Você está na página 1de 7

WS 500 - Netwar 2.

0 20 March 06 - Chad KOHALYK 1

forms of netwar may also be con-


ceived. Previously unknown types of
networked organization are being real-
ized that could prove to be the threat of
tomorrow.
It is beyond the scope of this paper to
definitively answer these difficult ques-
tions. But through examining the present,
past and possible future of social net-
work theory in the context of netwar,
paths for future study will be illuminated
in an attempt to provoke a re-
examination of the network-based war-
fare concept which accounts for recent
advances in other fields.

Historical Antecedents
From the current military perspec-
tive netwar is associated with asym-
metric threats, pitting non-state ac-
tors against a state who holds con-
ventional military dominance. Thus
Netwar 2.0 networked conflict is not the stuff of
modern traditional warfare. With the
Towards a new military theory of social networks unchallenged dominance of the
American military today, the net-
works of terrorist groups and insur-
The term “netwar” was coined in the works on netwar. 2 The book covered a gents has come to the forefront of
early 1990’s1 by John Arquilla and David wide breadth of topics from terror and current military strategic inquiry. In
Ronfeldt who felt that the information crime to activism and social movements.
revolution was going to have an un- During that time Albert-Lásló Barabási, a Networks and Netwars Arquilla and
precedented impact on the way conflict physicist from the University of Notre Ronfeldt list ten examples of recent
is carried out. Since its inception the Dame, was making immense headway in netwars since 1994.3 The American
concept of netwar has been confused the study of networks. His discovery of invasion of Afghanistan in 2001 saw
with war waged on or through computer- the scale-free quality of real networks US Special Forces deployed in a dis-
ized platforms on the Internet. Though has had resounding impact in the fields tributed network on the ground. But
Internet and communications technolo- of computer science, theoretical physics is netwar truly a newly discovered
gies (ICT) can be an important ingredient and biology. Due to the timing, Ba- form of war?
for netwar, the more profound attribute rabási’s findings were not incorporated The advent of the telegraph and the
of netwar is the organizational design of into the updated concept of netwar. railway was an information revolution in
its protagonists. In netwar one or more There is great potential for the fields itself, allowing commanders far from the
sides display a dispersed organization; a of netwar and network theory in a mili- front to exert control over men in the
widely cast social network without the tary context to be revolutionized due to trenches. In fact the type of “total war”
centralized command structure found in these recent breakthroughs. A better un- that World War I represented – requiring
today’s military hierarchies. Although derstanding of the underlying structure the efforts of the people and industry to
the World Wide Web has acted as a cata- of networks will also aid in the discovery be subordinate to military goals – galva-
lyst for increased awareness of networks of historical analogues. Though the con- nized the organizational design of the
due to its capabilities for maintaining cept of netwar was established in the hierarchy for the rest of the 20th
relatively cohesive groups on a global early 90’s the actual practice of netwar century.4 Prior to the Great War, limita-
scale, netwar is more about social or- could possibly date back to the earliest tions on communication technology re-
ganization rather than technological social networks of humankind. Recent quired distant units to act semi-
revolution. advances in social network analysis may autonomously. The Royal British Navy
In 2001, Arquilla and Ronfeldt re- aid historical researchers searching for would receive extremely simple orders
leased a collection of essays that ex- antecedents to modern-day netwar. In the (ie. “Find French ships and sink them”)
plored in depth the impact of social net- same manner, theories about future that they would act on during months at

1 John Arquilla and David Ronfeldt first introduced the term “netwar” in their 1993 article “Cyberwar is Coming!”

2 Networks and Netwars Arquilla and Ronfeldt (2001)

3 Arquilla and Ronfeldt (2001) pp. 17

4 In fact, the 20th century corporation, born out of the factories of the industrial revolution, is another example of the dominance of hierarchies in the last century.

1
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 2

sea between port calls, and their next century exhibit a surprising rigid hierar- work. Until recently, no such model
mission. chical structure from the perspective of existed.
This is not to say that there were no today’s current challenges in fighting
forms of netwar after the invention of insurgency and terrorism worldwide. Network theory today
modern industrial warfare. Even during Despite a community of prominent theo- The study of social networks in con-
the heydey of hierarchy militaries ex- reticians trying to come to terms with flict was pioneered by John Arquilla and
perimented with decentralized forms of post-colonial “people’s wars,” the notion David Ronfeldt in a number of essays
control. The German concept of Auftrag- of a resistance movement divorcing itself during the 1990’s.9 The “information
staktik, or "mission tactics", allowed from hierarchy and organizing along the age” provided a new paradigm for con-
each officer and NCO to do what they lines of a distributed network seems to flict, particularly in the face of military
thought needed to be done in order to have remained unexplored. This could be dominance by the post-Cold War victor,
achieve the mission goal. Decision- due to culture. Mao’s revolution was America. Arquilla and Ronfeldt proposed
making was devolved to the lowest lev- steeped in Leninist doctrine, which re- three different types of networks –the
els. The Israeli Defense Force utilized quired strict socialization. Yet he did say chain, the star or hub network, and the
“optional control” allowing field com- that “command must be centralized for all-channel network– that could be used
manders to make their own tactical deci- strategical purposes and decentralized for to categorize network-based threats.
sions regardless of whether or not they tactical purposes.”6 These three topologies could also be
had orders. Furthermore, during World There are also possibilities for inves- used together, or form a hybrid with a
War I, T.E. Lawrence (of Arabia) master- tigating primitive netwar from an age hierarchical organization. For example,
fully navigated tribal politics to organize even earlier than Westphalia. In fact, some actors have a “hierarchical organi-
a network of irregulars with a single mis- Arquilla and Ronfeldt themselves use the zation overall but use network designs
sion: harass Turkish lines of communica- Mongols of the 12th and 13th centuries for tactical operations; or other actors
tion. as an example of cyberwar and netwar.7 may have an all-channel network design
Yet not all guerilla movements are Ancient tribes, one of the earliest form of overall but use hierarchical teams for
equal in the eyes of netwar. Both Mao human organization, display many char- tactical operations.”10 Needless to say,
Tse Tung’s and Roger Trinquier’s influ- acteristics similar to the kind of distrib- the possible configurations are numer-
ential tracts in guerilla warfare outline uted networks current militaries face. ous, which represents a challenge to ana-
extremely hierarchical forms of organi- Tribes are relatively horizontal organiza- lysts seeking to map a particular net-
zation. Mao’s On Guerilla Warfare con- tions, with each member roughly equal. work.
tains very specific personnel and arms Clans represent the various segments of Real world examples, such as the 19
requirements in a strict hierarchy divid- tribes, and can operate autonomously. hijackers involved in the 11 September
ing divisions into regiments, battalions Lastly, tribes are “leaderless” in that eld- attacks of 2001, don’t fall neatly into the
and companies. Trinquier’s diagrams of ers are advisors or facilitators, and their categories described by Arquilla and
the military organization of the National roles change due to circumstances. One Ronfeldt. A simple visual comparison
Liberation Army (ALN) in Algiers dur- of the most important netwar-like charac- shows that the 9-11 terrorist network
ing the 1950’s show a hierarchical com- teristic of tribes is their mastery over the falls somewhere in between a star net-
mand and control structure sitting atop tactic of swarming. 8 Ancient tribes repre- work and and all-channel network (refer
isolated three-man cells: each discrete sent amazing potential for discovering to next page). 11 An all-channel network
armed group consisted of thirty-five historical analogues to netwar. of 19 nodes would render 361 links, with
armed men. Trinquier charted the ALN’s Possible historical examples of net- each hijacker linked with all 18 other
bomb-throwing network as well, which war seem to be plentiful throughout his- hijackers. Only 112 total connections
was “kept apart from other elements of tory. Upon further investigation a pattern exist, less than a third of the predicted
the organization ... broken down into a might emerge, such as the ostensible amount. And yet there is no central hub,
number of quite distinct and compart- correlation between the rise of industrial maintaining links with all other nodes.
mented branches, in communication only warfare and de-emphasis on de- The best connected node has only 11
with the network chief through a system centralized, networked organizational links, the least connected only 2. The
of letter boxes.”5 designs. But in order to search out pre- four best connected nodes (with 9, 10 or
The guerilla networks of revolution- cise analogues we need an accurate 11 links) account for nearly half of the
ary wars during the middle of the 20th model of when an organization is a net-

5 Roger Trinquier’s Modern Warfare: A French View of Counterinsurgency is available online at http://www-cgsc.army.mil/carl/resources/csi/trinquier/trinquier.asp

6 Mao, pp. 114.

7 Arquilla and Ronfeldt (1997) pp. 34-37

8 See David Ronfeldt, “Al Qaeda and its affiliates: A global tribe waging segmental warfare?”

9 See In Athena’s Camp and Networks and Netwars for many of Arquilla and Ronfeldt’s articles.

10 Arquilla and Ronfeldt (2003) pp. 8-9

11
Chain, star or hub, and all-channel network diagrams reproduced from Arquilla and Ronfeldt (2001) pp. 8. “Social Network Analysis of the 9-11 Terrorist Net-
work” by Valdis Krebs is available online at http://orgnet.com/hijackers.html

2
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 3

degree of each node, or number of


links each node possessed. Euler dis-
covered the only way a path could be
completed without crossing a node twice
Chain network Star or hub network All-channel network was for each node to have an even num-
ber of degrees. This became known as an
Eulerian path. Since the Königsberg puz-
zle had three nodes with three links, and
one node with five links, it was mathe-
matically impossible to complete a cir-
cuit crossing each bridge only once.
Social Network Analysis of the 9-11 Terrorist Network

150 years later, in 1875, a new bridge


was built in Königsberg making such a
path possible. The importance of Euler's
discovery is that graphs, or networks,
have certain properties "that limit or en-
hance our ability to do things with
them."13
More than two hundred years later
two Hungarian mathematicians, Paul
Erdős and Alfréd Rényi, made the next
leap in graph theory by asking the ques-
tion: how do networks form? Erdős and
Rényi argued that the simplest solution
nature could follow was to connect each
node randomly. Take for instance the
example of a cocktail party with one
hundred strangers, where each guest is a
node and each encounter is a social link.
As each guest moves around the room,
randomly mingling and collecting social
links, small clusters of 2 and 3 guests
will form. Soon these clusters will con-
total links (51, or 46%). The three basic Königsberg, modern day Kaliningrad, nect with one another. Inevitably, at
network models do not capture the is located on the Pregolya River which some point, each guest will have at least
sprawling complexity of the 9-11 hijack- contains two large islands connected to one link. This is the turning point: we
ers. The reason is that Arquilla and Ron- each other and the mainland by seven now have one massive cluster. Starting
feldt based their models on an idealized bridges. The people of Königsberg from any node, one can reach any other
form of social network, one that is not passed the time trying to solve the puz- node within the network. To sociologists,
evidenced in the real world. zle: Was it possible to walk a path across this is a community. To physicists, this is
The roots of network theory12 date the seven bridges never crossing the called phase transition (like when water
back to the mid 18th century and the same one twice? Such a path was never forms ice). Erdős and Rényi calculated
work of the Swiss mathematician Leon- found, and in 1736 Euler devised a that it would take only thirty minutes for
hard Euler who solved the problem of mathematical solution proving that it was the entire room of guests to become con-
the Seven Bridges of Königsberg in impossible. He did so through abstrac- nected in an all-ecompasing social web. 14
1736. This was one of the first publica- tion, replacing each of the land masses This is known as the theory of ran-
tions to use graph theory, a sub-field of with a node, and each bridge with a link. dom networks, which dominated
mathematics, and the ancestor of modern By doing this he realized that the prob- thoughts on networks since 1959. But
day network theory. lem could be solved by looking at the this theory did not accurately explain

12 The following outline of network theory history comes from Barabási’s Linked, unless otherwise noted.

13 Barabási, pp. 14

14 Barabási, pp. 16

3
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 4

networks in the real world. Nodes in explained by a bell curve, but by a power found that up to 80 percent of ran-
nature tend to have many more than the law. domly selected routers could fail and
one link necessary to be part of the A power law predicts that most nodes the Internet would still be able to func-
whole. It is estimated that we know be- have only a few links, and a few nodes tion. But a networks reliance on hubs
tween 200 and 5000 people by name. have a great many number of links. means that it is highly vulnerable to co-
Also, random network theory says that These nodes with an anomalously large ordinated attacks on the relatively few
the more links added to a network, the number of links are the hubs that keep hubs. The question remains: how many
more difficult it is to find a node that is the network from flying apart into hubs need to be neutralized to crash a
relatively isolated. Most nodes will have smaller, isolated mini-networks. In a system? Recent research suggests that
approximately the same number of links. random network the peak of distribution somewhere between 5 to 15 percent of
The result is a distribution of links repre- represents the "average node" in a sys- all hubs need to be eliminated to destroy
sented by a bell curve. Yet in nature it is tem, which retains the same number of a network. 17
entirely possible to find nodes that have links as a majority of nodes within the In the case of the War on Terror, ran-
only a very few links, and other nodes system. Thus a random network is said to domly stopping individual terrorists at
with a massive number of links. have a scale. Networks with a power law the border will have little negative im-
Erdős and Rényi could not explain distribution don't have a peak, and there- pact on a terrorist network. But, as hubs
this complexity, and substituted it with fore there is no "average node." These in a social network are the relay points
randomness. This concept of random types of networks are called "scale-free." for many communications, we should be
networks has dominated thought on Examples of scale-free networks are able to identify and destroy these leader-
complex networks until the late 1990's. It found throughout nature, including hubs and inflict real damage on the
is evident in Arquilla and Ronfeldt's molecules involved in burning food for network. 18
three models of networks, each with per- energy; the router connections that make Barabási's work on the way scale-free
fectly symmetrical distribution of links. up the Internet; and collaborations and networks form could also be a boon to
In 1998 physicist Albert-László Ba- sexual relations between people.16 They current link analysis techniques. As each
rabási and Eric Bonabeau with Hawoong are represented by a topology some- new node enters a system, it prefers to
Jeong and Réka Albert of the University where in between the all-channel and star attach to an existing node that already
of Notre Dame used a web crawler to or hub network of Arquilla and Ronfeldt. has many other connections. As time
trawl the World Wide Web and map the Barabási and his team have continued goes on, the system becomes dominated
links between webpages. 15 They were their study of scale-free networks and by hubs with a massive number of links.
surprised to find that the World Wide have made some intriguing discoveries Applying these principles to social net-
Web is not very democratic in its place- beneficial to the field of military studies. work analysis used in mapping terrorist
ment of links, in fact a few highly con- For example, scale-free networks are or insurgent networks may help to iden-
nected webpages were holding the entire extremely robust against accidental fail- tify nodes where preferential attachment
network of the web together. Most of the ures. The number of nodes with few is high, where recruitment and growth
webpages, 80 percent, had fewer than links far outweighs the number of hubs, occur.
four links, while a tiny minority of 0.01 so any random attack against a network
percent of nodes had over one thousand is far more likely to hit a relatively iso-
links. This distribution of links is not lated node, without any serious repercus- Netwar 3.0?
sions to the entire system. Barabási et al In an attempt to deduce the next type
of netwar we can extrapolate from a
combination of John Boyd’s concept of
the OODA loop and William Lind’s
model of generational warfare. 19
US Air Force Colonel John Boyd
conceived a decision cycle made up of
four elementary processes: observe, ori-
ent, decide and act. Boyd was a fighter
pilot, and argues that in a dogfight the
first combatant to make it to the end of
his decision cycle would be victorious.
The pilot observes his opponent, orients
himself, makes a decision and then acts.
The ideal process is to skip the decision

15 See Barabási and Bonabeau, “Scale-free networks,” Scientific American 288, 50-59 (2003).

16 Barabási & Bonabeau, pp. 54

17 Barabási & Bonabeau, pp. 56

18 Sageman, pp. 140-141

19 I would like to credit my colleague Dan Abbot of the University of Nebraska - Lincoln for this exercise in theoretical amalgamation.

4
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 5

tion, attacks the enemy’s civil society,


and his ability to OBSERVE and ORI-
ENT himself towards his enemy, which
he himself becomes. Each generation
moves deeper and deeper into the OODA
loop. Thus we must ask, what will 5GW
look like?

By extrapolating from generational


warfare’s progression deeper into the
OODA loop we can deduce that 5GW
will attack an enemy’s ability to OB-
SERVE. The enemy could be blind, un-
aware to the true identity of the adver-
sary he is engaging with, or maybe
process, to be able to act on reflex, from 4GW is fought on a moral level, without oblivious to the fact he is fighting a war
the gut. This is what the Germans call regard to the nation-state, and usually at all. But assuming that a war requires
“fingertip feeling” or fingerspitzengefuhl. through asymmetric means. It is much two or more sides to actually be aware of
Thus the decision process is ideally a like our concept of netwar. engagement, let us explore the puzzle of
secondary process. First generation warfare is character- being unable to observe one’s enemy.
William Lind’s framework of genera- ized by massed armies, which moved The distributed networks of both
tional warfare is not without controversy, wherever their feet would take them, and 4GW and netwar have proven resilient to
but when combined with Boyd’s OODA fought with commanders on the battle- the identification of a center of gravity
loop, we can extrapolate a type of war- field. The objective was to destroy the that may be attacked, destroying the en-
fare that has yet to be defined. The four enemy’s army, hopefully gaining advan- emy. But what if even those nebulous
generations of war are generally consid- tage by deciding which battlefield to leader-hubs were to disappear? In 1992
ered to begin at the dawn of the modern fight on. Thus, 1GW was centered former Grand Dragon of the Knights of
state. The first generation was that of line around the enemy’s ability to DECIDE the Ku Klux Klan Louis Beam penned an
and column, fought by massing infantry and ACT. Thanks to the telegraph, rail- article entitled “Leaderless Resistance”
at a focal point, or schwerpunkt in way and other modern communications which attempted to outline a new organ-
Clausewitz’s terms. This was war during the second generation of warfare saw the izational design to fight against state
Napoleon’s time. The second generation influx of massive amounts of informa- tyranny. Beam calls for the abolition of a
developed as improvements were made tion to commanders far behind the line of pyramid-style organization because
in weapons and massed firepower in- battle. Decisions had to be made based “nothing is more desirable” for federal
cluding the rifled musket, breechloaders, on this information about where and agencies than opposing groups who are
the machine gun and indirect fire. World when to make the big push. 2GW moves “unified in their command structure.” He
War I is an example of 2nd generation further into the OODA loop and centers advises using a cell structure, but to de-
warfare. The third generation, as evinced around the ability to ORIENT and DE- fend against attacks by the federal gov-
in the blitzkrieg tactics of World War II, CIDE. 3GW moves further in still, at- ernment the structure must be deeply
is that of maneuver warfare. 20 Fourth tacking an enemy’s ability to ORIENT decentralized with no headquarters giv-
generation warfare, commonly referred himself by unleashing lightning maneu- ing command or direction. He dubbed
to as 4GW, is a departure from the first ver attacks at unexpected points. Finally, these “Phantom cells.” Arguing that “in
three generations in that it is not reliant 4GW, which is an asymmetrical battle any movement, all persons involved have
on technology. In fact, it is in a way a over the moral superiority of the popula-
regression, to a style of warfare from
before the age of the modern state.

... what changes in the Fourth Genera-


tion is who fights and what they fight
for. ... Fourth Generation war focuses
on the moral level, where it works to
convince all parties, neutrals as well
as belligerents, that the cause for
which a Fourth Generation entity is
fighting is morally superior. It turns
its state enemies inward against them-
selves on the moral level, making the
political calculations of the mental
level irrelevant.21

20 This overview of the first three generations of war is from Hammes, pp. 12-13

21 See Lind’s review of The Sling and the Stone online at http://www.d-n-i.net/lind/lind_11_05_04.htm

5
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 6

the same general outlook, are acquainted very difficult to define phenomenon. garded as having a form, would strike
with the same philosophy, and generally Further research is currently being con- deep into our OODA loop and could
react to given situations in similar ways” ducted into the properties of emerging cause massive expenditures as state lead-
Beam put the onus on the individual to networks. ers try to protect their citizens from a
acquire the necessary skills and intelli- How this could affect security can be threat constructed by the leaders them-
gence to carry out missions for the seen in today’s headlines. Pre-2001 Al selves.
“cause.” Coordinating attacks will be Qaeda was a network with numerous
Caution in progress
possible because: hubs able to give commands and direc-
tions to sprawling regional networks. It’s Recent technological advances have
Organs of information distribution most famous leader-hub, Osama bin brought the organizational concept of
such as newspapers, leaflets, comput- Laden, was readily identifiable, as well networks to the forefront of thought in
ers, etc., which are widely available as his closest advisors. After the October business, sociology, science and security.
to all, keep each person informed of 2001 invasion, Operation Enduring The simple network topologies presented
events, allowing for a planned re- Freedom, smashed the physical head- by Arquilla and Ronfeldt prove a good
sponse that will take many variations. initial step in bringing a more scientific
quarters of Al Qaeda the amount of di-
No one need issue an order to anyone. understanding of network theory to the
Those idealist (sic) truly committed to rect control held by bin Laden dimin-
ished greatly. Direct interaction through field of security studies. Even with the
the cause of freedom will act when rudimentary comprehension of network
they feel the time is ripe, or will take training camps was replaced by globally
distributed passive communication that structure in military circles, there is no
their cue from others who precede
them. outlined the group’s objectives. Al Qaeda doubt that the power of network-based
was forced into becoming an even more organization is felt at all levels.
distributed network. This development Yet caution is to be advised, and a
Beam credits the idea of the phantom
gave rise to the disappearance of Al better understanding of how networks
cells to one Col. Ulius Louis Amoss,
Qaeda the terrorist “organization”, and form and act in the real world will help
who apparently first wrote of leaderless
the appearance of Al Qaeda the “move- to avoid pitfalls. The power of an all-
resistance in 1962, thirty years before
ment.” channel network would be devastating,
Arquilla and Ronfeldt conceived of net-
A core organization of Al Qaeda still but John Arquilla made a brilliant obser-
war.
theoretically exists, but there seems to be vation in a 2003 inteview:
The type of organization described by
Beam is known as an emergent network. a much more loose global community
surrounding Al Qaeda’s “cause.” Many "On the other hand, this great connec-
Emergence is a phenomenon that is evi- tivity is an inducement to overcontrol.
denced in many places, from multicellu- regional groups, heretofore unknown to The people at very high levels can
lar biological organisms, to metropolitan have any direct contact with bin Laden now be looking at what the fellow in
zoning to no-limit poker. Emergence is a or his cadre, have stood up to claim the field is looking at, and the tempta-
dynamic process of self-organization membership to the greater network of Al tion [to micromanage] is almost too
where nodes behave individually under a Qaeda, forming regional franchises of much to resist. We have to be very,
set of simple rules, and yet as a whole the organization. Abu Musab al- very careful about this."24
render a complex pattern. Steven John- Zarqawi’s Jama'at al-Tawhid wal-Jihad
son, author of Emergence (2001) ex- (JTJ) announced their alleigance to Al A more accurate model of real world
plains: Qaeda in in October 2004 changing their networks will give us the advantages not
name to “Al Qaeda in Iraq.”23 Other only of understanding our enemies, and
Emergence is what happens when the copycats, small distinct groups with no foresight into alternative organizational
whole is smarter than the sum of its direct contact with Al Qaeda cells but structures of future enemies, but also on
parts. It's what happens when you looking to contribute to the overall goals how to move away from the rigid hierar-
have a system of relatively simple- of Al Qaeda, are a possibility. chical structure of our current military
minded component parts – often there Small cells, with no links to one an- system, and in what areas it is appropri-
are thousands or millions of them – other forming a larger network, operating ate or even possible. This has been al-
and they interact in relatively simple
individually under a very simple set of ready suggested by others including re-
ways. And yet somehow out of all
this interaction some higher level rules (e.g. kill Americans, disrupt gov- tired Colonel Thomas X. Hammes who
structure or intelligence appears, usu- ernment activities, hack a certain target’s advocates becoming "organizationally
ally without any master planner call- computer) can give the impression of networked to overcome the inertia and
ing the shots. These kinds of systems higher level coordination and a sense of restriction of information flow character-
tend to evolve from the ground up.22 organization – even where there is none. istic of our 19th-century
Thus, 5GW could be characterized not bureaucracies."25 Note that Hammes
Emergence is unpredictable at the by our inability to observe an opponent, suggestions for re-organization are lim-
lowest levels of operations. Thus it is a but by perceiving an opponent where ited. Information-sharing benefits from a
there is none. This formless enemy, re-

22 Steven Johnson interview (2002) online at http://www.oreillynet.com/pub/a/network/2002/02/22/johnson.html

23 Information on the JTJ can be found at the MIPT Terrorism Knowledge Base online at http://www.tkb.org/Group.jsp?groupID=4338

24Interview with John Arquilla, Conversations with History: Institute of International Studies, UC Berkeley available online at
http://globetrotter.berkeley.edu/people3/Arquilla/arquilla-con0.html

25 Hammes, pp. 226

6
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 7

flat organizational structure, where in-


formation can pass from one side of the References
network to the other in just a few short John Arquilla and David Ronfeldt, In Athena’s Camp: Preparing for conflict in the informa-
jumps. Hierarchical approaches to tion age, RAND, Santa Monica (1997).
information-sharing, particularly those
that prioritize security over information John Arquilla and David Ronfeldt, Networks and Netwars, RAND, Santa Monica (2001).
dispersion, tend to trap information in
so-called "stovepipes." Steward Brand Albert-Lásló Barabási, Linked, Plume, London (2003).
once said, "Information wants to be
free." This statement represents the prob- Albert-Lásló Barabási, Eric Bonabeau, “Scale-free networks,” Scientific American 288, 50-
lems facing both the military and the 59 (2003).
state in the information age.
Arquilla and Ronfeldt contend that it Albert-Lásló Barabási, “Network Theory-The emergence of creative enterprise,” Science
308, 639 (2005).
takes a network to fight a network, yet
this still requires investigation. Once
Louis Beam, “Leaderless Resistance” (1992) available online at
critical hubs of a network have been http://www.louisbeam.com/leaderless.htm
identified, it is conceivable that on a tac-
tical level, a traditional hierarchical mili- Bruce Berkowitz, The New Face of War, Free Press, New York (2003).
tary organization could eliminate these
nodes and collapse the network. A more Col. Thomas X. Hammes, The Sling and the Stone, Zenith Press, St. Paul, MN (2004)
network-based approach should help in
ridding our systems of waste, but should Steven Johnson interview, “Steven Johnson on ‘Emergence’” (2002) available online at
not discard that which is worth keeping. http://www.oreillynet.com/pub/a/network/2002/02/22/johnson.html

William Lind, “The Changing Face of War: Into the Fourth Generation,” Marine Corps
Gazette, 22-26 (Oct 1989).

David Ronfeldt, “Al Qaeda and its affiliates: A global tribe waging segmental warfare?”,
First Monday available online at http://www.firstmonday.org/issues/issue10_3/ronfeldt/
(Feb 2005)

Marc Sageman, Understanding Terror Networks, University of Pennsylvania Press, Phila-


delphia (2004).

Zedong Mao trans. Samuel Griffith, On Guerilla Warfare, Praeger, New York (1961)

Você também pode gostar