08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Overestimates man’s capacity to deal with contradictory<br />

information.<br />

• Ignores the true nature of the enemy and drives him to asymmetric<br />

strategies.<br />

• Ignores the dynamic nature of combat and bureaucratizes war.<br />

• Assumes that military victory is an end in itself. 184<br />

Fifth, consideration is given to the human in the loop, yet one wonders<br />

if a proper parallel should be drawn between NCW/INEW and human network<br />

attacks (HNA). NCW and INEW discuss the importance of training and<br />

educating personnel to conduct themselves as well as to run a network-oriented<br />

staff. US theory now includes discussions of effects-based operations to<br />

demonstrate how NCW can be used to affect humans and objectives in a<br />

sequenced manner. Addressing the human as a network might be the next<br />

logical thinking. Not doing so reinforces the Pentagon’s one-sided focus on<br />

technology. HNA refers to the ability of weapons, including nonlethals, to shut<br />

down the operating systems of people, who have their electric circuitry in the<br />

form of neurons. Properly targeted, this type of attack can make it difficult for<br />

humans to enter the decision-making cycle to assist in processing and selecting<br />

targets, the fail-safe aspect to NCW and INEW. No one is writing about<br />

human-centric operations that are also key to continuing network-centric<br />

operations. Again, this topic was not the focus of the authors addressing NCW<br />

and INEW, but their innovative concepts can be carried further into the human<br />

domain.<br />

Sixth, the United States needs to study foreign IO and NCW related<br />

concepts if it is to understand how to work with or against the cyber-age<br />

systems of other countries. It is clear that China studies Pentagon thinking. At<br />

Chinese bookstores there are hundreds of US books translated from English,<br />

especially in the IO area. No such bounty on Chinese thinking can be found in<br />

American bookstores.<br />

Finally, and most importantly, Dai noted that INEW is an offensive<br />

strategies based on acquiring both defensive and offensive information<br />

operations equipment, “with the priority being the development of offensive<br />

information operations equipment.” Further, it is “important to take the<br />

initiative and effectively destroy the enemy’s electronic information<br />

systems.” 185 The focus on the active offense is totally lacking in the NCW<br />

discussion, as is the Chinese focus on applying strategies to offset inferiorities<br />

184 Alfred Kaufman, “Caught in the Network,” Armed Forces Journal, February 2005,<br />

pp. 20-22.<br />

185 Dai, 2002.<br />

101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!