------ # Network Centric Warfare **Written By:** - David S. Alberts - John J. Garstka - Frederick P. Stein **See:** Alberts_NCW.pdf --------- ## Acknowledgments This book is the product of an ongoing effort to understand and articulate the power of information superiority in warfare from a Joint perspective. This work would not have been possible without the support, encouragement, and cooperation of ASD(C3I) and the J6. We would like to acknowledge the direct and substantive contributions by: Vice Admiral Arthur K. Cebrowski, USN; LTG Douglas D. Buchholz, USA (Retired); and Lt Gen John L. Woodward, USAF. Many individuals have worked with us on numerous drafts. Included among those who have contributed comments and suggestions that have greatly enhanced this book are (in alphabetical order): Chuck Bartlett, John Dickmann, Roy Evans, James FitzSimonds, Dean Free, Dick Hayes, John Hodell, Leland Joe, Kevin Kirsch, Margaret Myers, Nick Petronzio, Paul Romanski, Dan Ryan, Stu Starr, Mark Tempestilli, and Gary Wheatley. We owe a huge debt of thanks to Margita Rushing for her work on draft after draft and to Meg Rittler for her artistic treatment on most of the figures and the cover design. Finally, the authors deeply appreciate the opportunity to write this book and the forbearance of our families who saw less of us as a result. ## Preface It will be decades before the real book on Network Centric Warfare will be written. This effort is designed to help prepare for the journey that will take us from an emerging concept to the fielding of real operational capability. The success of any journey depends in great measure upon the preparations made. These preparations include a shared sense of purpose, a destination, education and training, and provisions. Many challenges remain. One that is already causing problems is not having a concrete destination, but rather a broad vision of the characteristics of the destination. In a journey such as this, the process becomes the concrete objective for those who are guided by a vision. It is hoped that this book will contribute to the preparations for this journey in two ways. First, by articulating the nature of the characteristics of Network Centric Warfare (NCW). Second, by suggesting a process for developing mission capability packages designed to transform NCW concepts into operational capabilities. The CCRP is continuing to work with others to undertake research and outreach initiatives aimed at developing a better understanding of network-centric concepts and their application to national security. We are interested in hearing about your efforts and ideas. Given the velocity of the evolution of ideas and experiences about NCW, it is impossible for a “print media” to keep up. Consequently, we find ourselves literally updating and expanding the material in this manuscript from the moment it left on its journey to the “presses.” While we may in the future publish an updated edition, readers should visit the CCRP website at www.dodccrp.org for updated versions and additional material on the subject. David S. Alberts Director, Research OASD(C3I) ## Introduction War is a product of its age. The tools and tactics of how we fight have always evolved along with technology. We are poised to continue this trend.1 Warfare in the Information Age will inevitably embody the characteristics that distinguish this age from previous ones. These characteristics affect the capabilities that are brought to battle as well as the nature of the environment in which conflicts occur. Often in the past, military organizations pioneered both the development of technology and its application. Such is not the case today. Major advances in Information Technology are being driven primarily by the demands of the commercial sector. Furthermore, Information Technology is being applied commercially in ways that are transforming business around the globe. The purposes of this book are to describe the Network Centric Warfare concept; to explain how it embodies the characteristics of the Information Age; to identify the challenges in transforming this concept into a real operational capability; and to suggest a prudent approach to meeting these challenges. In the commercial sector, dominant competitors have developed information superiority and translated it into a competitive advantage by making the shift to network-centric operations. They have accomplished this by exploiting information technology and coevolving their organizations and processes to provide their customers with more value. The coevolution of organization and process is being powered by a number of mutually reinforcing, rapidly emerging trends that link information technology and increased competitiveness. Similar concepts are beginning to take root in military thinking, new concepts, plans, and experiments. It is for this reason that developments in the commercial sector are significant and worthy of note, for they provide insights into the potential power of information superiority in the conduct of military operations. Network Centric Warfare is the best term developed to date to describe the way we will organize and fight in the Information Age. The Chief of Naval Operations, Admiral Jay Johnson, has called it “a fundamental shift from platform-centric warfare.”2 We define NCW as an information superiority-enabled concept of operations that generates increased combat power by networking sensors, decision makers, and shooters to achieve shared awareness, increased speed of command, higher tempo of operations, greater lethality, increased survivability, and a degree of self- synchronization. In essence, NCW translates information superiority into combat power by effectively linking knowledgeable entities in the battlespace. Joint Vision 2010’s (JV2010) parallels to the revolution in the commercial sector are striking, with JV2010’s stated emphasis on developing information superiority and translating it to increased combat power across the spectrum of operations, as well as the key role of experimentation in enabling coevolution of organization and doctrine. To reach its full potential, Network Centric Warfare must be deeply rooted in operational art. As such, we cannot simply apply new technologies to the current platforms, organizations, and doctrine of warfare. There is ample historical precedence for the coevolution of organization, doctrine, and technology in the warfighting ecosystem. For example, performance advantages at the platform level have often led to the emergence of new doctrine, tactics, techniques, or procedures. During World War II, Army Air Corps commanders increased the survivability and lethality of daylight bombing operations by coevolving tactics to exploit the improved range and endurance capabilities of the P-51 and the improved capabilities of the Norden Bombsight to conduct daylight precision bombing with fighter protection for the otherwise more vulnerablebombers.34 Similarly,coevolutionplayeda key role in the eventual Allied victory in the Battle of Britain. In this decisive air campaign, the introduction of radar coupled with the change it enabled in the command and control structure and system provided Allies with a critical competitive advantage.5 Consequently, as we continue to apply emerging information technologies, we should not be surprised by the need to explore new warfighting concepts that employ new organizations or new processes. Different organizations have different time constraints with respect to change. Within the private sector there are many organizations in the vanguard of a shift to network-centric operations. These organizations provide us with a look into a possible future. We need to closely examine the experiences of these organizations and if they are applicable, apply the lessons learned. We set the stage with a discussion of the myths currently circulating about NCW; a description of the nature of the changes taking place in the commercial sector, and a discussion of their implications for military organizations and operations. The concept of NCW is then introduced and reviewed in detail. Given the profound implications for how the military organizes, equips, trains, and fights, we then address the process by which technology is introduced into organizations. The book concludes with a discussion of the road ahead and a strategy for moving from NCW-based concepts to NCW-based operations. Since successful adoption of NCW requires a cultural change, it cannot be achieved without widespread discussion, debate, experimentation, and ultimately, broad acceptance. If this book stimulates and contributes to this process, it will have achieved its intended effect.