Escolar Documentos
Profissional Documentos
Cultura Documentos
Historical Antecedents
From the current military perspec-
tive netwar is associated with asym-
metric threats, pitting non-state ac-
tors against a state who holds con-
ventional military dominance. Thus
Netwar 2.0 networked conflict is not the stuff of
modern traditional warfare. With the
Towards a new military theory of social networks unchallenged dominance of the
American military today, the net-
works of terrorist groups and insur-
The term “netwar” was coined in the works on netwar. 2 The book covered a gents has come to the forefront of
early 1990’s1 by John Arquilla and David wide breadth of topics from terror and current military strategic inquiry. In
Ronfeldt who felt that the information crime to activism and social movements.
revolution was going to have an un- During that time Albert-Lásló Barabási, a Networks and Netwars Arquilla and
precedented impact on the way conflict physicist from the University of Notre Ronfeldt list ten examples of recent
is carried out. Since its inception the Dame, was making immense headway in netwars since 1994.3 The American
concept of netwar has been confused the study of networks. His discovery of invasion of Afghanistan in 2001 saw
with war waged on or through computer- the scale-free quality of real networks US Special Forces deployed in a dis-
ized platforms on the Internet. Though has had resounding impact in the fields tributed network on the ground. But
Internet and communications technolo- of computer science, theoretical physics is netwar truly a newly discovered
gies (ICT) can be an important ingredient and biology. Due to the timing, Ba- form of war?
for netwar, the more profound attribute rabási’s findings were not incorporated The advent of the telegraph and the
of netwar is the organizational design of into the updated concept of netwar. railway was an information revolution in
its protagonists. In netwar one or more There is great potential for the fields itself, allowing commanders far from the
sides display a dispersed organization; a of netwar and network theory in a mili- front to exert control over men in the
widely cast social network without the tary context to be revolutionized due to trenches. In fact the type of “total war”
centralized command structure found in these recent breakthroughs. A better un- that World War I represented – requiring
today’s military hierarchies. Although derstanding of the underlying structure the efforts of the people and industry to
the World Wide Web has acted as a cata- of networks will also aid in the discovery be subordinate to military goals – galva-
lyst for increased awareness of networks of historical analogues. Though the con- nized the organizational design of the
due to its capabilities for maintaining cept of netwar was established in the hierarchy for the rest of the 20th
relatively cohesive groups on a global early 90’s the actual practice of netwar century.4 Prior to the Great War, limita-
scale, netwar is more about social or- could possibly date back to the earliest tions on communication technology re-
ganization rather than technological social networks of humankind. Recent quired distant units to act semi-
revolution. advances in social network analysis may autonomously. The Royal British Navy
In 2001, Arquilla and Ronfeldt re- aid historical researchers searching for would receive extremely simple orders
leased a collection of essays that ex- antecedents to modern-day netwar. In the (ie. “Find French ships and sink them”)
plored in depth the impact of social net- same manner, theories about future that they would act on during months at
1 John Arquilla and David Ronfeldt first introduced the term “netwar” in their 1993 article “Cyberwar is Coming!”
4 In fact, the 20th century corporation, born out of the factories of the industrial revolution, is another example of the dominance of hierarchies in the last century.
1
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 2
sea between port calls, and their next century exhibit a surprising rigid hierar- work. Until recently, no such model
mission. chical structure from the perspective of existed.
This is not to say that there were no today’s current challenges in fighting
forms of netwar after the invention of insurgency and terrorism worldwide. Network theory today
modern industrial warfare. Even during Despite a community of prominent theo- The study of social networks in con-
the heydey of hierarchy militaries ex- reticians trying to come to terms with flict was pioneered by John Arquilla and
perimented with decentralized forms of post-colonial “people’s wars,” the notion David Ronfeldt in a number of essays
control. The German concept of Auftrag- of a resistance movement divorcing itself during the 1990’s.9 The “information
staktik, or "mission tactics", allowed from hierarchy and organizing along the age” provided a new paradigm for con-
each officer and NCO to do what they lines of a distributed network seems to flict, particularly in the face of military
thought needed to be done in order to have remained unexplored. This could be dominance by the post-Cold War victor,
achieve the mission goal. Decision- due to culture. Mao’s revolution was America. Arquilla and Ronfeldt proposed
making was devolved to the lowest lev- steeped in Leninist doctrine, which re- three different types of networks –the
els. The Israeli Defense Force utilized quired strict socialization. Yet he did say chain, the star or hub network, and the
“optional control” allowing field com- that “command must be centralized for all-channel network– that could be used
manders to make their own tactical deci- strategical purposes and decentralized for to categorize network-based threats.
sions regardless of whether or not they tactical purposes.”6 These three topologies could also be
had orders. Furthermore, during World There are also possibilities for inves- used together, or form a hybrid with a
War I, T.E. Lawrence (of Arabia) master- tigating primitive netwar from an age hierarchical organization. For example,
fully navigated tribal politics to organize even earlier than Westphalia. In fact, some actors have a “hierarchical organi-
a network of irregulars with a single mis- Arquilla and Ronfeldt themselves use the zation overall but use network designs
sion: harass Turkish lines of communica- Mongols of the 12th and 13th centuries for tactical operations; or other actors
tion. as an example of cyberwar and netwar.7 may have an all-channel network design
Yet not all guerilla movements are Ancient tribes, one of the earliest form of overall but use hierarchical teams for
equal in the eyes of netwar. Both Mao human organization, display many char- tactical operations.”10 Needless to say,
Tse Tung’s and Roger Trinquier’s influ- acteristics similar to the kind of distrib- the possible configurations are numer-
ential tracts in guerilla warfare outline uted networks current militaries face. ous, which represents a challenge to ana-
extremely hierarchical forms of organi- Tribes are relatively horizontal organiza- lysts seeking to map a particular net-
zation. Mao’s On Guerilla Warfare con- tions, with each member roughly equal. work.
tains very specific personnel and arms Clans represent the various segments of Real world examples, such as the 19
requirements in a strict hierarchy divid- tribes, and can operate autonomously. hijackers involved in the 11 September
ing divisions into regiments, battalions Lastly, tribes are “leaderless” in that eld- attacks of 2001, don’t fall neatly into the
and companies. Trinquier’s diagrams of ers are advisors or facilitators, and their categories described by Arquilla and
the military organization of the National roles change due to circumstances. One Ronfeldt. A simple visual comparison
Liberation Army (ALN) in Algiers dur- of the most important netwar-like charac- shows that the 9-11 terrorist network
ing the 1950’s show a hierarchical com- teristic of tribes is their mastery over the falls somewhere in between a star net-
mand and control structure sitting atop tactic of swarming. 8 Ancient tribes repre- work and and all-channel network (refer
isolated three-man cells: each discrete sent amazing potential for discovering to next page). 11 An all-channel network
armed group consisted of thirty-five historical analogues to netwar. of 19 nodes would render 361 links, with
armed men. Trinquier charted the ALN’s Possible historical examples of net- each hijacker linked with all 18 other
bomb-throwing network as well, which war seem to be plentiful throughout his- hijackers. Only 112 total connections
was “kept apart from other elements of tory. Upon further investigation a pattern exist, less than a third of the predicted
the organization ... broken down into a might emerge, such as the ostensible amount. And yet there is no central hub,
number of quite distinct and compart- correlation between the rise of industrial maintaining links with all other nodes.
mented branches, in communication only warfare and de-emphasis on de- The best connected node has only 11
with the network chief through a system centralized, networked organizational links, the least connected only 2. The
of letter boxes.”5 designs. But in order to search out pre- four best connected nodes (with 9, 10 or
The guerilla networks of revolution- cise analogues we need an accurate 11 links) account for nearly half of the
ary wars during the middle of the 20th model of when an organization is a net-
5 Roger Trinquier’s Modern Warfare: A French View of Counterinsurgency is available online at http://www-cgsc.army.mil/carl/resources/csi/trinquier/trinquier.asp
8 See David Ronfeldt, “Al Qaeda and its affiliates: A global tribe waging segmental warfare?”
9 See In Athena’s Camp and Networks and Netwars for many of Arquilla and Ronfeldt’s articles.
11
Chain, star or hub, and all-channel network diagrams reproduced from Arquilla and Ronfeldt (2001) pp. 8. “Social Network Analysis of the 9-11 Terrorist Net-
work” by Valdis Krebs is available online at http://orgnet.com/hijackers.html
2
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 3
12 The following outline of network theory history comes from Barabási’s Linked, unless otherwise noted.
13 Barabási, pp. 14
14 Barabási, pp. 16
3
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 4
networks in the real world. Nodes in explained by a bell curve, but by a power found that up to 80 percent of ran-
nature tend to have many more than the law. domly selected routers could fail and
one link necessary to be part of the A power law predicts that most nodes the Internet would still be able to func-
whole. It is estimated that we know be- have only a few links, and a few nodes tion. But a networks reliance on hubs
tween 200 and 5000 people by name. have a great many number of links. means that it is highly vulnerable to co-
Also, random network theory says that These nodes with an anomalously large ordinated attacks on the relatively few
the more links added to a network, the number of links are the hubs that keep hubs. The question remains: how many
more difficult it is to find a node that is the network from flying apart into hubs need to be neutralized to crash a
relatively isolated. Most nodes will have smaller, isolated mini-networks. In a system? Recent research suggests that
approximately the same number of links. random network the peak of distribution somewhere between 5 to 15 percent of
The result is a distribution of links repre- represents the "average node" in a sys- all hubs need to be eliminated to destroy
sented by a bell curve. Yet in nature it is tem, which retains the same number of a network. 17
entirely possible to find nodes that have links as a majority of nodes within the In the case of the War on Terror, ran-
only a very few links, and other nodes system. Thus a random network is said to domly stopping individual terrorists at
with a massive number of links. have a scale. Networks with a power law the border will have little negative im-
Erdős and Rényi could not explain distribution don't have a peak, and there- pact on a terrorist network. But, as hubs
this complexity, and substituted it with fore there is no "average node." These in a social network are the relay points
randomness. This concept of random types of networks are called "scale-free." for many communications, we should be
networks has dominated thought on Examples of scale-free networks are able to identify and destroy these leader-
complex networks until the late 1990's. It found throughout nature, including hubs and inflict real damage on the
is evident in Arquilla and Ronfeldt's molecules involved in burning food for network. 18
three models of networks, each with per- energy; the router connections that make Barabási's work on the way scale-free
fectly symmetrical distribution of links. up the Internet; and collaborations and networks form could also be a boon to
In 1998 physicist Albert-László Ba- sexual relations between people.16 They current link analysis techniques. As each
rabási and Eric Bonabeau with Hawoong are represented by a topology some- new node enters a system, it prefers to
Jeong and Réka Albert of the University where in between the all-channel and star attach to an existing node that already
of Notre Dame used a web crawler to or hub network of Arquilla and Ronfeldt. has many other connections. As time
trawl the World Wide Web and map the Barabási and his team have continued goes on, the system becomes dominated
links between webpages. 15 They were their study of scale-free networks and by hubs with a massive number of links.
surprised to find that the World Wide have made some intriguing discoveries Applying these principles to social net-
Web is not very democratic in its place- beneficial to the field of military studies. work analysis used in mapping terrorist
ment of links, in fact a few highly con- For example, scale-free networks are or insurgent networks may help to iden-
nected webpages were holding the entire extremely robust against accidental fail- tify nodes where preferential attachment
network of the web together. Most of the ures. The number of nodes with few is high, where recruitment and growth
webpages, 80 percent, had fewer than links far outweighs the number of hubs, occur.
four links, while a tiny minority of 0.01 so any random attack against a network
percent of nodes had over one thousand is far more likely to hit a relatively iso-
links. This distribution of links is not lated node, without any serious repercus- Netwar 3.0?
sions to the entire system. Barabási et al In an attempt to deduce the next type
of netwar we can extrapolate from a
combination of John Boyd’s concept of
the OODA loop and William Lind’s
model of generational warfare. 19
US Air Force Colonel John Boyd
conceived a decision cycle made up of
four elementary processes: observe, ori-
ent, decide and act. Boyd was a fighter
pilot, and argues that in a dogfight the
first combatant to make it to the end of
his decision cycle would be victorious.
The pilot observes his opponent, orients
himself, makes a decision and then acts.
The ideal process is to skip the decision
15 See Barabási and Bonabeau, “Scale-free networks,” Scientific American 288, 50-59 (2003).
19 I would like to credit my colleague Dan Abbot of the University of Nebraska - Lincoln for this exercise in theoretical amalgamation.
4
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 5
20 This overview of the first three generations of war is from Hammes, pp. 12-13
21 See Lind’s review of The Sling and the Stone online at http://www.d-n-i.net/lind/lind_11_05_04.htm
5
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 6
the same general outlook, are acquainted very difficult to define phenomenon. garded as having a form, would strike
with the same philosophy, and generally Further research is currently being con- deep into our OODA loop and could
react to given situations in similar ways” ducted into the properties of emerging cause massive expenditures as state lead-
Beam put the onus on the individual to networks. ers try to protect their citizens from a
acquire the necessary skills and intelli- How this could affect security can be threat constructed by the leaders them-
gence to carry out missions for the seen in today’s headlines. Pre-2001 Al selves.
“cause.” Coordinating attacks will be Qaeda was a network with numerous
Caution in progress
possible because: hubs able to give commands and direc-
tions to sprawling regional networks. It’s Recent technological advances have
Organs of information distribution most famous leader-hub, Osama bin brought the organizational concept of
such as newspapers, leaflets, comput- Laden, was readily identifiable, as well networks to the forefront of thought in
ers, etc., which are widely available as his closest advisors. After the October business, sociology, science and security.
to all, keep each person informed of 2001 invasion, Operation Enduring The simple network topologies presented
events, allowing for a planned re- Freedom, smashed the physical head- by Arquilla and Ronfeldt prove a good
sponse that will take many variations. initial step in bringing a more scientific
quarters of Al Qaeda the amount of di-
No one need issue an order to anyone. understanding of network theory to the
Those idealist (sic) truly committed to rect control held by bin Laden dimin-
ished greatly. Direct interaction through field of security studies. Even with the
the cause of freedom will act when rudimentary comprehension of network
they feel the time is ripe, or will take training camps was replaced by globally
distributed passive communication that structure in military circles, there is no
their cue from others who precede
them. outlined the group’s objectives. Al Qaeda doubt that the power of network-based
was forced into becoming an even more organization is felt at all levels.
distributed network. This development Yet caution is to be advised, and a
Beam credits the idea of the phantom
gave rise to the disappearance of Al better understanding of how networks
cells to one Col. Ulius Louis Amoss,
Qaeda the terrorist “organization”, and form and act in the real world will help
who apparently first wrote of leaderless
the appearance of Al Qaeda the “move- to avoid pitfalls. The power of an all-
resistance in 1962, thirty years before
ment.” channel network would be devastating,
Arquilla and Ronfeldt conceived of net-
A core organization of Al Qaeda still but John Arquilla made a brilliant obser-
war.
theoretically exists, but there seems to be vation in a 2003 inteview:
The type of organization described by
Beam is known as an emergent network. a much more loose global community
surrounding Al Qaeda’s “cause.” Many "On the other hand, this great connec-
Emergence is a phenomenon that is evi- tivity is an inducement to overcontrol.
denced in many places, from multicellu- regional groups, heretofore unknown to The people at very high levels can
lar biological organisms, to metropolitan have any direct contact with bin Laden now be looking at what the fellow in
zoning to no-limit poker. Emergence is a or his cadre, have stood up to claim the field is looking at, and the tempta-
dynamic process of self-organization membership to the greater network of Al tion [to micromanage] is almost too
where nodes behave individually under a Qaeda, forming regional franchises of much to resist. We have to be very,
set of simple rules, and yet as a whole the organization. Abu Musab al- very careful about this."24
render a complex pattern. Steven John- Zarqawi’s Jama'at al-Tawhid wal-Jihad
son, author of Emergence (2001) ex- (JTJ) announced their alleigance to Al A more accurate model of real world
plains: Qaeda in in October 2004 changing their networks will give us the advantages not
name to “Al Qaeda in Iraq.”23 Other only of understanding our enemies, and
Emergence is what happens when the copycats, small distinct groups with no foresight into alternative organizational
whole is smarter than the sum of its direct contact with Al Qaeda cells but structures of future enemies, but also on
parts. It's what happens when you looking to contribute to the overall goals how to move away from the rigid hierar-
have a system of relatively simple- of Al Qaeda, are a possibility. chical structure of our current military
minded component parts – often there Small cells, with no links to one an- system, and in what areas it is appropri-
are thousands or millions of them – other forming a larger network, operating ate or even possible. This has been al-
and they interact in relatively simple
individually under a very simple set of ready suggested by others including re-
ways. And yet somehow out of all
this interaction some higher level rules (e.g. kill Americans, disrupt gov- tired Colonel Thomas X. Hammes who
structure or intelligence appears, usu- ernment activities, hack a certain target’s advocates becoming "organizationally
ally without any master planner call- computer) can give the impression of networked to overcome the inertia and
ing the shots. These kinds of systems higher level coordination and a sense of restriction of information flow character-
tend to evolve from the ground up.22 organization – even where there is none. istic of our 19th-century
Thus, 5GW could be characterized not bureaucracies."25 Note that Hammes
Emergence is unpredictable at the by our inability to observe an opponent, suggestions for re-organization are lim-
lowest levels of operations. Thus it is a but by perceiving an opponent where ited. Information-sharing benefits from a
there is none. This formless enemy, re-
23 Information on the JTJ can be found at the MIPT Terrorism Knowledge Base online at http://www.tkb.org/Group.jsp?groupID=4338
24Interview with John Arquilla, Conversations with History: Institute of International Studies, UC Berkeley available online at
http://globetrotter.berkeley.edu/people3/Arquilla/arquilla-con0.html
6
WS 500 - Netwar 2.0 20 March 06 - Chad KOHALYK 7
William Lind, “The Changing Face of War: Into the Fourth Generation,” Marine Corps
Gazette, 22-26 (Oct 1989).
David Ronfeldt, “Al Qaeda and its affiliates: A global tribe waging segmental warfare?”,
First Monday available online at http://www.firstmonday.org/issues/issue10_3/ronfeldt/
(Feb 2005)
Zedong Mao trans. Samuel Griffith, On Guerilla Warfare, Praeger, New York (1961)