WWW.ABSTRACT.DISLIB.INFO
FREE ELECTRONIC LIBRARY - Abstracts, online materials
 
<< HOME
CONTACTS



Pages:   || 2 | 3 | 4 | 5 |

«Chapter Two THE AMERICAN MILITARY ENTERPRISE IN THE INFORMATION AGE Carl H. Builder INTRODUCTION: THE SOCIAL AND MILITARY PERSPECTIVES The social and ...»

-- [ Page 1 ] --

Chapter Two

THE AMERICAN MILITARY ENTERPRISE IN THE

INFORMATION AGE

Carl H. Builder

INTRODUCTION: THE SOCIAL AND MILITARY

PERSPECTIVES

The social and military effects of the ongoing information revolution

occupy the thoughts of modern thinkers. From a social standpoint,

the true believers hold that the current revolution in computing, telecommunications, and information technologies will profoundly remake our society, our democracy, and our daily lives. From a military perspective, visionaries within the U.S. military see in the new technologies of the information revolution the means to radically increase military effectiveness, reduce casualties, and save money.

The purpose of this chapter is to develop an understanding of how these two perspectives, usually considered apart, impinge upon one another.

A nation’s military is a reflection and a servant of the society from which it is drawn. If that society undergoes a change as profound as the information revolution, its security requirements will change as well. As a result of these changes, what society asks and expects the military to do to defend the nation, the military’s “enterprise,” will almost certainly change. If so, the most important consequence of the information revolution for the American military will not be the application of new information technologies to its existing missions, as the military perspective often implies. Rather, the most important effect will be the need for the military to adapt itself to performing new and different missions. The key, then, to understanding how we should apply new information technologies in the military is to unite 20 Strategic Appraisal: The Changing Role of Information in Warfare the social and military perspectives into an understanding of how the American military enterprise will evolve.

THE ROOTS OF REVOLUTION

No technological development since the release of nuclear energy has so preoccupied the American military as the currently cresting revolution in computing, telecommunications, and information technologies1; no part of that revolution has been the subject of more speculation by the military than the idea of information warfare.

Those preoccupations are evident in the professional journals of the American military and in the emergent doctrines, organization, and funding of the American armed forces. The fallout from these preoccupations is neither complete nor obvious—because many of the issues remain unresolved and involve large stakes within the American military institutions.

Some see the information revolution as but one component of an ongoing (or forthcoming) revolution in military affairs, in which the information technologies, when combined with new concepts for military operations and their command and control, will usher in a revolution in warfare comparable to that which occurred with blitzkrieg and aircraft carriers in World War II.2 Some of these expectations are captured in Joint Vision 2010, which sees the information technologies as enabling “full-spectrum dominance” of military operations and “dominant battlespace awareness.” (DoD, 1996a.) Critics see such expectations of transparent battlefields as technological chimeras—futile hopes to eliminate the Clausewitzian friction of war.3 Few would dispute the importance of the new information technologies for militaries and warfare, but beyond that point, the ______________

1 Hereinafter called the information revolution, recognizing that computers, telecommunications, and the explosive expansion of information access and utilization are inextricably intertwined.

2 See, for example, Builder (1995), pp. 38 and 39.

3 Perhaps the best treatment of this subject is found in Watts (1996). Dunlap (1997) cites information superiority or dominance in future conflicts as one of his four myths.

One flag officer recently quipped that if he were thrust into the boxing ring with Mike Tyson, information dominance would hardly prevent him from being soundly beaten.

The American Military Enterprise in the Information Age 21 schools of thought divide and fan out on just how important and how pervasive these technologies will become. At the conservative end are those who see the application of the information technologies limited to marginal improvements in existing military operations—in communications, navigation, intelligence, logistics, etc.—as already evident with the introduction of Global Positioning System receivers, laptop computers, and wideband global communications nets. At a somewhat more ambitious level is the so-called “digitization of the battlefield,” in which maps and sensors are registered together in a common framework for all who would venture there.4 Toward the more expansive end are those who see the “information sphere” becoming the battlefield of the future—where the main battle will not be fought over territory using physical force, but over the minds of the combatants and their access to information. It is this school of thought that now precipitates turbulence within the American military, as it clamors for the attention of leaders who must decide on resource allocations and organizational changes. At the outer fringes of this school of thought, one can hear calls for an independent “information corps” similar to those (still heard) for an independent “space corps,” echoing much earlier (and ultimately successful) calls for an independent air corps in the first half of the 20th century. And it is here that one finds the jarring concept of the “information warrior,” a new and different breed of military person, like the pioneering aviator before, who boldly lays claim to the future of warfare.





The mainstream American military finds itself torn between (a) gaining for itself the fruits of the information revolution when applied to its traditional concepts of military roles and missions and (b) finding itself riding the back of a tiger that might threaten to overturn those traditional concepts and replace them with a new kind of war and warrior. The balancing act is how to embrace the information technologies without being institutionally undone by them.5 ______________

4 This perspective is captured in the Army’s Force XXI concepts and experiments.

5 For example, the most effective exploitation of information is achieved through networklike organizations, while the most effective command and control is achieved through the hierarchical organizations so long associated with the military. Marrying the two forms risks one undoing the other, for hierarchical and network organizations 22 Strategic Appraisal: The Changing Role of Information in Warfare Whether the choice is real or not may be less pertinent than the fact that there are factions within the American military that are willing to make the choice seem real to those in and out of uniform who must decide how the military should be organized and funded. That such opposing views might surface within the military and be broadcast is certainly not without precedent, but the information revolution has just as certainly made the debate more visible and widely spread.

So, one important fallout of the information revolution is the looming prospect of information warfare—warfare waged with information as a primary weapon or target.6 Although information warfare as a component of war is not new (as in deception and electronic warfare), the possibility that it might become the dominant dimension in future war is new. That possibility looms now because of the growing dependence on information infrastructures for the most modern means of warfare—such as the use of precision weapons— and for the economic functioning of a modern society and state.

Even those in the American military who believe information warfare

is the wave of the future find themselves pulled between complementary interests and concerns:

1. The interests are the potential military advantages of exploiting information as a weapon against the entire range of enemy targets—from the minds of the enemy’s leadership to the performance of their weapons.

2. The concerns are the potential vulnerabilities of the sophisticated U.S. civil and military infrastructures—communications, commercial, logistical, and command—to hostile actions using information as a weapon.

______________________________________________________________

tend to be mutually corrosive—the former cutting network links for greater control, the latter bypassing hierarchical levels in the search for more information.

6 Information warfare is formally defined as Actions taken to achieve information superiority by affecting adversary information, information-based processes, information systems, and computer-based networks while defending one’s own information, information-based processes, information systems and computer-based networks. (DoD, 1996b.) That information might be a primary weapon or target is evident from Army Field Manual 100-6 (TRADOC, 1996), which declares that “The objective of IW [information warfare] is to attain a significant information advantage that enables the total force to quickly dominate and control the adversary.” The American Military Enterprise in the Information Age 23 The interests are generally contemplated under the heading of offensive information warfare, while the concerns are associated with defensive information warfare. The interests and concerns are, of course, intertwined: Means devised for offensive purposes might be turned against us, and exposition of our vulnerabilities—if neither corrected nor correctable—might invite the very attacks we hope to avoid. Indeed, there is a line of argument that says information warfare is something that the most developed societies in particular should eschew—that its relative advantages will accrue mostly to the weak and underdeveloped adversary.7 An opposing argument is that the most developed societies can bring their enormous information resources—from global infrastructures and technological superiority in depth—to bear against an enemy with surprising new effects and reduced risks.

These arguments will not be resolved soon. They will reverberate over the next several decades as the information revolution crests and then subsides in the first half of the 21st century.8 But to anticipate how these arguments and others might be resolved, they will be

illuminated here in four different lights:

1. the historical patterns in 20th-century technological revolutions, particularly as they have affected the American society and interacted with American military cultures

2. the current information revolution—which may break with the historical patterns—because it is fundamentally transforming the relationships between the American society and its institutions, including its military

3. the adaptations—past and prospective—of other American institutions to the information revolution, with the American family, business, government, and education as examples of how the information revolution can or will wreak changes—changes that might foretell what will happen to the American military ______________

7 The reasons being that the capital investments required to wage offensive information warfare within the existing global networks are modest and that the required technology is developing faster in the commercial sector than in the military because of differences in acquisition cycles. (See Dunlap, 1997.) 8 For more perspectives on the information revolution as a passing wave, see Builder (1990).

24 Strategic Appraisal: The Changing Role of Information in Warfare

4. the historically changing enterprise or focus of American military activities, as a way of anticipating changes even as the institutional roles and missions remain constant.

HISTORICAL PATTERNS

The contemporary American military response to information warfare—rooted as it is in the information revolution—is not without precedent. In the 20th century, at least three and perhaps four technological revolutions swept through the American military: the mechanization of warfare by means of the internal combustion engine, the release of almost unlimited nuclear energy, the opening of access to space as a new vantage point, and now the information revolution. In each of the first three instances, the American military was transformed in its thinking and eventually in its physical makeup. The fallout from these three revolutions included the ideas of strategic air warfare, nuclear warfare, and even space warfare. We should not be surprised today, therefore, to find a part of the American military captivated by the idea of information warfare.

However, as the idea of information warfare is now embraced by its advocates, it is worth reflecting on the evolution of these transforming ideas as they were incorporated into the American military. First, they took a long time to move into the mainstream of military thought. Although World War II was a mechanized war, horsemanship remained a required skill at West Point two years after the dropping of atomic bombs on Japan. In many segments of the American military, airpower is still seen today as it was in the 1920s— primarily as support for the surface forces, not as an independent national instrument of power. 9 Space operators in the military are still struggling, like the aviators before them, to find their place in the mainstreams of American military institutions.

Second, the ideas were oversold as expectations, at least in the short term. In the mechanization of warfare, strategic bombardment theories were finally vindicated by the advent of the atomic bomb more than by the bombers themselves. Within four decades, many of the theories of nuclear warfare were made irrelevant by the unimaginSee, for example, Correll (1997), in an editorial in Air Force Magazine.



Pages:   || 2 | 3 | 4 | 5 |


Similar works:

«Journal of Public Economics 88 (2004) 1959 – 1987 www.elsevier.com/locate/econbase Tax incidence when individuals are time-inconsistent: the case of cigarette excise taxes Jonathan Gruber a,*, Botond Koszegi b } a Department of Economics, MIT and NBER, E52-355, 50 Memorial Drive, Cambridge, MA 02142-1347, USA b UC Berkeley, USA Received 13 January 2002; received in revised form 18 June 2003; accepted 24 June 2003 Abstract One of the most cogent criticisms of excise taxes is their...»

«© Krzysztof Gorlach, Imre Kovách, 2006 All rights reserved Series editor: Mariann Kovács Key words: knowledge, rural development, rural sociology, sustainability, non-agriculture, food supply chain, local-market, culture economy, tradition, hand-craft ISBN 963 7372 33 4 ISSN 1788-1064 The CORASON Research Project (A cognitive approach to rural sustainable development – dynamics of expert and lay knowledges) was funded by the EU 6th Framework Programme www.corason.hu Published by the...»

«Cambridge Judge Business School Working Paper No. 01/2015 TAYLORISM REVISTED: CULTURE, MANAGEMENT THEORY & PARADIGM-SHIFT Morgen Witzel & Malcolm Warner Cambridge Judge Business School Working Papers These papers are produced by Cambridge Judge Business School, University of Cambridge. They are circulated for discussion purposes only. Their contents should be considered preliminary and are not to be quoted without the authors' permission. Cambridge Judge Business School author contact details...»

«A Short History of the Washington Consensus John Williamson Senior Fellow, Institute for International Economics Paper commissioned by Fundación CIDOB for a conference “From the Washington Consensus towards a new Global Governance,” Barcelona, September 24–25, 2004. The term “Washington Consensus” was coined in 1989. The first written usage was in my background paper for a conference that the Institute for International Economics convened in order to examine the extent to which the...»

«M.A. APPLIED ECONOMICS (New Syllabus for the University Department applicable from the academic year 2011-2012 onwards) Code Course Hard/Soft Credits SEMESTER – I ECON 411 Microeconomics – I H 4 ECON 412 Macroeconomics – I H 4 ECON 413 Mathematical Economics H 4 ECON 414 Statistical Methods H 4 ECON 415 Economics of Growth and Development H 4 ECON 416 Demography S 3 ECON 417 Economics of Education S 3 SEMESTER – II ECON 421 Microeconomics – II H 4 ECON 422 Macroeconomics – II H 4...»

«updated Jan. 2016 SEAN M. O’CONNOR University of Washington School of Law Box 353020, Seattle, WA USA 206.543.7491 || soconnor@uw.edu ACADEMIC APPOINTMENTS University of Washington School of Law, Seattle, WA 4/14 Chair, Center for Advanced Studies and Research on Innovation Policy (formerly titled Assistant Dean for Law, Business & Technology); Founder and Faculty Director, Cannabis Law & Policy Project. Oversee budget, staff, outreach, fundraising, partnerships, and marketing across multiple...»

«Islamic Banking, Takaful and Al Rahnu LCA4562 DR. ZULKIFLI HASAN Contents Pawnbroking Al Rahnu Pawnbroking? the business of advancing loans that are secured against pledges of personal assets. Those assets could include anything from jewellery, diamonds, watches, and gold, to silver, antiques, and fine artwork. No credit checks • Confidential service • Instant cash • Retain ownership of the valuable items What’s wrong with conventional Pawnbroking? higher interest rates usurious...»

«Cornell University School of Hotel Administration The Scholarly Commons Articles and Chapters School of Hotel Administration Collection 2-2014 Pricing and Market Segmentation Using Opaque Selling Mechanisms Chris K. Anderson Cornell University School of Hotel Administration, cka9@cornell.edu Xiaoqing Xie Shanghai University of Finance and Economics Follow this and additional works at: http://scholarship.sha.cornell.edu/articles Part of the Hospitality Administration and Management Commons, and...»

«Journal of Economic Integration 27(1), March 2012; 33-79 Is the Eurozone Rescue Strategy Tantamount to the Rearrangement of the Deckchairs on the Titanic? Miroslav N. Jovanovié c University of Geneva Abstract The eurozone is the crown jewel in the process of European integration. This monetary zone includes the most advanced integration grouping of countries in the European Union. The eurozone has been expanding the number of its participants, a sign of success in any economic or political...»

«Sveriges Riksbank Economic Review 2012:1 SvERigES RikSbank sveriges riksbank economic review 2012:1 Sveriges Riksbank Economic Review 2012:1 –1– sveriges riksbank economic review 2012:1 S V ER IGE S R IK S BA N K ECO N OMIC R E VIE W is issued by Sveriges Riksbank three to four times a year.PU B LIS H ER : CL A E S B ERG EDITO R S : CL A E S B ERG, KER S TIN MITLID, J OA N N A GERWIN A N D T H E COM MU N IC ATIO NS S ECR E TA RIAT Sveriges Riksbank, SE-103 37 Stockholm, Sweden. Telephone...»

«APUSH Period Review Guides: Period 4 (1800-1848) Description: The new republic struggled to define and extend democratic ideals in the face of rapid economic, territorial, and demographic changes. Significance of 1800: Define how this year served as a turning point in United States history paying attention to what changed and what stayed the same before and after this year. Significance of 1848: Define how this year served as a turning point in United States history paying attention to what...»

«Strength in numbers. Your experienced Sales and Distribution team of Westpac Institutional Bank. The Team Years of experience Westpac Institutional Bank’s Sales and Distribution team specialise in providing investment products to retail and wholesale investors through advisers. In December 2008, Westpac merged with St.George Bank meaning that our business has grown to offer a deeper choice of products & brands to help investors grow their wealth: • BT Margin Lending • St.George Margin...»





 
<<  HOME   |    CONTACTS
2017 www.abstract.dislib.info - Abstracts, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.