2,845
Views
15
CrossRef citations to date
0
Altmetric
Original Articles

The more you know, the less you understand: The problem with information warfare

Pages 505-533 | Published online: 16 Aug 2006
 

Abstract

Since the 1991 Gulf War military analysts have talked of a Revolution in Military Affairs (RMA), the idea that just as the ‘Information Era’ has transformed how societies live and work it has also transformed the way that they fight. Advocates of the two derivative concepts of the RMA, Information Warfare (IW) and Network-Centric Warfare (NCW), are distinguished from each other in that the former sees information as a potential weapon in and of itself whereas the latter seeks to exploit data to make regular weapons more effective. But both make exaggerated and misleading claims because the experience of recent campaigns in Afghanistan and Iraq suggests that both IW and NCW are extremely tricky to implement in practice. Moreover, ‘information’ is a double-edged sword which benefits, strengthens, and enhances the operational effectiveness of non-conventional forces as much as or more than it does conventional forces.

Notes

1Sun Tzu, Art of War, trans. S.B. Griffith (London: Oxford UP 1971), 84.

2There is less evidence to judge as far as naval warfare. No one yet has engaged in a serious fight with a networked naval force with a working ‘Cooperative Engagement Capability’; whereas, from the fate of the few who have attempted to challenge Western air superiority in recent decades the lesson has been taken not to even bother trying.

3RMA theorizing is abstracted from geopolitics and focussed on technology at the expense of manpower, organization and doctrine, according to Eliot Cohen, ‘Change and Transformation in Military Affairs’, The Journal of Strategic Studies 27/3 (Sept. Citation2004), 395–407.

4The ‘OODA loop’ is a concept originated by the strategist Colonel John Boyd (USAF) who used it first to train fighter pilots in techniques for succeeding in aerial combat. Also known as the ‘decision cycle’ or ‘Boyd cycle’ it posits that decision-making occurs in a circle – Observe-Orient-Decide-Act. Being able to process this loop more quickly than your opponent, it is argued, confers a significant advantage. For more on Boyd's ideas, his writing and numerous articles by like-minded observers of contemporary conflict see the website Defense and the National Interest: Boyd and Military Strategy, <www.d-n-i.net/second_level/boyd_military.htm> (20 June 2005).

5One hesitates to use the term ‘asymmetry’ which as Steven J. Lambakis concludes in a recent article is ‘classically general; its very ubiquity renders it irrelevant’. See his ‘Reconsidering Asymmetric Warfare’, Joint Forces Quarterly, No. 26 (Dec. Citation2004), 108. Yet if one takes the definition proffered by Roger W. Barnett, ‘those actions that an adversary can exercise that you either cannot or will not’, I think the concept retains some analytical currency. See Barnett, Asymmetrical Warfare: Today's Challenge to US Military Power (Washington DC: Brassey's Citation2003), 15.

6For a more detailed discussion of this see John Mackinlay, Defeating Complex Insurgency: Beyond Iraq and Afghanistan, White Hall Paper 64 (London: Royal United Services Institute 2005), esp. x–xi.

7Jarret M. Brachman and William F. McCants, Stealing Al Qa'ida's Playbook (West Point, NY: Combating Terrorism Center, Jan. Citation2006), 18–21.

8Alvin and Heidi Toffler, War and Anti-War: Survival at the Dawn of the 21st Century (London: Warner Citation1994) and James Adams, The Next World War: The Weapons and Warriors of the New Battlefields in Cyberspace (London: Arrow Citation1998), are representative of the respective ends of this spectrum.

9Martin Libicki, What is Information Warfare? (Washington DC: National Defense Univ. Citation1995). The forms are Command and Control Warfare, Intelligence-Based Warfare, Electronic Warfare, Psychological Warfare, Hacker Warfare and Economic Warfare.

10Martin Libicki, The Mesh and the Net: Speculation on Armed Conflict in an Age of Free Silicon, McNair Paper 28 (Washington DC: National Defense Univ. Citation1996).

11John Arquila and David Ronfeldt, ‘Cyberwar is Coming!’ Comparative Strategy 12/2 (Spring Citation1993), 141–65.

12See also Roger C. Molander, Andrew S. Riddile and Peter A. Wilson, Strategic Information Warfare: A New Face of War (Santa Monica, CA: RAND Citation1996).

13Michael Vlahos defined the infosphere as ‘shorthand for the fusion of all the world's communications networks, databases, and sources of information into a vast, intertwined and heterogeneous tapestry of electronic interchange’. See, ‘Entering the Infosphere’, Journal of International Affairs 51/2 (Spring Citation1998), 512. Joint Vision 2020 refers to the ‘information environment’: ‘the aggregate of individuals, organizations and systems that collect, process, or disseminate information, including the information itself’ (emphasis added). The resonance of the term ‘Infosphere’ with ‘biosphere’ is useful, as Jeffrey Cooper has put it, because it suggests ‘a distinct domain built on information …’. See, ‘The Emerging Infosphere: Some Thoughts on Implications of the “Information Revolution”’ (McLean, VA: Center for Information Strategy and Policy, Science Applications International Corporation Citation1997), 27. For more on this and on the broader concept of the ‘Noosphere’ see John Arquila and David Ronfeldt, The Emergence of Noopolitik: Towards and American Information Strategy (Santa Monica, CA: RAND Citation1999) <www.rand.org/pubs/monograph_reports/MR1033/> (Jan. 2006).

14Thomas Hammes illustrates this in The Sling and the Stone: On War in the 21st Century (London: Zenith Press Citation2004).

15Admiral Bill Owens, Lifting the Fog of War (London: Johns Hopkins UP Citation2000), 15.

16A point made forcefully by David Martin Jones and M.L.R. Smith, in ‘Greetings from the Cybercaliphate: Some Notes on Homeland Security’, International Affairs 81/5 (Citation2005), 925–50.

17Owens, Lifting the Fog of War, 97–102.

18Fred Barnes, ‘The Commander: How Tommy Franks Won the Iraq War’, The Weekly Standard 8/37 (2 June Citation2003), <www.weeklystandard.com/Content/Public/Articles/000/000/002/722iittz.asp?pg=1> (20 June 2005); also, Tommy Franks, American Soldier (New York: Regan Books Citation2004).

19Williamson Murray and Robert H. Scales, The Iraq War: A Military History (Cambridge, MA: Harvard UP Citation2003), 233.

20Frank Hoffman, ‘Small Wars/21st Century’, presentation at the Royal United Services Institute, London, 27 June Citation2005.

21The best illustration of this is the ‘Logical Model for Network-Centric Warfare’ in Arthur K. Cebrowski and John J. Garstka's seminal article ‘Network-Centric Warfare: Its Origin and Future, US Naval Institute Proceedings 124/1 (Jan. Citation1998), <www.usni. org/proceedings/Articles98/PROcebrowski.htm> (20 June 2005).

22Alan Stephens, ‘The Transformation of Low-Intensity Conflict’, Small Wars and Insurgencies 5/2 (Autumn Citation1994), 146 and 149.

23The speaker is referring of course to suicide bombings, the preferred Islamist term for which, according to the same article, is ‘sacred explosion’. See Nasra Hassan, ‘Are you ready? Tomorrow you will be in Paradise …’, The Times T2, London, 14 July Citation2005, 4.

24Eliot A. Cohen, ‘The Mystique of US Airpower’, Foreign Affairs 73/1 (Jan./Feb. Citation1994), 109.

25Harlan K. Ullman and James P. Wade, Shock and Awe: Achieving Rapid Dominance (Washington DC: National Defense UP Citation1996), <www.ndu.edu/inss/books> (20 June 2005).

26Ralph Peters, ‘Shock, Awe and Overconfidence’, Washington Post, 25 March Citation2003, A09.

27Cohen, ‘The Mystique of US Airpower', 120.

28See Daniel L. Byman and Matthew C. Waxman, ‘Kosovo and the Great Air Power Debate’, International Security 24/4 (Spring Citation2000), 23–5; also Daryl G. Press, ‘The Myth of Air Power in the Persian Gulf War and the Future of Warfare’, International Security 26/2 (Fall Citation2001), 5–44.

29The most recent and comprehensive treatment of the political, ethical, and tactical dimensions of urban combat is Alice Hills, Future War in Cities: Rethinking a Liberal Dilemma (London: Routledge Citation2004).

30Patrick Lambe, ‘The Perils of Knowledge-Based Warfare’, Knowledge Management, 1 April Citation2003, <www.destinationkm.com/articles/default.asp?ArticleID=1043> (20 Nov. 2005).

31Christopher Ankersen and Losel Tethony, ‘Rapid Decisive Ops Are Risky Business’, US Naval Institute Proceedings, Oct. Citation2003, <www.principlesessay.com/Proceedings/Articles03/PROan,kersen10.htm> (20 Nov. 2005).

32Colin Gray, ‘Information and Security: A Rejoinder’, Orbis 50/1 (Spring Citation1996), 276.

33Scott Shuger, ‘General's Apathy’, Slate, 4 April Citation2002, <http://slate.msn.com/id/2064055/> (20 June 2005).

34For more on this incident and subsequent hearings see ‘Friendly Fire’, CBC News Online, 6 June 2005, <www.cbc.ca/news/backgrouond/friendlyfire/index.html> (20 June 2005).

35Evan Wright, Generation Kill (London: Bantam Press Citation2004), 180. Notwithstanding the lurid title, this is one of the best first person accounts of the war.

36Joshua Davis, ‘If we run out of batteries this war is screwed’, Wired, Issue 11.06 (June Citation2003), <www.wired.com/wired/archive/11.06/battlefield_pr.html> (20 June 2005).

37John A. Antal, ‘Battleshock XXI’, in Robert L. Bateman III, Digital War: The 21st Century Battlefield (NY: ibooks, Citation1999), 60 and 72.

39Richard D. Hooker Jr., H.R. McMaster and Dave Grey, ‘Getting Transformation Right’, Joint Force Quarterly, Issue 38 (Citation2005), 25.

38Lawrence Freedman, ‘The Changing Forms of Military Conflict’, Survival 40/4 (Winter Citation1998–99), 52.

40Arquila and Ronfeldt, ‘Cyberwar is Coming!’

42Rebecca Grant, ‘An Air War Like no Other’, Air Force Magazine On-Line 85/11 (Nov. Citation2002), 34, <www.afa.org/magazine/nov2002/1102airwar.pdf> (20 June Citation2005).

41Thomas E. Ricks, ‘Target Approval Delays Irk Air Force Officers’, Washington Post, 18 Nov. Citation2001, A1. Franks specifically rejected the allegation in an interview for the PBS Frontline programme, ‘After Action: Evaluating the Military Campaign’, <www. pbs.org/wgbh/pages/frontline/shows/campaign/ground/after.html> (20 June 2005).

43US Joint Doctrine for Targeting, Joint Publication 3-60, 17 Jan. 2002, tries to address this problem by integrating Judge Advocate General lawyers in the decision-making cycle for targets of opportunity. See Appendix A, ‘International and Legal Considerations for Targeting’, Sec. 9, A-6.

44Stephen Biddle, Afghanistan and the Future of Warfare: Implications for Army and Defense Policy (Strategic Studies Inst. monograph, Carlisle, PA: US Army War College, Nov. Citation2002).

45Michael O' Hanlon, Technological Change and the Future of Warfare (Washington DC: Brookings Citation2000), chap. 3.

46Kim Burger et al., ‘What Went Right?’ Jane's Defence Weekly, 30 April Citation2003.

47John A. Gentry, ‘Doomed to Fail: America's Blind Faith in Technology', Parameters (Winter Citation2002–3), 97.

49Gen. Charles C. Krulak, ‘The Strategic Corporal: Leadership in the Three Block War’, Marines Magazine (Jan. Citation1999), <www.au.af.mil/au/awc/awcgate/usmc/strategic_ corporal.htm> (20 June Citation2005).

48This problem is well understood by the United States Marine Corps. See Marine Corps, Warfighting Manual, MCDP-1 (Washington, DC: Department of the Navy, Headquarters of the United States Marine Corps, 20 June 1997), 31.

50Colin Gray, Another Bloody Century: Future Warfare (London: Weidenfeld Citation2005), 120.

51Colin McInnes, Spectator-Sport War: The West and Contemporary Conflict (London: Lynne Rienner Citation2002), 136; also the chapter ‘The Quest for Bloodless War’.

52Gen. Sir Rupert Smith, The Utility of Force: The Art of War in the Modern World (London: Penguin Citation2005), 284–5.

53Timothy L. Thomas, ‘Information Warfare in the Second (Citation1999–present) Chechen War: Motivator for Military Reform’, in Anne C. Aldis and Roger N. McDermott (eds.), Russian Military Reform, Citation1992–2002 (London: Frank Cass Citation2002), 209–33.

56Joanna Bourke, An Intimate History of Killing (London: Granta Books Citation1999), 37.

54This website maintains an updated list of ‘Soldier Blogs’ (‘Sblogs’, for short): <www.aapavatar.net/blogs.htm> (20 Nov. 2005).

55Chris Thompson, ‘War Pornography’, East Bay Express, 21 Sept. Citation2005, <www.eastbayexpress.com/Issues/2005-09-21/news/news.html> (20 Nov. Citation2005).

57Andrew Marr, ‘Digital cameras have dispelled the fog of war’, Daily Telegraph, 12 May Citation2004.

58David J. Lonsdale, The Nature of War in the Information Age: Clausewitzian Future (London: Routledge Citation2004), 185.

59‘General advocates “bold” moves against terrorists’, ABC News Online, 27 Nov. 2004, <www.abc.net.au/news/newsitems/200411/s1252864.htm> (20 June 2005).

60Interview with an unnamed ‘Hacker’, who runs a private military company providing information security services to the US government, for the programme ‘Cyberwar!’, Frontline, PBS, Citation2004, which can be viewed online at <www.pbs.org/wgbh/pages/frontline/shows/cyberwar/> (20 June 2005).

61‘General advocates “bold” moves’.

62Stephen Ulph, ‘A Guide to Jihad on the Web’, Jamestown Foundation Monitor 2/7 (31 March Citation2005), <http://www.jamesetown.org/publications_details.php?volume_id=410&issue_id=3285 &article_id=2369531">www.jamesetown.org/publications_details.php?volume_id= 410&issue_id=3285&article_id=2369531> (20 June 2005); Episode 1 of a three part BBC series on Al Qaeda also investigates Al Qaeda's use of the Internet as a means for command and control, recruiting, training and proselytizing globally. See, ‘Jihad.com’, The New Al Qaeda, BBC, 25 July 2005.

63Mark Duffield, ‘War as a Network Enterprise: The New Security Terrain and its Implications’, Cultural Values 6/1&2 (Citation2002), 158.

64Bruce Berkowitz, The New Face of War: How War will be Fought in the 21st Century (NY: The Free Press Citation2003), 17.

65 Joint Doctrine for Military Operations Other Than War, Joint Pub 3-07, Washington, DC: Joint Chiefs of Staff, 16 June 1995, II-5.

66Ibid., II-6.

67James Dao and Eric Schmitt, ‘Pentagon Readies Efforts to Sway Sentiments Abroad’, New York Times, 19 Feb. Citation2002, A1.

68Quoted in Eric Schmitt and James Dao, ‘A “Damaged” Information Office is Declared Closed by Rumsfeld’, New York Times, 27 Feb. Citation2002.

69James Der Derian, ‘The Rise and Fall of the Office of Strategic Influence’, Information Technology, War, and Peace Project, Watson Institute, 4 March Citation2002, <www.watsoninstitute.org/infopeace/911/article.cfm?id=42> (20 Nov. Citation2005).

70Tim Benbow, The Magic Bullet? Understanding the Revolution in Military Affairs (London: Brassey's Citation2004), chap. 5 ‘Information Warfare’.

71Ibid., 116.

72Norman Podhoretz's short essay in the special section ‘Defending and Advancing Freedom’ Commentary, Nov. 2005, 57.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.