter-Network Networks Taking a cue from LA's TEW we might envision the following elements in a military network to fight adversary networks: A network of modules (pods) each comprised of experts covering all levels of expertise. Individual experts/soldiers in contact with relevant contacts anywhere in the network. Virtual reachback to experts in business, government and academia in realtime. Group software enables pods and individuals to collaborate on plans and actions when responding to threats. A Role for NGOs • Another way to boost the quality and quantity of intelligence is to cultivate more of an open source model - by including nongovernmental organizations, like Amnesty International, in the network. • This will make it possible to draw on the knowledge of activist groups already engaged in waging social netwars around the world. • Adding NGOs to a sensory network will also help develop loyalty to a cause. The al Qaeda network draws its strength from the tight religious and kinship bonds among its members. To be effective, the Allies' counternetwork will need to have its own binding, democracy-driven value system. Books on Networks