Military Review English Edition May-June 2014 | Page 50
warfare theory is designed to change the perspective
about the military use of IT from a platform-centric
focus, in which an item of equipment is the centerpiece, to a network-centric focus based on the four
domains of conflict.40 The theory can be applied to
any type of military operation—offense, defense, or
stability. Furthermore, the idea of network-centric
warfare should not be confused with improved
speed of command due to better technology, which
is a platform-centric notion.
The Army continues to focus on individual
equipment as it attempts to digitize operations by
introducing more digital technology components
rather than unifying how leaders think and fight in
the digital space.41 This leads to capabilities being
overlooked. Military technology has advanced to
the point that information superiority has been possible for some time.
Some military organizations already have devised
means to achieve seamless interservice integration
between their combat capabilities. For example,
some Army and Air Force units in Afghanistan
have integrated their systems (the Army’s ABCS,
Air Force aircraft systems, and unmanned aerial
systems [UASs]) so that pilots and infantrymen can
have almost perfect awareness of each other’s positions before a fighter aircraft arrives on station.42
The technology enables leaders to make faster and
more informed assessments of the environment
before applying coup d’œil and determination.
Unfortunately, few leaders recognize the potential
that such capability affords soldiers so it remains
underutilized.43
Applied Network-Centric Warfare
Theory
Two vignettes from my experience in Afghanistan during 2009 demonstrate the application of
network-centric warfare theory.
Vignette 1. Task Force (TF) Stryker, a Stryker
BCT, had recently arrived in Afghanistan and
started conducting operations in early August
2009. During the first major offensive mission,
TF Stryker elements observed a group of Taliban
mining a road at approximately 1900 hours on 1
September 2009 and attacked them with aerial
munitions from a UAS.44 The TF Stryker command group, consisting of the commander and
assault command post personnel from the brigade
48
battle staff, were forward at a small combat outpost. The command group observed the attack
and commanded follow-on operations from the
outpost. The enemy, after the attack, evacuated
casualties to an intermediate point, massed additional personnel, and continued to evacuate the
most seriously injured to an outpost—a Canadianadvised Afghan police element across the river
and outside TF Stryker’s area of operations,
which provided the highest-quality medical care
available. The wounded Taliban were identified
by 2100 hours, and the Afghan National Security
Forces assumed responsibility for their medical
care.45
Analysis of vignette 1. The command group
relied on a variety of computing devices and
multimedia data streams to observe enemy tactics,
techniques, and procedures (TTPs) in real time.
The command group’s equipment included video,
Internet chat, radio (digital) voice communication,
VoIP (voice over Internet protocol), laptop PCs,
position location data, FBCB2, and Land Warrior
(a ruggedized wearable computer for infantrymen).46 B V6W6RF