Some Thoughts on the Application of Military Theory to Information Operations and Network Centric Warfare
SWEDISH DEFENCE RESEARCH AGENCY STOCKHOLM
Pagination or Media Count:
The transformation into a world based on communication and information leads to Information Operations IO becoming more important than ever. Thus, there is a need to develop new methodologies for successful IO that take into account the change towards network-enabling warfare capabilities. In a network-centric warfare approach it is important to understand the opponents network structure and communication system and how they use these resources. Equally important is to understand ones own network structure in terms of strengths and weaknesses. Every type of network has it own vulnerabilities in the form of vital nodes, links, and platforms, regardless of whether it is a communications, organizational, or biological network. If one understand ones own structure as well as that of ones opponents, the chances of effective IO increase greatly. A fruitful way forward is to use theories based on center of gravity CoG and critical vulnerabilities CV. This paper first discusses the logic of networks in general terms and then considers different types of networks and their respective abilities to resist attacks of different kinds due to center of gravity and critical vulnerabilities. Twenty briefing charts summarize the presentation.
- Information Science
- Computer Systems