By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data Analytics instagram stories
    Data Analytics Helps Marketers Make the Most of Instagram Stories
    15 Min Read
    analyst,women,looking,at,kpi,data,on,computer,screen
    What to Know Before Recruiting an Analyst to Handle Company Data
    6 Min Read
    AI analytics
    AI-Based Analytics Are Changing the Future of Credit Cards
    6 Min Read
    data overload showing data analytics
    How Does Next-Gen SIEM Prevent Data Overload For Security Analysts?
    8 Min Read
    hire a marketing agency with a background in data analytics
    5 Reasons to Hire a Marketing Agency that Knows Data Analytics
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: The Twilight of Network-Centric Warfare
Share
Notification Show More
Aa
SmartData CollectiveSmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Business Intelligence > The Twilight of Network-Centric Warfare
Business Intelligence

The Twilight of Network-Centric Warfare

BobGourley
Last updated: 2010/08/10 at 9:55 AM
BobGourley
8 Min Read
SHARE

Highly respected writer and industry analyst Loren B. Thompson has just penned an opinion piece on recent changes in the Pentagon related to how DoD does IT.  The piece, titled “The Twilight of Network-Centric Warfare” is worth a full read by anyone in the IT business, in or out of government.

More Read

ICO and GDPR

Can ICO Data Awareness Campaigns Create More Trust In Crypto?

Are Government Agencies Complying with FedRAMP?
4 Benefits for the Public Sector when Governments Start Using Big Data
Bigger Data, Better Intelligence for Government
Big Data Success in Government

Dr. Thompson argues that the recent directive by secretary of defense Gates spelling out his intention to reorganize and eliminate the senior staff overseeing department networks and information integration (ASD NII) and moves at the same time to eliminate J6′s marked the end of the network centric era.

The meat of Thompson’s article reads:

When a Defense Business Board task force recommended last month that the Office of the Secretary of Defense (OSD) eliminate its networking and information integration secretariat, it signaled just how far from grace the notion of network-centric warfare has fallen. The secretariat was established at the tail-end of the dot.com boom to coordinate the joint force’s migration from industrial-age warfare into the era of information warfare. Proponents of network-centric warfare believed new information technologies were so powerful that they could overthrow traditional warfighting concepts if backed up with appropriate military doctrine and organizations. OSD’s office of networks and information integration — NII for short — was supposed to shepherd this vision into reality by overseeing a raft of multi-billion-dollar investment projects.

A decade later, nobody talks about military transformation anymore, and joint initiatives begun under its banner such as the Transformational Communications Satellite and Future Combat System are fading memories. Service-level projects like the Navy’s Next-Generation Enterprise Network increasingly look like wasteful efforts to re-invent the wheel — efforts that are doomed to be canceled as Washington turns to deficit reduction and military budgets shrink. So what went wrong? How is it possible for every policymaker in the five-sided building to embrace a common vision of information-age warfare at the beginning of a decade, and for it all to be forgotten by decade’s end?

The first thing that went wrong was that threats evolved differently than military planners expected. The authors of network-centric warfare thought that the joint force was in the midst of a prolonged “strategic pause” when the decade began, after which some new peer or near-peer adversary would emerge. That pause ended unexpectedly on 9-11, and America suddenly found itself facing a very different kind of danger. Networks and information technology have certainly proven useful in dealing with elusive new adversaries, but so far they haven’t proven to be the winning weapon that visionaries expected. It turns out that all those networks the Pentagon was planning are just conduits, and that what matters more for victory is the accuracy and completeness of the information moving through the networks.

The second problem that proponents did not see coming was that the new technology itself might become a source of weakness. Planners implicitly assumed that if the Pentagon invested heavily enough in cutting-edge networks and information applications, it could leverage the warfighting potential of the new technology while staying comfortably ahead of other countries with similar ideas. Well, it hasn’t worked out that way. We now know that everybody from the Taliban to Mexican drug cartels can benefit from the reach and richness of wideband networks. Even worse, they can tap into our own networks, as China proves on a daily basis. So the military has had to launch a crash program to prevent its gee-whiz networks from being used against it (incidentally, the Navy is inexplicably trying to replace the one big network that so far has proven largely immune to hostile penetrations, in order to implement a more “advanced” architecture).

I think I should add some commentary from a CTO perspective.

– As far as I can tell, this reorganization is not because a concept fell from grace.  The reorganization seems to be designed to save money by reducing staff overhead.  Although I personally don’t agree that this is a smart move, the functions are being organized into other places (both at OSD and DISA) and there are high expectations that IT will continue to be enhanced and modernized in the department.

– Very few believed that new IT programs would give us an ability so powerful that IT would overthrow traditional militaries.  There has always been a “lunatic fringe” of folks who thought like that, but the mainstream always saw IT as a critical enabler. The folks I know who see the benefit of new operational constructs leveraging network-centric-warfare still know that real war is still a very bloody, boots-on-the-ground activity.

– Although the title “NII” was born out of a reorganziation.  Its functions existed before as ASD C3I.  Its functions will continue in the future in the new organization.  This is an important point.

– It is certainly true that network-centric concepts made significant contributions to success in conflict.  The functions of NII helped that occur.  Those functions will still enhance the use of IT in the department in the future, just in a different organization.  But it is true that threats evolved differently than military planners expected.  Can you tell me what is new about that?  We have to continue planning, of course, but should not be surprised when we are surprised (how is that for some deep national security guidance?)

– It is not accurate to say that proponents of net centric warfare did not see that IT itself could be a weakness.  This accusation is just unfounded.  But the fact is IT is changing the military and will continue to do so, even though it has weaknesses.

Those are just some thoughts.

By the way, I’m not sure I support this move, I worry that it will be harder to continue the efficient and effective continuous improvement of IT in the Services and Joint world because of this.  But as an outsider and a fan of big enterprise IT folks, I’ll be pulling for the folks who have the mission and I really hope this works out well.

TAGGED: government
BobGourley August 10, 2010
Share This Article
Facebook Twitter Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

ai low code frameworks
AI Can Help Accelerate Development with Low-Code Frameworks
Artificial Intelligence
data Analytics instagram stories
Data Analytics Helps Marketers Make the Most of Instagram Stories
Analytics
data breaches
How Hospital Security Breaches Devastate Local Communities
Policy and Governance
analyst,women,looking,at,kpi,data,on,computer,screen
What to Know Before Recruiting an Analyst to Handle Company Data
Analytics

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

You Might also Like

ICO and GDPR
Big DataData ManagementExclusivePolicy and GovernancePrivacyRisk ManagementSecurity

Can ICO Data Awareness Campaigns Create More Trust In Crypto?

8 Min Read

Are Government Agencies Complying with FedRAMP?

2 Min Read
Image
AnalyticsBig DataCulture/LeadershipData MiningData WarehousingPolicy and GovernanceTransparencyWorkforce Data

4 Benefits for the Public Sector when Governments Start Using Big Data

8 Min Read

Bigger Data, Better Intelligence for Government

3 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?