a popular government, without popular information or the

135
A popular Government, without popular information or the means of acquiring it, is but a Prologue to a Farce or a Tragedy; or perhaps both. Knowledge will forever govern ignorance; And a people who mean to be their own Governors, must arm themselves with the power which knowledge gives. JAMES MADISON to W. T. BARRY August 4, 1822

Upload: others

Post on 04-Jan-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

A popular Government,without popular information or the means of

acquiring it,is but a Prologue to a Farce or a Tragedy; or

perhaps both.Knowledge will forever govern ignorance;And a people who mean to be their own

Governors,must arm themselves with the power which

knowledge gives.

JAMES MADISON to W. T. BARRYAugust 4, 1822

THE MESH AND THE NET

Speculations on Armed Conflict ina Time of-Free Silicon

MARTIN C. LIBICKI

McNair Paper 28March 1994

INSTITUTE FOR NATIONAL STRATEGIC STUDIES

NATIONAL DEFENSE UNIVERSITYWashington, D.C.

DTTC QUALITY INSPECTED M

94 31 042

NATIONAL DEFENSE UNIVERSITYE3 President: Lieutenant General Paul G. Cerjan0 Vice President: Ambassador Howard K. Walker

INSTITUTE FOR NATIONAL STRATEGIC STUDIES13 Director: Johannes A. BinnendijkPublications Directorate 13 Fort Lesley J. McNair0 Washington, D.C. 20319-6000 0 Phone: (202) 475-1913 0 Fax: (202) 475-1012O Director: Frederick T. Kiley 0 Deputy Director: Lieutenant Colonel Barry McQueen0 Chief Publications Branch: George C. Maerz Editor: Mary A. Sommerville[ EaItorfor this issue: Frederick T. Kiley0 Secretary: Laura Hall 0 Circulation Manager: Myma Morgan

Martin C. Libicki is a Senior Fellow, Institute for National Strategic Studies, NationalDefense University, where he specializes in industrial economics and informationtechnology.

From time to time, INSS publishes short papers to provoke thought and inform discussionon issues of U.S. national security in the post-Cold War era. These monographs presentcurrent topics related to national security strategy and policy, defense resource man-agement, international affairs, civil-military relations, military technology, and joint, com-bined, and coalition operations.

Opinions, conclusions, and recommendations, expressed or implied, are thoseof the authors. They do not necessarily reflect the views of the National DefenseUniversity, the Department of Defense, or any other U.S. Government agency.Cleared for public release; distribution unlimited.

Readers are invited to submit (nonreturnable) manuscripts for consideration forpublication. Please submit them in WordPerfect on 3.5 inch diskettes with one printout.Portions of this publication may be quoted or reprinted without further permission, withcredit to the Institute for National Strategic Studies, Washington, D.C. A courtesy copyof reviews and tearsheets would be appreciated.

Library of Congress Cataloging-in-Publlcation Data

Libicki, Martin C.The mesh and the net : speculations on armed conflict in a time of free silicon /

Martin C. Libicki.p. cm. -- (McNair paper ; 28)

"March 1994."1. Electronics in military engineering. 2. Information technology. I. National

Defense University. Institute for National Strategic Studies. II. Title. Ill. Series:McNair papers ; no. 28.UG485.L53 1994 93-47114355.02'0285--dc2O CIP

For sale by the U.S. Government Printing OfficeSuperintendent of Documents, Mail Stop: SSOP, Washington, DC 20402-9328

ISSN 1071.7552

Contents

TERM S .............................. 1

1. THE RISING TIDAL WAVE ............. 5Military Competition Quiescent ........... 5Information Technology Ascendent ........ 7The Logic of Distributed Intelligence ...... 11Coordination-and-Convergence .......... 15There Will be Other Changes ........... 17

2. THE SMALL AND THE MANY .......... 19Pop-Up Warfare ..................... 20The Mesh ......................... 24Fire-Ant Warfare .................... 28Platforms Against Fire-Ants ............. 38Broader Implications ................... 43Conclusions ........................ 50

3. TOWARD AN INFORMATION CORPS .... 52Rationalizing a Corps ................. 53:information Warfare .................. 61Functions of a Corps ................. 63Objections to a Corps ................. 67Conclusions ........................ 69

iii

I

f4. WARES OF WAR: HARD AND SOFT .... 71Building Swords from Plowshares ......... 72Fostering Open Systems ............... 78Software .......................... 81Strategic Competition .................. 83

5. UNCONVENTIONAL CONFLICT .......... 86Rural Conflict ....................... 86Urban Conflict ...................... 88Net States?9 . . . . . . . . . . . . . . . . . . . . . . . . 95

6. THE NET AND ITS DISCONTENTS ....... 96From Global Village ................... 97To Global Villager ................... 104Ghosts in the Net .................... 111So What? ......................... 119

7. CONCLUSIONS: MESH VERSUS NET .... 122

EPILOGUE: DETOURS FROM THE INEVITABLEFUTURE ............................ 126

~ ~13ace&

The MESH AND THE NETSpeculations on Armed Conflict in

a Time of Free Silicon

MARTIN C. LIBICKI

TERMS

Radical change--as the growth of information technologyportends--creates a logic which must be grasped on its ownterms.

Great change occurs in two ways.In one, the sleeper awakes to an entirely new world

whose methods and mores are so different from custom asto engender the sense of being somewhere abroad. Theshock between the future and the present stands as a mightymountain whose ascent requires arduous and steadfastefforts goaded by the nagging stretch that lies ahead. Manyof these changes are sudden, many catastrophic.Adjustment is conscious, and often reactionary-theaccidental tourist trying to recreate the comfortable in asharply changed milieu. It is a tomorrow that is fardifferent from today.

In the other, the sleeper awakes to a world littlechanged from the one that slipped into the previous night.

I1

- 7 -

2 THE MESH AND THE NET

This new world is comfortable, and easy--or so it seems.Not until some occasion has compelled a look back is itobvious how far one has come and how effortlessly. It isthe past that is unfamiliar, holding within it, some dimmemory of a life that, in retrosj;ct, made little sense-howdid one cope? It is a today far different from yesterday.

Given a choice, most would choose the second path ofchange and, as it so happened, the important changes havebeen of the second type. Think of a life without the car,the phone, the television, and the machines capable ofbridging the vast oceans that kept the rest of the world farfrom America's shores.

Unfortunately, the second path is also far moredangerous. The world changes, but those in it do not.Never forced to think anew about the implications ofchange, rarely aware of its pace, people scarcely notice howdysfunctional their assumptions have become. The fewwho see the future as quite different from the past, and therest that grow up in the future and have no past, developassumptions more consistent with the new rules. The restnotice their marginality only if forced to; if the change isgradual enough, man's mortal life span can hide thisdisjunction within the normal cycles of growth, maturity,and the yielding of place. Barring rigid institutions thatmindlessly replicate the reflexes of the past into the future,successive generations can cope.

If the change is steady but rapid, no such optimism ispossible. A clash between those who live in the future andthose who only think they do because old habits arecomfortable will occur within the active lifetimes of both.The consequences of maladjustment cannot be buried in themortal life-cycle; they must be faced and squarely so.

The challenge of information technology to nationalsecurity is of that type. Between 1950 and 1980 the

MARTIN C. LIBICKI 3

number of instructions per second that a dollar could buydoubled every three years; since 1980 the number hasdoubled every sixteen to twenty months. In the first fewyears of the 1990s, the pace has, if anything, accelerated.Some slowdown is inevitable, but even at the 1980s rate, athousandfold improvement can be expected in sixteen years;at earlier rates, a leisurely thirty years. By the time thisacceleration runs its course, life and war will have changedradically.

The first reaction of any organization to suchcrisis-using the classic Chinese definition meaning threatand opportunity-is to absorb new technologies into oldways. So it was with electricity. The electric motorreplaced the watermill; the electric trolley, the horse-drawntrolley; television was radio with pictures-and so on.Over time radical changes in technology are understood toinvolve radical changes in the organization of work andsociety as well. Initially the electric motor did not helpproductivity compared to the belt-driven machines itreplaced; in time, vertical factories designed to minimizethe amount of belting gave way to horizontal factoriesdesigned to help the flow of men and material. Similarly,computers cannot help most firms very much until theyreengineer their work processes to accord with the siliconlogic. Conflict both conventional and unconventional willperforce follow the same path-accommodating change firstby incorporation, and next by reinvention.

No change so large can breathe without metaphors, inthis case: Mesh, Net, and Silicon. Mesh-the term appliedto military applications--points to the holes; as informationtechnology places a finer mesh atop the battlefield, moreobjects are caught in it. Net-the term applied to civilianapplications-points to the substance of the system; theconnectivity of people and their machines suggests new

I4 THE MESH AND THE NET

patterns of social relationships and new venues for conflict.Silicon, that which is to become free, stands for bothsemiconductor chips (for computation) and optical fibers(for communications).

Argument: The relationship of the once and futurerevolution in information technology to warfare is analyzedin several steps:

# Chapter 1 outlines the basis for this revolution andexplains why its most natural expression is thedispersion rather than accumulation of informationpower.

* Chapter 2 examines its expression on the battlefieldin three aspects: Pop-up warfare, the rise of theMesh, and the evolution of Fire-ant warfare.

0 Chapter 3 examines whether the revolution on thebattlefield translates into a commensurate revolutionin military organization.

* Chapter 4 discusses implications for acquisition,research and development.

+ Chapter 5 extends the analysis to the case of low-intensity conflict.

* Chapter 6 attempts a broader assessment of howcivilian applications of information technology, theNet, may affect national security.

# Chapter 7 contrasts the Mesh and the Net.* The Epilogue consiaers certain reasons why

information technology may not translate into thevictory of the Small and the Many over the Few andthe Large.

MARTIN C. LIBICKI 5

1. THE RISNG TIDAL WAVE

Despite the waning of military technology competition.information technology, driven by burgeoning commercialmarkets, is likely to continue its rapid pace of development fora decade or two. Such advances are most logically deployedin distributed rather than concentrated form.

The influence of technology on conflict over the nextseveral decades will be the result of a great irony. Just asthe political motivation for developing military technologyhas declined, the information technology fungible to conflictis about to accelerate.

E ai ConatiUton Quiescent

The years 1939 to 1989, which included World War II andthe Cold War, saw intense technological competitionbetween the United States and its adversaries-first NaziGermany and then the Soviet Union. During both Hot andCold Wars our national security was perceived as directlythreatened-any slackening on our part could put us on thewrong side of a deep strategic abyss, with our survival atrisk. Our adversaries felt the same hot breath ofcompetition.

Such fears put a premium on developing militarytechnology rapidly lest one side develop an advantage theother could not trump. The strategic arena hosted thenuclear contests, bomber gaps, missile gaps, windowsopportunity, and Star Wars. The conventional arena sawsubmarines vie with ships, tanks with antitank missiles,stealth aircraft with radar-based air defenses, chemicalweapons with antidotes and the entire panoply of electronicwarfare including counter, and counter-counter. Ouradvances sparked theirs; theirs sparked ours. Military

6 THE MESH AND THE NET

technology evolved under hothouse conditions, and militaryequipment became ever more differentiated from itscommercial counterparts.

The end of the Cold War has retarded militarytechnology competition. Although the United States (andothers) may respond with new technology to emergentmeans of war (e.g., SCUDs used as instruments of terror),no country can respond to our innovations as the Sovietsdid. Other motivations are also muted. Tomorrow'simproved jet fighter may trespass Third World airspacewith less loss of life. Yet its successful development wouldbe less likely to influence the global balance of power aspreceding developments may have done.

The same trends have, if anything, heightenedcommercial competition from both former Warsaw Pacttechnologists, and the growing electronics manufacturingbase of a more market-oriented China. Thus commercialinformation technology will continue to advance at a rapidclip. With every year, more and more technology comesfrom the commercial side. Even before the Cold Warended, the leading role of defense acquisition had begun tofade. Military electronics started lagging behindcommercial electronics and could only hope to stay currentthrough spin-ons of commercial technologies.

It is precisely as the motivation for conductingrevolutions in national security technology slows down thatthe means of doing so accelerates. The latter may yetovercome the inertia of the former. At that point, the worldof conflict will be radically transformed. Although mostelements of the new battlefield will arrive by 2010, exactlywhen every aspect appears and is demonstrated will dependon who is fighting whom and where. Yet once someoneexhibits such capabilities, others will try to followclose behind. Military competition, though usually latent,

momm

MARTIN C. LIBICKI 7

does not tolerate fudging when it emerges.The impact of the information revolution in civil affairs

is likely to follow a smoother but not less radical pace.Personal computers, networks, facsimile machines, andcellular telephones have rendered large chunks of theWest's workspace unrecognizable. Their spread to the"South" (the Third World)-with its far differentsocieties-is likely to promote even greater discontinuity.In some ways, present conditions in underdeveloped nationsresemble past conditions in developed ones: Korea circa1988 equals Japan circa 1964. In other ways, undevelopednations are a synchretic mix of the old and the new.Because Java, Indonesia's core island, is underdeveloped,it should resemble nineteenth century America. Yet three-quarters of all households own color televisions, telephoneservice is increasingly skipping the wireline phase andjumping straight to cellular, and a coterie of Western-educated technocrats support a highly competitive aircraftindustry. It is precisely the combination of traditionalmores, rapid urbanization, a lagging overall living standard,but cheap high-technology goods that will make the ThirdWorld such an interesting stew.

Informanion Technology Ascendent

Information technology doubles roughly every one and ahalf to three years. Each successive generation is bothfaster but cheaper, smaller, and less power-hungry as well.Free silicon is inevitable; more precisely, unlimited amountsof information acquisition, processing, storage, andtransmission capability will be available from indefinitelysmall and inexpensive packages. Limitations oninformation processing capability will constrain the conductof neither military and civilian operations. In a narrow

8 THE MESH AND THE NET

sense, ending these limits, to echo Freud, leaves behind allthe other constraints in life. In a broader sense, asinformation gets cheaper, it substitutes for activities that arenot information intensive.

Both the breadth and speed of these advances mark theflood. IBM introduced its personal computer (PC) in 1981based on the Intel 8088 chip running 250,000 instructionsper second. Pentium-based PCs introduced in 1993 run30,000,000 instructions per second-and for roughly thesame cost. The 300-bit-per-second (bps) modem of 1981cost more than the 14,400-bps modem of 1993. The IBMPC's original 16K DRAM contrasts with the (slightly moreexpensive) 16M DRAM expected in 1994. In 1981 theInternet had 213 hosts connected with 56,000 bps digitallines; in 1993, the Internet has roughly 2 million hostswhose core has 45 million bps digital line today and willhave a billion bps lines in a few years. The IBM XT of1983 had a then-enormous 10-megabyte hard disk in a 5-1/4inch box. Today's choices range from a (much cheaper)20-megabyte hard disk in a 1-1/2 inch box to a (somewhatmore expensive) 600-megabyte disk array in a 3-1/2 inchbox. Technologies with no direct precedent in1981---cellular telephones, compact disks, electrontunneling microscopes, and global positioning systems addfizz to the torrent. By contrast, a jet plane is only fiftytimes faster than a horse-drawn carriage.

Many observers argue that information technologies willbe no exception to the rule that while progress can be rapidfor a while, eventually, all such revolutions peter out. Forexample, every new generation of jet aircraft and enginesover a quarter-century period (1943-1968) was far morecapable than its predecessors. But by the late 1960s onlyevolutionary change was left the Phantom F-4 and theBoeing 747 are today still cost-effective for many missions.

MARTIN C. LIBICKI 9

The rate of new product introductions and market growthfor plastics and other petrochemicals was swift in the 1950sand 1960s. (Recall the singular advice, "Plastics" offeredto the protagonist of the 1968 film The Graduate.) After1975 both rates declined sharply.

If this theme is generally true, how much oomph doesthe information technology revolution have? Today's bestmicroprocessors use .5-micron features. One commonlycited barrier to further progress is that feature sizc can onlyshrink so much (and thus speed can only rise to fast); thislimit, .25 microns, some say will be reached in the late1990s. Advances below that would require a very expensivetransition from optical (and/or ultraviolet) to X-raylithography or something equally powerful. At even finergeometries, quantum effects may play havoc with any chiphowsoever fabricated. Yet these predictions, even iftrue-and the boundaries below which optical methods failkeep retreating--would not necessarily end the informationtechnology revolution.

First, expensive transitions are not necessarilyimpossible ones. By the time a transition is needed,industry will have had time to work out and finance newequipment (even if, being expensive, it comes later).Quantum effects, while harmful at one level, can beexploited at another for atomic-level microprocessors.

Second, even assuming a limit on fine geometries, othermethods exist to flog the performance of electronics. Newchemistries help. Gallium arsenide, whose use is currentlyinhibited by its fragility, permits the same design to runthree to five times faster than one in silicon. The formerwould also use less power and can take more radiation.Other electronic materials (e.g., indium antimonide) alsohold promise. Performance gains may also come fromadding three-dimensional aspects to two-dimensional chips

10 THE MESH AND THE NET

(e.g., trench capacitors or a fully three-dimensional chip).Chip microcode (e.g., RISC, instruction pre-fetching andpipelining) is getting better, which aids all geometries.

Third, better computer architectures multiply the effectsof better semiconductors. Massively parallel machines arealready in the market; neural networks and good fuzzy-logicchips may soon follow.

Fourth, software is also improving thanks to moreefficient algorithms, more reliable programming tools, thecompression of image and data, and more efficient codingof radio transmissions. The technologies of artificialintelligence may also start to bear great fruit as well.

Fifth, ancillary technologies are also improving:photonics (a pure photonic computer was bench-scaled in1992), purer fiber optics for higher bandwidth, magneticdrives down to the size of a matchbox, ever-denser opticalmedia (e.g., CD-ROMs), the possibility of three-dimensional holographic storage, solid state emitters, andmore efficient batteries and solar collectors. Functions thatcan be transferred from one technology to another willimprove system performance even if the technologiesthemselves have reached a plateau: e.g., switching fromslow and power-hungry hard-disk drives to faster and low-power flash memories.

Sixth, not all progress has to be at the leading edge oftechnology. Steady incremental improvements in themanufacturability of information technology devices spelllower prices which leads to larger economies of scale whichspell even lower prices and so on. Since the ubiquity ofMesh and Net is based on the favorable economics ofdeploying millions of low-cost devices, such smallimprovements make a large difference.

Seventh, even if both product and process improvementscease, the spread of these devices through normal

MARTIN C. LIBICKI 11

investment patterns guarantees a continual upgrading of theglobal information infrastructure.

Eighth, even after such an infrastructure reaches aplateau, people will still be finding uses for theinfrastructure that they missed seeing.

The accumulation of all these advances sets the stagefor continued and probably rapid improvements in thecapabilities of information technology. Maybe the recentdoubling times of a year a half will lengthen. Yet wereprogress to recede to half its rate (e.g., a doubling time ofthree years), this would merely postpone the revolution; itwould not alter its nature.

The Logic of Distrbuted Intelligence

Most of the recent benefits of information technology aregoing, not into more powerful computers, but into morewidely distributed intelligence. This truism of commerciallife can be applied to the battlefield with even greater force.Proliferation in the civil world has its limits-one personcan get on but one functioning computer at a time. In themilitary realm, though, computers could be slaved tosensors and networked. The use of intelligent devices onthe battlefield has no theoretical lower limit. Severalfactors suggest that such distribution is not only possiblebut optimal.

The first reason is economics. Until the late 1970s,Grosch's law held that doubling the cost of a computermultiplied its power fourfold. Since then, the cost-performance ratio of computers has flipped; it is greater atthe lower end than the upper end. Microprocessors delivermore mips (million instructions per second) for the buckthan their more sophisticated mainframe or evensupercomputer rivals. Even supercomputers, these days, are

12 THE MESH AND THE NET

most cost-effective when built from thousands ofmicrocomputers or workstations, and the bestmicroprocessors are found, not in giant machines but inworkstations, while the most cost-effective microprocessorsare in high-end personal computers. If digital televisiontakes off, the most cost-effective chips may be found withinthese sets, only further validating this generalization.

The cost-effectiveness of employing less sophisticatedproducts manufactured in the millions rather than a handfulof very sophisticated products extends to other informationk products: photographic film, television and computerdisplays, tape backup (e.g., audio cassette-sized tapes), CD-ROM, and hard-disk drives.

This pattern of the information age stands in directcontrast to historically recognized patterns of the industrialage, where bigger was more cost-effective. For instance,larger submarines tend to be quieter. Full-sized aircraftcarriers can launch far more planes yet cost only slightlymore than pocket-sized carriers. Heavy space systems canlift a pound into orbit cheaper than their lighter cousins.The Boeing 747 still offers the lowest cost per seat-mile.Auto factories, nuclear plants, oil refineries, cement kilns,and chemical reactors achieved their greatest economies atlargest sizes. Exceptions aside (steel mini-mills prosper astheir integrated cousins fail; high-capacity fiber optic linesare still the most cost-effective way to send a bit),information technology tends to be most cost-effective atthe low end; industrial technology, at the high end.

The second reason is that distributed systems putintelligence where it can be used. A central box with ahundred phones may offer the most calls per dollar, butforcing everyone to go to the box would be highlyinefficient. Even distributing a hundred desktop terminalsmay be less cost-effective than networked PCs if users

MARTIN C. LBICKI 13

cannot customize the terminals and thus avoid using them.One observer has gone so far as to argue that the increasein processing power that PCs brought to the Gulf affectedthe conflict more than all other computing power combined.

For military operations, efficient area-wide coveragebecomes important. A hundred pairs of eyes can alwaysfind something in the field most easily if they are spreadaround rather than bunched up. Dispersion is also good forlocalizing an object. A hundred low-power noses can detect,and more important, track a scent better than a single high-power nose stuck in one place.

Consider a radar looking for a single intrusion. Asingle large radar may be more cost-effective in terms ofpower produced per dollar of installation. Yet the strengthof a reflected beam, while proportional to its energy, isinversely proportional to the distance to the object taken tothe fourth power. A hundred radars whose maximumdistance to the target is ten miles around will be,collectively, as sensitive as a single radar, ten thousandtimes more powerful, whose maximum distance to thetargets is a hundred miles around. Whether the latter ismore economic may depend on other factors. If guardinga radar is the largest expense and all radars need the samecomplement, a hundred small radars may be far moreexpensive. Conversely, if the small radars can sit in acommon truck trailer while the large radar needs aspecialized facility, the former may be more cost-effective.

Third, distributed systems are more robust againstaccidental failure than large ones. An interstate highwaycan carry more cars than four country roads can, but asingle overturned tractor-trailer can close it; four identicallytimed spills are needed to close four country roads. Twoindependent units of 90-percent reliability are needed togenerate a 99-percent availability of at least a single 100-

14 THE MESH AND THE NET

percent redundant capacity. However, fourteen units of 90-percent reliability will keep at least 10 units on-line 99percent of the time--only 40-percent redundant capacity.The greater the desired reliability, the greater the advantageof distributing capacity into smaller units. The need forvery high reliability can be especially pronounced in amilitary context. Someone may be willing to wait a yearfor the opportunities provided during that one hour that thesystem is down.

Of greater military relevance is that one large item iseasier to find than are each of a hundred smaller ones.Small size and large numbers work with each other in thiscase. First, the one large item usually has a greatersignature than each of the smaller ones. Second, far moreeffort is needed to track, hit, and ascertain the destructionof a hundred small ones.

Many vulnerabilities, it remains, are more easilydefeated by concentration. The same mass may be enclosedin eight foot-square blocks or one which is two feet on eachside; the former require twice the cladding the latter does.Nevertheless, too great an emphasis on defensive measurescan lead to self-defeating cycles. The more valuable asingle item, the more self-protection it needs, the moreexpensive it is, and the fewer are made. The fewer aremade, the more important each is, thus the more worthdestroying, thus the more protection they need and so on.The aircraft carrier carries not only attack aircraft butdefensive fighters, electronic warfare jets, antisubmarinehelicopters, and air-refueling capability. It must sail withan Aegis cruiser, picket frigates, and an escort submarine.Everything but the attack aircraft is designed to ward offand defeat potential air, surface, and subsurface attacks onthe carrier battle group. Thus a ten-billion-dollar armada of

I

MARTIN C. LIBICKI 15

ships and planes exists to support twenty-four attack aircraftin certain high-threat environments.

Attacks are ruled by countervailing principles as well.After a certain point attackers can saturate even wellconstructed defenses simply through numbers. Mereconfusion (which is rarely so mere) aside, engaging a targettakes a certain amount of time, and these sequences oftencannot run in parallel. A defender must either take acertain minimum length of time to go through a find-engage-destroy cycle as well as engage an attack from oneaspect and then shift to another. Either way, somethinggets through.

All this information technology will probably not yieldrobot soldiers. Robots-replete with sensors, silicon brains,and artificial legs-are not impossible. But why must allthese be integrated into one package, let alone a man-sizedone? Full systems support and integration, if nothing else,is likely to yield a very expensive bionic form, far lesscapable than a network of cheap objects suitably dispersed.

Coordlnatlon-and-Convergence

Replacing complex systems with networks of dispersedcomputers and communications introduces the problem ofa complex command-and-control overlay (in civilian terms:coordination-and-convergence). If one head must guidedispersed fingers, both the head and the nerves out to thefingers are vulnerable. Conversely if the functions of acomplex distributed system are meted out to variouscomponents--each of which must work correctly-thedifficulty of ensuring that each component works rises farfaster than the total number of components does.

Within the last five years, considerable theory has beendone on architectures of loosely coupled processors. In

16 THE MESH AND THE NET

many ways such systems possess considerable advantagesover tightly coupled ones.

Neural net architectures-used for patternrecognition-form one archetype. Although neural nets aredensely hierarchical-information flows up to a centraldetermination point-they are highly robust. Both sensorsand intermediate nodes work without central logic. Forpattern recognition, each sensor sees part of a picture, formsa sub-judgment on it, sends a signal to intermediate nodes,which weigh the inputs from sensors and other intermediatenodes, and passes it forward for comprehensiveassessments. Matching guesses to outcomes tells eachnode, subnode, and sensor how well it did so that each canretune its sensing and weighting signals accordingly.Altogether the core does very little work. The systemdegrades gracefully rather than catastrophically as sensorsand sub-nodes go down.

Other models of complex systems built from simplerelationships come from self-organizing systems andcomplexity theory. The former is based on celldifferentiation. Multi-cellular creatures such as humans startfrom a single cell that gives rise to hundreds of types ofcells through genetic sequences that can switch othergenetic sequences on and off. Such n-fold complexityrequires many simple triggers. The latter suggests that verycomplicated systems can be created from simplehomogenous parts if they interact with their neighborsaccording to a well-tuned pattern. Tuning matters; outsidestimuli sometimes produce no reaction and at other timesmake the system oscillate to death. Analogously, somepeople form fixed ideas and never take anything new onboard; others react only to new notions and are slaves totrends. Some intermediate method of integratinginformation can be very efficient at responding to the

MARTIN C. LIBICKI 17

outside world-even though no individual piece is.Another, quite different concept is evolutionary

programming. Instead of developing a complex optimizedprogram to handle difficult problems, start with a millionprograms each of whose modules are chosen from a certainset (as a Chinese restaurant menu might yield thousands ofdinner combinations). Each such program attacks theproblem; those who do well survive and start mating(swapping modules) with other successful programs toproduce multiple offspring. Eventually, good programspredominate and bad ones die.

These models suggest how systems composed of looselycoupled components can, properly tuned-and there is aworld of sophistication to be tapped-survive degradation,exhibit complex behavior, and learn from external stimuli.

"Thnre WIl be OthW Changem

To be sure, tomorrow's world will differ from today's indimensions unrelated to information technology. Othertechnologies will advance-some in ways which maysurprise us. Biotechnology, in particular, may gowondrously right or fearfully wrong. Some differences willstem from forces unrelated to technology. Many arenegative. Population will grow and mostly in the South,some large share of which will attempt entry into the West.While most regions get richer, some will get poorer.Pockets of preservation aside, the world's ecology willdeteriorate-although how catastrophically is unknown.Resources will be depleted and garbage piles will grow.

Yet, the most powerful predictable difference is likelyto take place through information technology. Vastimprovements in information technology are happeningnow, and will continue to happen; that these improvements

18 THE MESH AND THE NET

will change the conduct and context of national security isvirtually certain. Other technologies do not seem to offeras much in the way of change these days and thus do notoffer large cumulative advances of deep significance.Technologies that alter society radically-the automobile,modem medicine, precision warfare, and, yes, phones andcomputers-tend to result from a long chain of smalldiscoveries and incremental improvements. Futurerevolutions should have a visible tail today; predictedrevolutions that lack a tail will probably not amount tomuch even several decades hence.

Although material progress does not itself changesociety so much by itself, it does permit new forms ofwealth, power, and social organization. Such opportunitieswill be seized on by those seeking advantage. Thoseotherwise disinclined to risk unpredictable changes will beforced to respond. The automobile was not invented toalter the shape of America's cities or the conduct ofadolescent mating rituals--but it did so just the same. Theradio, in the hands of charismatic thugs, fomented wars.Future changes in information technology will as certainlyrewrite the assumptions-both political, and military-uponwhich national security rests.

MARTIN C. LIBICKI 19

2. THE SMALL AND THE MANY

As silicon becomes cheaper, lighter, and faster, more datais collected, processed, and transmitted, and war is alteredthrough several stages. Pop-up warfare describes thebattlefield in which the means of war are quiet or hidden untilthey rise and engage. The growing and (for the time being)unchallenged ability of U.S. forces to lay a Mesh over thebattlefield permits the tracking and targeting of increasinglysmall, quick, stealthy, and transient objects. The logicalconsequence of this capability's spread is Fire-ant warfare, abattlefield dominated by scads of sensors, emitters, andmicroprojectiles.

Today, platforms rule the battlefield. In time, however, thelarge, the complex, and the few will have to yield to thesmall and the many. Systems composed of millions ofsensors, emitters, microbots, and miniprojectiles, will, inconcert, be able to detect, track, target, and land a weaponon any military object large enough to carry a human. Theadvantage of the small and the many will not occurovernight everywhere; tipping points will occur at differenttimes in various arenas. They will be visible only inretrospect.

The triumph of the small and the many, of informationtechnologies over industrial technologies, can be discussedin terms of its three phases. The first, Pop-up Warfare, isthe expression of 1990s technology under the no-longer-valid assumption that the United States faces an enemy withcomparable capabilities. The second, the Mesh, describeshow U.S. military power (using technologies available overthe next twenty years) might work against a foe withdeveloped industrial but underdeveloped informationalcapabilities. The third, Fire-ant Warfare, assumes expensive

20 THE MESH AND THE NET

sensors will themselves be vulnerable and have to give wayto networks of inexpensive information elements.

Pop-up Warfre

A tilt toward quality in the quality-quantity equation is agood sign that a military technical revolution has occurred.During the run-up to the Gulf War, Allied and Iraqicounts-manpower, tanks and aircraft-were anxiouslycompared. War quickly made clear that the Iraqis couldhave fielded two or perhaps five times as many men, tanks,and planes without affecting the outcome much. Alliedtechnology-both equipment and our sophistication at usingit-was so superior (for the terrain) that exchange ratioswere overwhelmingly in its favor. We could see and theycould not. We could sneak up unnoticed and catch them bysurprise. Our weapons could be precisely aimed whiletheirs were effective only against targets several miles wide(e.g., Tei-Aviv). We were on one side of a revolution andthey were on the other.

Yet consider how differently we would have had tooperate if the Iraqis had had but a fraction of ourcapabilities (alternatively, what a conventional war againstthe Soviets in the 1990s would have looked like). Virtuallyeverything we used on the battlefield would have beenvulnerable had it been visible. We would have had toharden or hide our logistics dumps and command andcontrol nodes. Our tanks, were they to survive, would havehad to be hard to find except during those few momentsspent scurrying or shooting. Surface ships would have beennearly useless anywhere near shore. Both sides would havebeen driven to pop-up warfare-a mode in which elementsare hidden and quiet except during those brief anddangerous moments of engagement or movement.

MARTIN C. LIBICKI 21

Among the various elements setting the stage for pop-upwarfare, the precision guided munition (PGM) has probablybeen the most salient. With PGMs, any locatable objectcan be precisely targeted and, most likely, destroyed. Anyobject with a fixed latitude and longitude could be targeted(with cheap, accurate aiming systems) and struck. To dothis, today's PGMs use complex homing and terrain-matching devices coupled with accurate gyroscopes andaccelerometers. Tomorrow's will be helped by GPS-guidedseekers. External systems would relay the latitude,longitude, and altitude of the target, then the PGM wouldzip to that point. More sophisticated systems would use

j real-time updates against relatively slow-moving targets andperhaps even local (or relative) positioning systems forgreater accuracy. Moreover, with new assets in space, andthe increasing sophistication of airborne sensors (e.g.,AWACS, JSTARS), as well as seaborne sensor packages(e.g., Aegis Cruisers), the number of objects that would fallunder target scrutiny would increase as well. Thus wouldfixed and slow-moving targets fare poorly on a pop-up

battlefield.I Pop-up warfare puts a great premium on minimizingone's own signatures (e.g., stealth) and amplifying theenemy's (e.g., the data fusion capabilities of Aegissystems). Both sides would have to stay hidden most ofthe time, pop up just briefly to move or shoot, and thenscurry back into the background. To succeed, forces wouldquickly have to distinguish threats from decoys andfriendlies, determine the threats' location and bearing, fire,and then disguise and eliminate their own signature.

Can large, fixed, above-the-ground targets be defended?

Some targets can shoot back against incoming missiles.Capital ships, for instance, are equipped with both anti-missile missiles and close-in weapons systems designed to

22 THE MESH AND THE NET

disable incoming missiles with a hail of lead. Sufficientlyvaluable fixed sights might be protected by upgrades of thePatriot missile, or follow-on versions such as Erint,THAAD, or the Arrow. One proposal calls for hiding anti-SCUD missiles near potential SCUD sights to chase andovercome the latter while in boost phase.

Nevertheless, the betting has to be with the attackersrather than their targets. Targets are bigger than missiles,and missiles shoot first; they can succeed in aggregate byoverwhelming the defense with numbers (many of whichneed only be cheap decoys). Defense against hyperkineticprojectiles could be far more challenging (the SCUDlaunches into Israel suggest such missiles are even moredangerous after they fall apart). A projectile that reachesMach 10 or 20 and then releases a shower of darts cladwith ceramic (to stay intact under reentry heat) can greatlydamage soft targets. If the missile can elude destructionprior to decomposition, mission completion is only a matterof time.

The recent emphasis on knocking out anti-groundmissiles in their boost phase suggests the realization thatmissiles will be very hard to hit once they stop radiatingheat. As it is, today's missiles-hard enough to hit as itis-have yet to exploit a deep reservoir of stealthtechniques. When they have done so, they will be farharder to hit. The logical consequence of the missile'ssuperior penetration capability is that their targets wouldhave to be dispersed, protected in very hard bunkers, or bemoved around all the time.

Pop-up warfare will evolve as signatures can beharvested by unmanned objects: loitering missiles,unmanned drones, unattended submersibles, increasinglysophisticated mines. New techniques of data fusion canhelp correlate such signatures. Conversely, platforms will

I

MARTIN C. LIBICKI 23

need more stealth to survive. The F-I17A, the B-2, andsubmarines are already stealthy, but stealth is also mootedfor missiles, surface ships, and even tanks.

The contest between stealth and anti-stealth will be longand drawn-out, but again the betting has to be againststealth for any platform large enough to encompass ahuman. A hider must suppress a bit-stream of informationthat constitutes its signature. A seeker tries to amplifythese signals in order to read them. As informationtechnology advances, so does the ability to amplify bits. Nosuch mechanism favors suppression. Indeed, an ecologicalaxiom states that although removing half of a pollutionstream is easy, each successive halving is harder. At verylow levels, sophisticated devices to clean up one form ofpollution often create another. Moreover, the cost of datacollection and fusion drops with the cost of silicon. Newstealth techniques, although effective, are not gettingcheaper.

Thus even with stealth, everything ultimately can befound. All objects have mass and thus gravity. Everyobject moving in a medium creates vortices and mustexpend energy to do so. If nothing else, objects of a certainsize have to occupy some space for some time. A set ofsensors placed sufficiently close together can, in theory,eventually trap everything by getting close enough. Asufficiently fine web can intersect with any submarine. Aline of sensitive receivers placed close enough together willfind its line-of-sight path to a beaming object cut if abomber-no matter how stealthy-rolls past. Neitherarchitecture may be particularly cost-effective. Yet, bothshow how sensors of certain minimum discriminationplaced close enough together can, at some epsilon, catchanything. Hence, the Mesh.

24 THE MESH AND THE NET

The Muh

Chances are good that the United States will face a decadeor probably two when it can apply military force againstopponents with greatly inferior capabilities. Their strategywould not be to defeat American forces in the traditionalway so much as to create as many casualties as possible inhopes that the United States would be dissuaded fromfurther pursuit. Our strategy, in turn, is to use our longestsuit to control the battlefield to the greatest possible extentso as to minimize exposure and casualties. As informationgathering and processing capabilities continue to improve,our ability to see into the battlefield will increaseexponentially. This advance brings with it both greatopportunity and problems.

Combat requires doing two things: finding targets andhitting them (while avoiding the same fate). PGMs allowtheir possessors to hit most anything. Tomorrow's mesheswill allow their possessors to find anything worthhitting. Every trend in information technology favors theability to collect more and more data about a battlefield,knitting a finer and finer mesh which can catch smaller andstealthier objects.

A long period can be expected in which elements of theMesh coexist with current platforms. The United States, forinstance, will probably be able to deploy fleets of lightsatellites for surveillance before others can target ourexisting stock of heavy low-earth orbiters. During thatinterim the choice of using platforms or the Mesh for anyparticular mission would depend on which worked better orwas more cost-effective. Thus, an initial architecture for theMesh need not have all capabilities at once as long asplatforms to do the same job can survive.

The Mesh, at its outset, would be one part of a cue-and-

MARTIN C. LIBICKI 25

pinpoint system. Today's airborne sensor system is a multi-layer system of satellites, large aircraft, UAVs, mannedaircraft, and finally, PGMs themselves. Under the sea,certain types of sonobuoys detect the presence ofsubmarines by passive sensors, followed by active sensorswhich localize the submarine by pinging it, followed bytorpedoes which use acoustic means to land on top of it.Similarly, the Mesh will be composed of unmanned sensors,infiltrated into existing systems composed of large andexpensive platforms. ARPA's Warbreaker project isexperimenting with systems that proliferate sensors inorderto scan wide areas for certain types of signatures.

C haflemng : Managing the enormous increases ininformation flow will be among the greatest challengescreated by the workings of the Mesh. The technicalproblems-filtering, fusion, and fanning-are dauntingenough, but the stickiest ones deal with the distribution ofinformation.

Consider, for instance, a joint task force formedovernight to head off an unexpected incursion in someotherwise forgettable corner of the world. As the crisisstarts, the relevant CINC will have a certain flow ofinformation from existing sensors such as satellites,electronic listening posts, and perhaps fielded seismic andacoustic systems. Among his first acts will be to duplicatehis enormous monitoring capabilities to some joint taskforce commander. Shortly thereafter, a new flood ofinformation will c,?-,ae from various data collectionplatforms such as -.WACS, JSTARS, Aegis, and perhapssmall satellites and UAVs. Suddenly, the relative trickle ofinformation available to the commander starts to become acurrent of data, far more than any human can deal with.This flow must, in turn, be apportioned to various sectorcommanders for their action. Atop this flow comes a new

IM

26 THE MESH AND THE NET

flood of information as various platforms start to deploydistributed air, water, and ground sensors in variousformations. These, too, then have to be analyzed, dissected,and apportioned to the various sub-commanders each ofwhich has a different array of capabilities. Managing suchinformation blooming will require considerable practice.

OpportunItIes: The development of large effectiveinformation collection and analysis systems permits theUnited States to aid an ally without the commitment ofmilitary forces, and in some cases without fingerprints atall. So far, the Soviet Union has provided satellite imageryto Argentina (during the Falklands war), and we did thesame for Iraq (fighting Iran) and the Angolan government(fighting UNITA). The denser the overhead information,the more help is available. Near real-time imagery ofSerbian artillery, for instance, might help Bosnians moreaccurately target their return fire-information as a realforce multiplier.

In times past, the United States has helped allies byproviding equipment: examples range from the Lend-Leaseprogram to the provision of Stingers to the Afghan rebels.If these sensors and emitters become global commodities(not necessarily a happy development), the United Statescould still provide the equivalent of material support. Itwould silently supply the pattern recognition, data fusion,and command-and-control software that makes thesesystems function. Bytes leave no fingerprints.

Could demonstrating a Mesh, in detail, induce surrenderwithout the need to use much force? To do so wouldrequire persuading others that the ability to lock onto aplatform's precise position is tantamount to ensuring itsdestruction. After all, the Gulf War allies did not have toshoot down every Iraqi plane to win air superiority. Itsufficed to make a convincing demonstration of "You

t •• .,= I II I I li ll iliirl- - - •'r • .. .. . . ..

~t

MARTIN C. LIBICKI 27

fly-you die." Such correlation can be delivered throughopen broadcast (e.g., via one of tomorrow's virtuallyinfinite channels). The potential victim is then givenopportunity to demonstrate his distance from the targetedmachine. The act of seeing oneself on television futilelytrying to hide may be very salutary. Thus might warfarebecome the child's game of hide-and-go-seek rather thanthe adult's game of hide-and-go-kill.

Force Sizing: The last implication of the Mesh is thatit simplifies a difficult problem for the UnitedStates-sizing the forces. During the Cold War, our forceswere sized against those of the Soviet Union; without solarge an enemy, the task is far tougher. Force sizing basedon war counting (e.g., one-and-a-half wars or win-hold-win)is likely to die a well-deserved death. The use ofcapabilities-based sizing cannot satisfy for long, either. Thecapabilities of others are a much better guide to weaponsdevelopment strategies (where numbers are of limitedrelevance) than to weapons procurement strategies (wherenumbers are highly material). To say that military plannersshould disregard intentions and focus on the strength ofothers logically leads to a long-run planning goal of anarmed forces capable of defeating everyone else (includingour own allies) in concert.

The rising importance of the Mesh suggests a force-sizing calculus that could be made independent of theprecise size of the opposing threat. One precedent is theNavy's rationale for carrier battle groups. The argumentwas that the Navy needed three carrier groups in every areato keep one on station at all times. Before 1980, the fourareas were the Atlantic, the Mediterranean, the easternPacific, and the western Pacific. In 1980, adding the IndianOcean suddenly raised requirements from twelve to fifteen.Any debate over the size of the threat (e.g., a putatively

28 THE MESH AND THE NET

aggressive Soviet Union) could be finessed; the number ofoceans rather than the size of the threat mattered.Similarly, force planners could start by estimating theestablishment needed to deploy, operate, and service thetargets generated by a Mesh. Such a Mesh should haveminimal coverage everywhere and the ability to go tomaximal useful coverage in however many trouble spots forwhich we have to simultaneously create targeting solutions.Done right, such calculations should be robust against widevariations in the size and intentions of likely threats.

Fire-Ant Warare

At some point in the development of the Mesh, our forceswill encounter the paradox that those platforms whosecapabilities make other platforms vulnerable are themselvesvulnerable and ultimately untenable over the battlefield.Our surveillance planes, for instance, not only come inhighly non-stealthy platforms that do not move too fast, butthey radiate like Christmas trees. Future engagements arelikely to see even relatively backward nations target majorsensor platforms. Should the platforms prove vulnerable,other ways of restoring their surveillance capabilities willhave to be found, failing which, everyone returns to thedays of the blind.

As argued above, an equally if not more effective wayto weave a Mesh would be from millions of small objects.They are cheap, they can get closer to the target, and theyare collectively most robust against deliberate attack.Because they are cheap, many can be deployed; deployenough of them, and it becomes too expensive for theenemy to kill them.

An analogy to robots may better suggest the wisdom ofdistributing capabilities. People perceive robots as complex

LI

MARTIN C. LIBICKI 29

objects that, in every successive generation, come closer toresembling man. A new metaphor developed at MIT is thatof robots as ants. Each one exhibits certain limited aspectsof intelligence: some specialize in avoiding shadows;others, in walking without stumbling; yet others, in stayingaway from each other. Smart ants are less powerful thansmart robots, but they are small, fight, cheap, versatile, andeasy to reprogram. Being cheap, they can be built in largenumbers.

Battlefield meshes, as such, can be built from millionsof sensors, emitters, and sub-nodes dedicated to the task ofcollecting every interesting signature and assessing its valueand location for targeting purposes. Many of these sensorshave already appeared, albeit in rudimentary form. In thefuture, they will be cheaper, more sensitive, and capable,collectively, of receiving signals from the various parts ofthe electromagnetic spectrum. Some would be opticalsensors-perhaps small charge-coupled devices tied toneural net processors; they could cover not only the visiblerange, but also near-ultraviolet, and many shades ofinfrared. Others would act like small radar detectors, eithersingly, or in computational harmony with its like-mindedneighbors. Chemical sensors could detect the passage ofmachines or their men. Some would sense changes inmagnetism, air pressure, sounds, vibration, or even gravity,and so on.

Why this proliferation of sensor types? The easyanswer is that warfighting conditions differ. Someenvironments (e.g., open desert) and targets (e.g., surfaceships) are easy to see; other environments and targets aretougher. To detect the latter may require exploiting theinherent differences between machinery and background asthey appear on several sensors. Single-sensor surveillancegives the target a single-dimension problem to solve. Tanks

30 THE MESH AND THE NET

strive to be hard to see and thus employ camouflage andnight movement. Submarines strive to stay quieter, usingsize, baffling, and ultra-smooth running machinery. Aircraftare stealthy by controlling their X-band reflections withspecial shapes and coatings. Multi-sensor surveillance,however, complicates the single-dimensional problem byobviating techniques which dampen emissions of one typeat the expense of another, moreover, the multi-dimensionalproblem they create becomes that much more difficult tosolve.

No one sensor need necessarily detect every emanationfrom a target. The more capabilities a sensor combines, themore expensive it gets. Thus the fewer would be used andthe easier each would be to find and kill. Alternatively,specialized, perhaps even single-purpose, sensors can eachcollect signatures, exchange them with subnodes, andcollectively form a picture of a target in its environment.

The Mesh would also contain cheap disposable emittersto illuminate targets with reflected radio waves, generateconfusing signatures, and broadcast local positioning signalsfor precise targeting. Although accurate positioningsystems are critical for the operation of a Mesh, full GPScapability need not be ubiquitous (GPS can also bejammed). Emitters that know where they sit and canbroadcast relative distances to the other elements of theMesh may suffice.

Some sensors may be equipped to move; they may havelittle cilia-like feet on land, fins in the water, and an airfoil(see below) in the air. Mobility would help right errantlylaid sensors, take high ground (trees, houses, hills) inappropriate terrain, and cluster to where other cuing systemssuggest the presence of target-rich environments. Movablesensors fitted with precise chemicals or explosives (e.g., for

MARTIN C. LIBICKI 31

taking out a critical piece of electronics) could be thekilling mechanism in some cases.

Perhaps the prototypical sensor would be a sandwich thesize of a penny. On top would sit a photovoltaic energysource or optical sensors; next would be a sliver ofmicroprocessor, perhaps a chemical or acoustic sensor, andthen a penny-sized battery, a transmitter for an antennajutting out to the side, and finally some anchoring pod onthe bottom. Another design would make the sensor looklike a weed plant of a meter or two length. The shaftwould be the antenna; the head a spectral sensor devicewould be capable of seeing as far as a human can, and theroots would be acoustic and vibration sensors, as well asanchors. To use yet another analogy, sensors might be thesize of bottle caps; emitters, the size of soda straws; andminiprojectiles the size of coke bottles.

Amllschvon: The transition from single sourcesensors to distributed sensors has profound architecturalimplications. For instance, most radars today couple arelatively cheap emitter with a relatively expensivecollector. Anti-radar missiles home in on the emitter andby so doing destroy the collector. Distributed architectureswould require far more computation to translate thereflections into objects, but proliferating emitters andspreading them far from collectors complicates the targetingproblem of the anti-radiation missile immensely. Emitterswould survive longer and receivers would remainunscathed. When later generations of missiles learn torecognize receivers by their shape, the latter themselvescould be distributed among smaller networked patches.Again, the computational requirements of putting togethera big picture increase, but the costs of computation arecontinuing to decline.

32 THE MESH AND THE NET

Another advantage of distributing sensors both overspace and by type is that it complicates countermeasures.An aircraft pursued by a missile knows it is being tracked,in effect, by only one sensor, and, more likely than not, inonly one frequency. Thus dispersed flares, even thoughthey travel far slower than planes, can be picked up asaircraft by IR missiles, which can recognize the bearing ofa signal but not its distance (and thus speed). Tracking aplane using multiple sensors requires that thecountermeasures exhibit the same three-dimensionalbehavior as aircraft do; using multiple sensors also requiresall countermeasures to stay together rather than just appearaligned by the perspective of the missile (e.g., the flare, thejammer, and the chaff have to travel together). This is a farmore complex undertaking.

The Mesh may also replace man-to-man coverage of abattlefield with zone coverage. The pursuit of a giventarget, which is to say, its signature, need not be performedby chasing it. Instead the overall Mesh can selectively payattention to zones over which the target is running. It tunesinto successive sub-meshes by expanding the latter'scommunications bandwidth and triggering external sensorsto concentrate on an area. This shift has more thanmetaphorical significance; it also alters one of the rationalesof maneuver warfare. The latter has always assumed thatbeing there at the right part of the battlefield wasparamount. But being there is not necessarily a prerequisiteto seeing there, and not necessarily a prerequisite to hittingthere if the range set of one's own weapons is sufficientlydense.

The last idea suggests the eventual waning of acurrently popular theme in Army doctrine (first the Soviet'sand now ours)--the use of overwhelming force as apsychological disruption at the outset of an operation. This

MARTIN C. LIBICKI 33

technique may not work as well as expected against asufficiently well architectured Mesh. One necessary featurein a Mesh is a sufficiently high degree of disaggregation sothat the difference between engaging targets all at once orone at a time is relatively minor. The second feature is atleast some practiced capability for graceful degradation sothat a percentage loss of capability does not mean a totalloss of effectiveness. The ideal is a Mesh that has nocenter of gravity and thus must be defeated in detail.

Tips of the Spew Finding targets is one thing, butending their useful life takes more than bytes. Tomorrow'sweapons would likely resemble today's PGMs. Evolutionaryimprovements in energy chemicals suggest that thewarheads and engines could be somewhat smaller butj probably not so small as to be radically different creatures.

One big change would be increased use of weapons thatdo not have to be borne on manned platforms; mines are agood example. Radio contact with the weapon and externalcuing systems for its launch would allow the weapon to bepositioned closer to its potential targets without puttingplatforms in harm's way. Thus a battlefield can be seededwith air-dropped munitions which can be raised, oriented,and activated on command.

A second big change would be in the logic of theseeker-or what is left of it. Today's PGMs have to findtargets on their own. Sometimes they get external help(reflected laser tags or radar waves); sometimes their pathis pre-programnmed (e.g., cruise missiles); sometimes theyhave to take advantage of passive measures such as heatsignatures or pattern recognition. In any case, they have anontrivial computation to perform. Up to 90 percent of aPGM's cost is in the guidance and control, and most of thatis in the guidance.

34 THE MESH AND THE NET

PGMs operating in a sensor mesh, however, can use thelatter's intelligence. A PGM that is given a target's exactlocation can get there on its own in many ways. If GPS isjammed, it can use local positioning signals. If it knowswhere it starts from, its own gyroscopes and accelerometerswill tell it where it is going. A purely ballistic flight pathmay work against slower targets. Others might simplyhome in on a sensor attached to the target. A PGM thatneeds less processing can use a simpler guidance system.Thus cheaper, it can be made in greater numbers and candefeat heavily defended targets by saturating them withmultiple incoming warheads.

Logistics, Command and Control: The capabilities ofeven the most elegant military systems are useless withoutreasonable solutions to the problems of getting them thereand talking to them when they arrive.

Getting Mesh components to where they are needed isa problem whose solution will depend on bothcircumstances and the architecture of the system employed.A platform to insert Mesh parts is a target no less than theplatforms the Mesh was designed to fight against. Partswhich are hardened can be dropped from air---even fromspace--or launched by artillery. Sometimes, special forcescould distribute them into very small but critical areas.Micro-motors might even, at some point, allow them towalk into theater (but at no small demands on energysystems) or even drift into theater. Submarines and stealthysurface vessels may be able to lay down a naval Mesh. Allthese creatures can be also delivered by civilian means. AMesh intended as a defensive field inside one's borders canbe deployed as a mine field might be-except that byseparating the triggers (the sensors) from the explosives (thePGMs), both are far harder to detect

___________________________

MARTIN C. LIBICKI 35

Although command-and-control functions are integral tothe Mesh's operation, a Mesh sees no distinction betweencommunications and operations; one is not overlaid atop theother.

The more information the sensors collect, the less of itthey can send to a central collection point. Radio spectrumis limited (at the megahertz range; gigahertz spectrum ismore available but requires more energy to tap) and batterylife is precious. A high-definition video image of a scene(which is still far less than a human eye can see) requires800 megahertz in raw form, and even 20 megahertz incompressed form. Audio input is continuous and also data-intensive. Only anomalies could be reported.

The challenge of distributed sensors is to identify an

object by using disaggregated readings. Like neural nets,any such meshes would have to depend on a hierarchy offiltering and analysis. Some readings would be matchedagainst pre-determined patterns. This matching requiresthat each sensor be able to make partial sense of a partialreading, and that these partial readings can be knit into anassessment.

The route between sensing and determination is boundto be complicated. Some sensors--e.g., a particularly goodeye-might determine a target on their own, but that wouldbe the exception (if nothing else, two eyes are needed toperceive depth for absolute location). Many identificationswill be probabilistic based on, say, sightings, heatsignatures, sounds, and perhaps chemical emanations. Thisfaculty will be critical when the other employs decoys-noteverything that appears to be a tank actually is one.Because battlefields will always feature new and differentobjects, sensor processors will have to be capable of somelevel of logic abstraction. Humans, as multi-sensorcreatures, are for that reason very good at identifying

36 THE MESH AND THE NET

objects. However, there is no inherent reason to pack twoeyes, two ears, and a nose on every sensor if thesefunctions can be distributed among many of them. (Perhapsone needs a hundred eyes as often as one needs ten ears orone nose.)

To coordinate, sensors each would have to talk to oneanother, their activities would have to respond to whatothers sense (comparable to moving eyes to followsomething). Some of these sensors would have to actprimarily as nodal processors, collecting information from

iother sensors to assess a pattern. These too would have tobe proliferated to assured robustness; even higher levelnodal functions would, in turn, be scattered throughout thebattlefield in lesser densities, and so on down to thosecommunicating directly to humans, off-site coordinators,and/or fire control units.

A key coordination problem among sensors is how toidentify themselves upon disbursement. Each must indicatewhere it has landed, how well it is functioning, and who itis near (and thus will be talking to). Many sensors will dieon arrival; others may be incapacitated by virtue of theirpoor placement. Inevitable gaps in coverage will requirethat sensors be added, moved around, or converted fromone type to another (e.g., we have enough sensors listeningto this, listen to that instead). Constant communicationswould then be needed to determine which sensors stillwork, which are silent, and which are phony (digitalsignature can prevent spoofing but requires that sensorsknow who their neighbors are). Such communications alsowould indicate where more coverage is needed.

Vulnrab llilm: The most prominent vulnerability of adistributed Mesh is that the links among sensors, emitters,and microprojectiles are key to its operation. Unlikecomplex platforms which couple their various capabilities

MARTIN C. LIBICKI 37

internally, capabilities of the Mesh are coupled externally;thus they may be disrupted by what the Soviets called"radio-electronic warfare."

Sensor broadcasts can, in theory, be jammed or faked,just as those from platforms can. Yet, doing so may beharder than it looks. Jamming requires knowing exactlywhich frequencies are being used, but more important,where signals are coming from. Today's jammers tend todisrupt a signal from one point to another operating insupport of a mission (e.g., confound reflections from a largeradar meant to be bounced off an incoming bomber). Withproliferated sensors, the only effective jamming techniquewould be to overpower radio signals by jammingcontinuously in all directions. This technique requiresconsiderable energy-a fact that makes a jammer a highlyvisible target itself. Besides taking advantage of existingtechniques to avoid jamming-frequency hopping, spreadspectrum, extreme directionality-the Mesh might also uselaser communications, acoustic means, hopping on enemyfrequencies, or just not communicating for long periods oftime. Indeed, frequent among Mesh communications mightbe the repeated admonishment to stay quiet for a whilebecause the enemy is trying to smoke you out. Thus, no onecould be really sure that all emitting elements in would besilenced (or just waiting for the right time to turn on).

Faking the broadcast of a digital emitter is even moredifficult. By broadcasting a digital signature, a sensor cansimultaneously ascertain that the message is actuallycoming from the sensor, and that the message received wasactually that which was broadcast. (Corrupted messageswould be internally inconsistent.) This technique requiresthat each broadcasting sensor have a unique signature andthat each receiving sensor memorize the signature of eachbroadcasting sensor-this is a memory burden, but one

38 THE MESH AND THE NET

which becomes easier with every passing year. Moreover,techniques that allow a communicator to sign a messagealso permit them to send out false messages knowing thatthey will be ignored but hoping the enemy will, if notlisten, then at least waste power jamming on a frequencynot being used.

Plstfoms Against Fire-Ants

The fate of platforms can be illustrated by examining howthey might fare against fire-ant elements.

Tauni: Consider the tank as it rolls over terrain litteredwith sensors and emitters backed by hiddenmicroprojectiles. Such sensors may have arrived hoursearlier or they may lie buried for years awaiting a wake-upcall. Sensors to search for large ground objects need not belocated on the ground. Much of the load may be carried bydrones that can broadcast more information than today'smodels, stay aloft longer, operate more stealthily, and costless. If costs get enough attention, the deployment of manygood drones will be preferred to a few great ones.

An unfriendly tank passing through sensor fields couldbe brought down in several ways. The most direct solution,

if available, is to broadcast the tank's location in real-timeto an external missile (or some other fire-control solution).Sensors may also be rigged to take a more direct role. Asensor, for instance, that rides atop a passing tank (much asfleas on passing dogs) can serve as a homing device for ananti-tank round (before it is detected by the tank's smartskin and removed). Sensors may amble over to a tank'svulnerable parts, then kill it by eating their way throughgaskets, fuzing moveable parts (e.g., a powdered aluminum-magnesium burst), befouling its air supply, jamming itselectronics, smearing its optics, and so on. The latter

MARTIN C. LIBICKI 39

methods may well evolve from current research on non-lethal warfare. To wit, the chemicals required to stop atank without killing its crew may be far more compact andthus efficient than those required to blow it up.

Planes: Today's aircraft are optimized-at greatexpense--to win one-on-one (or one-on-not-too-many) duelsagainst other aircraft and anti-aircraft ground units. Thefate of fifty million dollars' worth of aircraft (roughly oneaircraft before infrastructure and other tail is included)contesting fifty million dollars' worth of loitering sensors,emitters, micro-projectiles may be far less satisfying.

An air-borne sensor screen might contain thousands ofnasty objects that may collectively cue firing units in real-time by announcing a target's location and bearing,illuminating it with spattered chemicals, or by bouncingradar on it. Alternatively, if such objects exploded a rainof carbon fibers or ceramic shards, they could take downthe aircraft's engines on their own.

Although current technologies do not allow objects toloiter in the air very cheaply (helium balloons aside),today's drones can stay aloft for two weeks. A typicalfloater may, in a few decades, be the size and shape of ahandkerchief, powered by a coat of photovoltaic paint, andgirded by a semi-rigid skeleton acting as both antenna andair-sail. Its sensors and processors, no larger thanfingernails, would allow it to sense wind movements andconfigure itself to bob up and down accordingly. Upondetecting hostile aircraft, it so signals to fire-control unitsor tries to get itself and thousands of its friends to find theirway softly into the aircrafts' engines. To friendly aircraft,it sends what it knows about the not-so-friendly skies andotherwise gets out of its way. These floaters need not bestealthy; when deployed in the millions, they will simply bebeyond the capability of anything to shoot down.

I ' I

40 THE MESH AND THE NET

Ships: The same problem of coping with scads ofhostile objects would also bedevil ships and submarines.The elements of a Naval mesh are presaged bysonobuoys--cheap sensors routinely produced in thehundreds of thousands today. Lower power requirements,more efficient batteries, and perhaps tethered photo-voltaiccollectors will give future versions longer lives. They willalso be able to sense better, process more informationthemselves, and communicate both with their peers (viceoverhead aircraft) and associated floating torpedoes. Theymay even be armed and could maneuver to where ships aremost vulnerable. Anti-submarine aircraft squadrons will beused only for initial distribution. If sonobuoys can loiterfor years until activated, a much smaller fleet of them couldhandled even this task.

Naval meshes might be supported by fleets of roboticsubmersibles---perhaps just very large torpedoes-that canchase fast or stealthy targets into heavily mined waters. Toprotect themselves, ships and submarines would have tophysically sweep large stretches of sea before them. Theymay need a layered net swept fore and aft to a distance ofseveral miles. This would slow them down considerablyand reduce their efficacy in a power projection role.

Spame: Tomorrow's space forces will combine veryhigh earth orbiters with large fleets of very low earthorbiters. Their tasks will, however, be the same ones theycarry out today: communications, observation, navigation.

One shift will be from strategic to tactical uses ofsurveillance (already being developed in the TENCAPprogram). To support targeting and treaty compliance,strategic surveillance needs very detailed pictures (e.g., 10-centimeter resolution) of compact spaces looking forinstallations that rarely move. Tactical surveillance,although it can use the detail, needs more real-time

I,

MARTIN C. LIBICKI 41

information. Coverage also needs to be wider because, ina typical tactical scenario (e.g., Bosnia) the field of actionis not fixed; it can move quickly and unpredictably.Today's needs for wide-area coverage-looking for certainhigh-energy events like the launch of a SCUD missile, forexample--are met by large satellites in geosynchronousorbit. At 40,000 kilometers up, such orbiters are usuallytoo distant to localize such events precisely. Tacticaloperations need much denser coverage, and probably frommuch closer.

Large earth orbiters are also vulnerable to anti-satellitesystems no better than those the United States demonstratedoff the wings of an F-15 in the middle 1980s. Eventually,large earth orbiters will prove nearly impossible to hidebecause they are hard to camouflage against an earthbackground. Since every one must cross the equator fifteentimes a day, constant searching can be confined to a smallequatorial band. From a higher equatorial orbit, preciseoptics coupled with powerful on-board processing wouldmake a first sighting inevitable. The movement ofsatellites, once spotted, can be predicted with greataccuracy. Satellites that use energy to jerk intounpredictable orbits would emit characteristic energyplumes that would instantly cue seekers to the orbital path.Under such circumstances, a spacecraft would be hard putto get more than one or two passes over the battlefieldbefore being targeted and destroyed.

Hence the watchwords will be to fly high (and thus getlost in far vaster reaches) or fly small and dense. The logicof space dominance would require getting the mostcapability into orbit the fastest and protecting it thereagainst attack the longest. This capability would provideshort-term tactical advantages at precisely the right moment.Satellites made small and cheap enough could proliferate

q

42 THE MESH AND THE NET

and thus make their complete destruction complicated.Surveillance satellites might therefore survive better in theaggregate. Weapons satellites (if not forbidden by currenttreaties) might not--due to the added size and weight of aplatform required to carry a minimally effective warhead.

Continuous real-time coverage from space would remaininfeasible until satellites become far cheaper. The best lookcomes from orbiting 400 kilometers high (below whichatmospheric drag pulls satellites back to earth, and abovewhich complicates the optics problem). From there, a 30-degree field of view to each side yields a 400-kilometerswatch but requires 4,000 birds (90 birds per each of 45orbits) to maintain continuous coverage (between the northand south 60-degree parallels). Affording this fleet withina feasible $20 billion investment budget would require thateach bird and shot be less than $5 million. Split 50:50(assuming $6,000 per pound to low-earth orbit) suggeststhat each satellite cost less than $2,500,000 and weigh lessthan 400 kilograms.

The data burden from such a system is big. To pictureeverything in the world in 1-meter resolution with 8-bitdetail requires roughly 1,500 terabits. If each point is shotonce a minute, a total send rate of 3,000 gigabits/second isrequired. Even with 10:1 image compression and 4,000satellites, each bird must broadcast 600 megabits per second(roughly equivalent to 30 TV signals). Further reduction ispossible by sending only the difference between the actualand expected image, although this requires each bird tostore 18,000 gigabytes (150 terabits) of image perbird-free silicon in the extreme. If the resolution doubles,the data collected must rise fourfold. Staring satellites cancover known swathes more efficiently, but successful use ofthe technique assumes the area covered is significantlysmaller than Bosnia. Longer revisit times return us to the

MARTIN C. LIBICKI 43

current system, which is unusable for real-time operations.Looking up rather than down, denser information

technology makes it easier to construct a functioningballistic missile defense. A dense enough sensor systemshould be able to track missiles, which must be large (ifthey are to hold nuclear weapons) and fly against a fairlyclear background. Destroying the missile, once it is found,is considered the lesser half of the problem.

Broade ImlpcUns

By changing the conduct of war, the Mesh changes itsnature as well. It raises serious questions about humancommand, affects the pace of conflict, and blurs thedistinction between civilian and military on the battlefield.

Human Control: Current leitmotifs of informationwarfare suggest that because militaries possess a commandcore linked to field armies by command and controlnetworks, killing the core leads to cheap victory. Yetadvances in information technologies may mean that thecore need not sit in any one location. Teleconferencing, forexample, permits a command center to occupy dispersedlocations. The core data base can be similarly duplicated(or can be built as a distributed system to begin with).

Human command would also evolve. Informationtechnology permits greater centralization-because bettertelecommunications increase the amount of data that can besent to core. However, it also permits greaterdecentralization-because better computation allows unitsto handle more data from colleagues. Tomorrow's militarysystems will do both. Headquarters will be able to do moredetailed unit control, but units will be able to undertakemore functions in degraded communications environments.

L -

44 THE MESH AND THE NET

Meshes could be engineered to take humans out ofmany decision loops. Complete removal from the loop ispossible. Yet, a technology which permits less humanoversight need not compel it. The bogeyman of anautomated war machine will be no greater than it is today.As it is, many existing weapons lack call-back mechanisms.Most mines, for instance, have no man-in-the-loop betweendetection and explosion. Once a ship's close-in weaponssystem is turned on, its choice of targets is determinedautomatically. How different are a strategic ballistic missilethat leaves human control once launched and a loitering

'¼ cruise missile that searches for and destroys a target on itsown?

Could fire-ant systems elude human control altogether?SIHollywood likes making movies such as Fail-Safe, Dr.

Strangelove, War Games, and Terminator 2 that showstrategic systems going autonomous. Accidental systemautonomy in conventional systems is a lesser problembecause they contain multiple decision points and do nothave to make all decisions at once. Regardless of howcomplex the software, the inclusion of enough if-maybe-then-stop locks can limit the risks. An adversary may,however, establish a doomsday ant-mesh system--but theseconcerns have been familiar grist to nuclear theologists fordecades.

On a battlefield where machines command others, footsoldiers-whose relative ranks have been dwindling for afew hundred years--may be the only humans left.Platforms already dominate low-density environments suchas air, sea, plains, and deserts with their ample runningroom; these platforms, in turn will be supplanted by theMesh. High-density environments such as cities, jungles,and mountains remain the preserve of the foot soldier; theMesh will take over much more slowly in such realms.

II

MARTIN C. LIBICKI 45

Foot soldiers can still benefit from technology. Helmets, forinstance, may house cellular radio receivers, IFFNtransponders, video display terminals embedded in pull-down visors, and computers. The latter would coordinatesensor inputs, generate tactical assessments of battlefieldconditions, and transmit maps. Passwords or biologicalmarkers could ensure that only the owner be able to usethem. The individual soldier could thus be made part of themilitary Mesh (as well as the commercial Net).

The Pace of Conlc The Mesh may be tomorrow'sversion of what the Maginot line was supposed to be, abarrier through which no platform can transit without beingdetected and destroyed. The Maginot line-despite itssubsequent reputation-succeeded where it was placed.Unfortunately, because it cost so much to build, France wasunable to finish it, and Germany ran around it to the south.Mesh warfare favors defense. However, unlike thetechnology of World War I, which was supposed to favorthe defense, in the next century technology will permit eachside to bombard the other's civilian infrastructure withrelative ease. Thus, it will be possible to destroy anopponent's above-the-ground civilization without being ableto occupy its territory.

Conflict may then resemble siege warfare-perhapseven mutual siege warfare. The same cordon sanitairetechnology that can protect a state against invasion can beused by invaders to blockade defenders. Offensive siegeoperations are a highly unsatisfactory way of going aboutwar for all the usual reasons: they are slow, uncertain, andhurt the powerless while the powerful can claim scarceresources for their own ends. Iraq's experience after theGulf War is a good example. Long-term maintenance isalso a problem. In the 21st century, how long mighttechnology allow a besieged party to endure a total

46 THE MESH AND THE NET

blockade? Would modem polities have the patience orstomach to maintain sieges over years, as the besiegedproject pitiful images of their victims? Would technologylet the besieger blockade such electronic communications ordouse the besieged with messages of panic or despair? Ifsuch sieges prove impossible--societies always provesurprisingly resilient against aerial attack-what othertechniques would be available to contain aggressors onecould not destroy?

Mesh warfare could simultaneously be faster and slowerthan current conventional warfare. Compared to the severalmonths the United States needed to deploy to the Gulf, amesh could be laid down in several hours. A heavy liftercould transit over the affected area, dispersing largequantities of sensors, emitters, microbots, andminiprojectiles. Upon landing, they would automaticallyconfigure themselves into a coordinated network. Somecountries may leave heavy lifters on runways for preciselysuch contingencies. Perhaps the United States could protecta future Kuwait upon first hearing that it had been invaded,although such a policy would not be an unalloyed plus.The ability to promise quick commitments may deprivedecisionmakers of the time needed to contemplate the long-run consequences of such decisions. National leaders couldregret not leaving presumptive allies to their own devices.

If both sides tried to set up meshes at the same time,would the race be destabilizing? Provided each minedinside its borders, the first to do so might, at worst, compelthe other to follow. Often, however, such distinctions arenot so pat. One party's fence may include disputed orthird-party territory. Many collectors see over boundaries:airborne sensors can enjoy a 300-kilometer line of sight;sensitive seismic or acoustic sensors can monitor the entireworld. Establishing the space component of the Mesh may

MARTIN C. LIBICKI 47

also induce conflict particularly if the first up can preventthe second from getting up. World War I was supposedlyaccelerated by the competition among various countries tomobilize their troops at the border before the other sidecould. Once the trains, with their iigid timetables, startedmoving, momentum moved with them to war.

While a Mesh may be built quickly, its operation mayretard war considerably. A recent RAND study argued thata squadron of B-2 bombers could destroy an invadingarmored column in the open. Knowing this, what countrywould be foolish enough to afford us such opportunity?Instead, unless an invasion could be completed in a fewhours, a conventional invasion force opposing a high-information opponent would want to do so very gingerly,with methods similar to those of submarine warfare.

The Achilles heel in any information system is theextent to which it can be spoofed-a constant throughoutmilitary history. An effective strategy would have tocombine false negatives (sneaking through untouched) andfalse positives (decoys). Some methods work better thanothers. To find a tank requires looking for a correlationamong as many parameters as possible. Yet finders mustbe flexible to see that if something looks like a tank, walkslike a tank, quacks like a tank, but does not smell like atank, it may nevertheless be a tank. Conversely, a decoydoes not have to simulate a tank in every respect to beclassified as one-just in all features considered importantby the other side. It may require many decoys to findwhich parameters the opposing software deems importantand thus uses for target identification. All this assumes, ofcourse, that in an attrition conflict one can trade decoys formissiles and still emerge on top. Conversely, a Mesh maylet a few tanks by to hide its true parameters. For these

48 THE MESH AND THE NET

reasons, the offense will want to move very slowly whilesearching for weak spots in the system.

Another technique may take advantage of the fact thatthe ability to transmit information among many of thenodes may be limited by the small amount of spectrum theyeach have. Thus a strategy of flooding certain nodes withinformation may degrade the system. In a poorlyengineered system, relevant signature information will berandomly dropped. Even in the best engineered system,concentrating on the important data will force the lesshighly ranked but still threat-defining data flows to bedropped. Either way, the defense deteriorates. However,determining the information architecture of the other side'sMesh to know exactly where it is weak is anything buteasy.

It is not clear how one side's Mesh would combatanother side's Mesh. Most sensors and miniprojectileswould not only be small, and at least partially buried, butquiet as well; they would be listening all the time andtransmitting rarely. Might hunter-killer microbots bedeveloped to search out and destroy their opposingnumbers? Both the difficulty of the likely terrain and theirslow speed suggest that such an effort would be extremelydrawn out. Confirming that an area is safe is even harder,particularly if the Mesh lets a few items through as a trick.

Economics may also inhibit an ant-on-ant warfarestrategy. By virtue of their mobility and additional sensors,hunter-killer ants are bound to be more expensive than theirmore passive victims. If the hunter-killers have to get closeto passive sensors to find them, then a certain percentage ofthe victims could be mined to blow up upon being jostledby a hunter-killer. At some percentage those employinghunter-killers must expend more resources than theydisable. Killing from afar could easily require armament

I MARTIN C. LIBICKI 49

that is more expensive than the individual sensorsthemselves, and so on.

CMIlan as IWlltuy: Mesh warfare not only makes ithard to keep platforms alive on the battlefield, butcomplicates the task of getting them anywhere near it.Logistics assets, notably airlift, sealift, and prepositionedsupplies, are among the largest and slowest of militaryassets. The difficulty of getting there against an opposingMesh should be of particular concern for the United Statesand others who help allies by projecting power over largedistances.

Because, paradoxically, lift assets are among the mostcivilianized of military assets, the solution to the liftproblem may be to consciously imitate civilian assets untilvery close to theater. A ship used to carry war material forWest Island would be indistinguishable from one used tocarry commerce to East Island. At some point itsdestination would be obvious, but by then, it might havealready passed its load of sensors and emitters to whereneeded. East Island could counter this strategy by explicitlygranting a digital signature to specific ships, planes, andmessages it selects for its own trade. It is not clear whetherother nations would cooperate in setting up an IFFNtracking system with a nation that attacks world commerce.Otherwise, East Island would have difficulty isolating WestIsland from military help without isolating itself from thecommercial world it was increasingly networked to.

Wars are not just contests. Removing allplatforms-and thus those who man them--from the fieldof war would not make war safe for everyone, but theopposite. If Meshes promote siege warfare or thecivilianizing of military assets, then the distinction betweenmilitary and civilian erodes to the great detriment of the

I

50 THE MESH AND THE NET

latter-a reminder, again, that not every advance in the artof war is tantamount to an advance in civilization.

Conclusions

Regardless of how the many implications of pop-upwarfare, fire-ant warfare, or the Mesh play out, oneconclusion is inescapable. The days of the platform as theking of the battlefield are drawing to a close. With itseventual demise comes a similar demise of organizationsbuilt around such platforms and the systems used inacquiring them. To these, the essay now turns.

3. TOWARD AN INFORMATION CORK

Technology, used correctly, begets doctrine; doctrinebegets organization. To the extent that tomorrow's mnilitarypower is defined by expertise at information rather than theapplication of force, onlitary superiority may flow to thoseorganized for theformer task rather than the latter one.

Today's relationship between weaponry and informationresembles the relationships among weapons systems andother supporting elements such as command and control,logistics, and personnel. Operations sit atop; all elsesupports them. Current weapons have accommodated theinformation revolution by taking advantage of additional

*This chapter Is an adaptation of an article co-written with Commander James A. Hazlett (USN),"Do We Need an Information Corps?" Joint ForceQuarterly (Autumn, 1993), s 88-97.

MARTIN C. LIBICKI 51

data inputs, but the military remains organized around unitsof force.

This architecture may soon become obsolete.Tomorrow's winners may build their forces around a centralinformation processing core. Such a core would launchinformation probes into the media of war (that is, intoground, air, sea, or space arenas, or the spectrum per se).Multiple sensors under various levels of control wouldgather, transform, fuse, and harness the returning stream,convert it into threat identification, then fire controlsolutions, and then ladle results in strategic synchronydirectly to fire-control units or indirectly to operators.

The traditional relationship between information andforce would be turned on its head. Information would nolonger serve units of force. Platforms would becomevehicles for transporting sensors and missiles. As fewersensors ride on platforms and more missiles are deliveredfrom unmanned locations (see the section below) thepredominance of global information loops will increase.Thus the relationship between information and weaponry isreversed. Rather than information being a service to theweapon, the weapon is the dispatch mechanism slaved tothe Mesh. Units of force would be fire support forinformation systems.

Changes in organization imply changes in relationshipsand status. Current military structures are built aroundlegions of operators served by lesser communities, such asinformation, logistics, engineering, and communications.Although "lesser" is not meant pejoratively, in any unitwhich combines such disciplines, operators take command.Moreover, although officer career tracks are similar up toa certain level, operators clearly make up a much higherpercentage of the Services' top ranks (major generals, rearadmirals, and above) than they do of their overall officers

i0

52 THE MESH AND THE NET

corps. In the Air Force, for example, 25 pecent of allofficers, but over 90 percent of flag officers, are fliers.Were information warriors assigned to their ownorganizations (be they corps, services, or commands), theirrelationship to the whole would undergo a concomitant andperhaps necessary adjustment.

Ratonmlzing a Corps

A separate Information Corps and an associated commandstructure linking operations and intelligence would offerseveral advantages: it would facilitate effective jointoperations, promote the information revolution in warfare,unify the disparate information elements and give them anidentity, create a common ethos for information warriors,and provide a unified interface with civilian informationinfrastructures. It would also provide greater appreciationfor the role of information warfare.

Jolntnes The farther platforms can see and shoot, thelarger their battlespace, and the more service-specificbattlespaces intersect with each other. Aircraft of the Navyand Air Force now use the same Air Tasking Order. Datacollected by Air Force assets guide Army movements.National sensors alert anti-tactical ballistic missile forces ofenemy launches. All the services use the same satellitesystems. If nothing else, the sheer rate of growth in thevolume and variety of data collected makes the constructionof interoperable, or single, information systems all the moreimperative.

The information jointness problem bespeaks animportant transition in how wars are fought and thediminished local ties between seeking and shooting. Todaythe two usually are closely linked. Although prepped by

-

MARTIN C. LIBICKI 53

intelligence reports, a tank must both find and kill the targetitself. Yet other forms of warfare have already experiencedthe separation: strike operations are planned fromexternally collected data; anti-submarine warfare operationsuse an elaborate localizing program prior to administeringa coup de grace. JSTARS and AWACS support anefficient cue-and-pinpointing system. The advent ofprecision-strike systems that use both absolute and relativepositioning (that is, latitude, longitude, bearing, range,course, and speed) is at hand. The growing proliferation ofsensor systems implies that the targeting systems oftomorrow must be able to fuse data collected from a widevariety of sources. Such fusion means that seamlessinteroperability is being demanded for missions rangingfrom single-shot targeting all the way to situationalawareness by CINCs.

To illustrate the value of an integrated perspectiveconsider how a hypothetical Unmanned Aerial Vehicle(UAV) sensor package might be developed-not only itshardware, but also its softwan,, communications, integrationwith other data anits, and most importantly its doctrine andconcept of operations.

The use of UAVs, as all services recognize, can helpwarfighting. So thinking, each service could develop apackage to fit its own mission profiles and support its ownplatforms. Yet data coming down from UAVs would morelogically go to common data receptors and there meld withother joint data collection assets including ground-basedsensors, higher-altitude aircraft, and space sensors. To theextent that each sensor package performs its own on-boardprocessing, it may wish to take advantage of commonneural training regimens and pattern recognition tools. Datafrom the various sensor packages-which could come fromany of the services--have to be analyzed in real time to

54 THE MESH AND THE NET

determine where follow-on data collection efforts have tobe focused, or whether and when fire control solutions haveto be generated. The interoperability requirements of sucha package are therefore demanding.

The need for interoperable information systems has beenwidely recognized by the senior leadership within DOD. In1993, former Secretary of Defense Les Aspin observed ina graduation address at the National Defense University,"Most of our systems for the dissemination of intelligenceimagery cannot talk to each other." The principal jointcommand and control initiative (041 for the Warrior) isalmost exclusively about interoperability. It mandates thatall new information systems must be able to communicateJ jointly. Unfortunately, history suggests that after-the-factstandardization frequently leads to unsatisfactory results.Why?

* Standardization is a long-term process thataccommodates new developments only after longlags. Over the next twenty years the percentage ofnew applications to existing ones is apt to growgreatly-intelligent filters that correlate and processmultispectral and nonelectromagnetic inputs are onthe threshold of major growth. Thus, the ratio ofstand-alone data to integrated data will riseunacceptably high.

* Standards developed by competing interests oftenchoose a least-common-denominator approach,letting each side agree to disagree at the expense ofinteroperability.

* As poor as the prospects for data interoperabilityare, the growing requirement for softwareinteroperability is even farther from satisfaction.

MARTIN C. LIBICKI 55

Returning to the UAV sensor package, its developmentby different platforms groups increases the possibility thateach system stands alone, making complete data fusion thatmuch harder to achieve.

An Information Corps is an alternate route to G'ataintegration. Instead of having the services and DODagencies (and the multiple communities within them)attempt to merge information collection and disseminationsystems, the functions would be carried out by a singleorganization that operates under a unified doctrine and asingle command. Data would be standardized from thestart; internecine politics that allow components to agree todisagree would be, if not eliminated, then substantiallymuted. What would otherwise be a conflict between theneed for innovation in data collection, and the subsequentneed to report only that which has been standardized, wouldbe muted as well. Successful doctrinal innovations wouldbe integrated into the whole much earlier in theirdevelopment.

A related rationale emerges from the emphasis on JointTask Forces (TFs) that are expected to characterize anincreasing share of tomorrow's fighting packages. Suchorganizations usually are made up of a chunk of this and achunk of that. To work smoothly most chunk commanders(and key staff members) ought to know each otherbeforehand. A coterie of information warriors whosespecialty is preparing the battlefield image but who areattached to different operating units is already integrated.Acting as the glue, they can integrate far more fine-grainedunits in precisely that area where interoperation is mostimportant: information.

hinovalioI. Predicting the demise of the platform is fareasier than having operators accommodate this demise.Left to themselves people tend to apply technology in ways

56 THE MESH AND THE NET

which conform to their basic world-view-warriors are noexception. Thus innovations in equipment or doctrine whichthreaten such an order are likely to be resisted by operators.Granted, no one questions the overwhelming relativesuperiority of the U.S. Armed Forces, and for that reasonour manned platforms would logically be the last to bethreatened. However, potential competitors would be foolishto challenge our dominance by a strategy that copied ourforce structure. Forces built around information systemsconstructed from commercially available components,however, would pose a more serious threat--one whichcontests our reigning paradigm. Thus, it would be a farmore attractive way to challenge us.

Although an Information Corps may not be inherentlymore innovative than the Services, it is more likely topursue the kinds of innovations that accord with the logicof the information revolution. Left to themselves, theArmed Forces will incorporate information into weaponry,but with information technologies as platform support ratherthan with platforms as fire support to an information mesh.An Information Corps would take an entirely differentapproach from the outset, emphasizing the information meshas central. Constituent elements and doctrine for such amesh would be evaluated on their ability to locate, track,and evaluate objects and events so that they may be passedfor conversion into fire-control solutions and servicing.Such a service or corps would be an institutional advocatefor a paradigm shift, and would, by its advocacy, be betterprepared for a threat which comes from a differentdirection.

Unpty. The common argument against creating acompletely new organization is that its planned functionsare all being done by someone else. When this issue israised, however, the composition of the group varies

MARTIN C. LIBICKI 57

widely: the Director for Command, Control,Communication and Computer Systems (J-6) on the JointStaff, the Defense Information Systems Agency, theDefense Mapping Agency, the Space Command, andintelligence agencies-all without going into the services.Under the last are specific functions such as command andcontrol, electronic warfare, meteorology, oceanography,automated data processing, and high-information platformssuch as Aegis, AWACS, JSTARs, and UAV contingents.Other functions which technology may soon enable are noteven listed for obvious reasons; when they do emerge, thesoup will be even thicker. This is just the point. Thevarious sub-communities in the information-based warfarecommunity see themselves as disparate players. Eachrelates to one or two others at most, and they all lack thecommon unifying doctrine of operations. Informationwarriors are more than simply communicators, dataprocessors, or intelligence agents. They are all part of aglobal structure that would become apparent with thecreation of an Information Corps.

Cultum. A related reason for integrating various DODinformational elements into a single corps is to provideinformation warriors with status, culture, and an ethic. Theissue of respect is relatively straightforward. As

information becomes more important, so is cultivating theability to develop and manipulate it. DOD needs to attractthese people not only as contractors but more importantlyas operators. Successful military organizations must deploynot only superior information systems, they must also beable to fix, adapt, and maintain them in battle in real time.Yet an aspiring officer today would be advised to specializenot in information but in operations. Even the AirForce--the most information-intensive service--is orientedtoward its fighter pilots just as the Navy is to ship and

58 THE MESH AND THE NET

submarine drivers and naval aviators. Top echelons inother specialties such as administration, materialmanagement, and command and control are often assignedfrom the ranks of operators. This procedure makes senseif various specialties call for similar skills and the best areattracted to operations; an elite is an elite regardless of whatit does, and it could as easily be mergers and acquisitions.However, if the skills required to be a good informationwarrior are different from the qualities and ethos needed tobe an operator or these skills require long, specializedtraining, then such logic makes less sense. The best peopleavoid information; those who remain do not get theconsideration their views deserve.

An Information Corps offers the possibility of separateand more appropriate training and career management aswell as an ethos for an information warrior. As computersget more sophisticated, training necessary for their effectiveuse gets longer. The information warrior must know notonly programming but systems integration and systemstheory, communications, electronic combat, security,artificial intelligence, logic in all its many forms (classical,fuzzy, and convergent), and statistical techniques. Theinformation warrior must also know the customer's needs:the commander's intent, doctrine, and strategies. Inaddition, the information warrior should know somethingabout specific media (and, sea, and space). Sending acollege graduate to the field for a few tours of generalexpertise interspersed with training classes and thenexpecting first-rate information techniques in a morespecialized tour later may not be adequate. The amount ofinformation necessary to be an information warrior isimmense, and the time required to master it will have to beat the expense of more general command instruction. Ifthis tradeoff is to be made voluntarily, the results have to

'II

MARTIN C. LIBICKI 59

be rewarded commensurately. An integrated InformationCorps with clear career paths and opportunities forcommand and success would do this.

As for ethos a divergence between operators andinformation warriors must be expected. Discipline underfire places a premium on certain qualities: courage,decisionmaking skill under pressure, good instincts, self-control, loyalty, and so forth. The information warrior, bycontrast, must be highly intelligent, creative, independent,flexible, tenacious (to counter infamous 3:00 a.m. computerbugs), and maybe somewhat eccentric. The example ofAdmiral Grace Hopper will not excite a tank commanderany more than General George Patton excites a bit-twiddler.These qualities are not necessarily antithetical, and somequalities-common sense, judgment, contrapuntal thinking,decisiveness--are uniquely common to all warriorsregardless of weapons. To seek such qualities in operatorsand not information warriors further relegates the latter tosubordinate status.

Status, ethos, and training issues suggest the need for anInformation Corps as well as a unified or specifiedInformation Command. Such a Command could produceunity of operation, advocates for change, and liaison, but ittakes a Corps to provide doctrine, status, or continuity (e.g.,information warriors who are evaluated by otherinformation warriors).

Liaison. In the same way that the information space ofthe various services converges, so too does the informationspace of the defense and commercial sectors. DOD usescommercial communications satellites and bought the bulkof Spot's imagery in the Gulf War; boaters use the DODGlobal Positioning System. The defense and commercialsectors swap weather data; the DOD Global Grid is themilitary version of the National Information Infrastructure

60 THE MESH AND THE NET

(which is a component of a global infrastructure). AnInformation Corps would play a major role in thedevelopment of a national information strategy and acomplementary national military information strategy.

As the warning sign to builders "Call Miss UtilityBefore You Dig" suggests, both communities will have toshake hands before one or the other adds, subtracts, oralters its infrastructures. DOD used to formally liaise withAT&T when the latter was still dominant in telephony inthe United States. Since then, the number of informationplayers has multiplied-and not just because AT&T hasbeen rent asunder-the influence of private networks hasgrown and the number of various media has proliferated aswell. In addition, as the DOD need for informationintensifies, and its assets commingle with commercialsystems, the volume of interaction will grow substantially.A common point of contact on the civilian side-with itspublic and private players-will never happen; a commonpoint of contact on the military side is quite possible. Aseparate Information Corps would provide not only acommon point of contact but common doctrine and outlook.With a national information strategy and a national militaryinformation strategy, human protocols would not have to bereestablished every time the two worlds come in contact.

Informaton Warfam

Just as the land, the sea, and then the air became realms ofconflict-and thus called out their own services-so toomight information be a realm of conflict, with similarimplications. Information war, a clear official definition ofwhich is yet to come, can take on several meanings.

If tanks fight tanks and subs fight subs, why shouldn'tinformation corpsmen fight each other? One increasingly

MARTIN C. LIBICKI 61

popular concept calls for information superiority to besought before seeking air superiority, which in turn, is aprerequisite to surface superiority. Two sides would dukeit out to determine who could control communications onwhat frequency when, where, and under whatcircumstances. Such conflict would feature jamming,deception, blinding, and firepower against key emitters,sensors, and other nodes. A related notion is for the datawarriors to ascertain the other side's command-and-controlarchitecture so that its weak points can be targeted. Thiswould be coupled with the defense of one's ownarchitecture either through a combination of engineering,bulwarking, massive redundancy, message prioritization,operational security, and deception. The relevance of thisdefinition may be limited, though. Technologies such asfrequency-hopping, spread-spectrum, and lobe control makejamming relatively harder. Sophivticated networkarchitectures leading to radical dispersal of command-and-control may complicate targeting efforts. However, it maytake decades for our putative opponents to get suchtechniques right. In the interim, an Information Corpswould be able to conduct such warfare more efficiently asan integrated team.

Another concept of information warfare posits it as theonly stage of conflict. An Information Corps would be thebody responsible for developing the doctrine and battle planfor such operadons, then carrying them off. The Gulf warclearly indicates that a ground force in conventional conflictcannot prevail against an enemy with air supremacy. Thusair supremacy alone may cause the loser to sue for peaceprior to ground conflict. By the same token, informationsupremacy (if such a thing can be defined) may besufficient harbinger of air supremacy and prompt a loser tosue for peace before a full-fledged air campaign gets

62 THE MESH AND THE NET

underway. Defining such a hiatus before aerial conflict andthe preceding information conflict (especially if the latterentails some destruction from the air) may need furtherrefinement.

A related notion is information warfare not as a preludeto but as a substitute for conflict: e.g., non-lethal strategicwarfare against key information systems such as air trafficcontrol, space-based commercial communications, andfinancial networks. The advantages of such conflict for theUnited States, however, should not be too easilyoverestimated for three reasons: One, with the mostsophisticated information economy, the United States is themost vulnerable to such warfare even if it is also mostcapable of conducting it. Two, networks can always bemade relatively secure against attack either directly (better,more intrusive security regimes), or via backups that usecompletely different architectures-like land-line systems asbackups to radio-based ones. Improved security costs more,but if network security is prerequisite to national security,such a price is more likely to be paid. Three, it may be fareasier to isolate national information systems frominternational ones (either physically or via revokedpermissions) than to make national systems crash. Suchisolation, however, assumes that they and not we are hurtmore by such barriers. For example, isolating a Chinese-dominated East Asia from the rest of the world may be akinto "fog in channel; Continent cut off."

Finally, the United States may provide informationwarfare capabilities as its sole or predominant contributionto an effort in which the actual fighting is done by suchothers as allies, or host nations. This, as noted earlier, hasseveral advantages for the United States. It plays to ourstrength, minimizes casualties (to which we are becomingincreasingly sensitive), eliminates most of the problem of

MARTIN C. LIBICKI 63

lift (and its interdiction), and grants us at least someplausible deniability for the consequences. One of thestrongest rationales for an Information Command is thatguch a campaign would come far more naturally to somefuture information CINC than it would to a regional CINC.

Functions of a Corps

Determining what an Information Corps does (on formation,its duties would be those of the units which comprise it) istantamount to delineating the borders between the Corpsand the services from which it would grow. The firstconcern is doctrine. The transformation of the Army AirCorps into the Air Force was more than a catch-all forthose who flew planes; it was also an expression of atheory of war, to wit: the ability of airpower to transcendthe ground situation and transform strategic conflict throughaerial bombardment. The Marine Corps has its doctrine of

* amphibious warfare. Each service maintains its ability tocomprehend war from its perspective.

An Information Corps would also have its doctrinalobjective: to develop and exploit an integrated image ofbattlespace. This integrated image would, in turn, bedivided and apportioned to meet the needs of variouswarfighters. Slicing and dicing would entail analysis,filtering, enhancement, correlation, data fusion, andwhatever else is required to assist decisionmaking. Theimage, in turn, is an important component for decisions

which range from strategy to weapons control. The boundsof such a system would vary from situation to situation. Insome cases a coherent image would be used for centralizeddecisionmaking (such as an Air Tasking Order); in othercases the need for a better image would call forth efforts tocollect further information (launching sensors). Some fire

64 THE MESH AND THE NET

control solutions would be automatic, to take advantage ofevanescent opportunities that a decisionmaking hierarchywould only slow down. Other images are background toon-the-spot decisions (tanks should not have to relaypictures of targets to a central mesh for a go-ahead beforeengaging them). Clearly the usefulness of a unified imagedepends on what percentage of the information involved inmaking a decision is generated by the shooter (coupled withwhat share of the processing necessary to transform datainto decision is supplied by external algorithms). Thedoctrine is predicated on the assumption that nonlocalinformation (from other units or remote sensors) andanalysis (from artificial intelligence) would rise in relativeimportance.

Should any operation that involves information, oralternatively, command and control in its broadest contextbe part of a corps? This is probably too broad a sweep.Not only does everyone deal in one respect or another withinformation, but command and control tends to involve thetop level of a hierarchy. To suggest that an InformationCorps would become the top-level corps within DOD towhich the services must report is presumptuous. To usesuch a corps to collect, process, transmit, and presentinformation, then convey the resulting orders, however, isnot.

At the very least, an Information Corps must encompassthose elements which gather, assess, and distribute bothsilicon- and human-based information: an infosphere.Space would be a central component, since virtually everycurrent use of space (e.g., surveillance, communications,navigation) is directly involved in information. Added tothat would be chunks of the intelligence business, and thecreation, operation, and maintenance of fixed-site commandand control assets, information collection systems (such as

MARTIN C. LIBICKI 65

ground-based radar and SOSUS), mapping, andmeteorology, as well as the immobile elements of the Mesh.

How far should an Information Corps extend intomobile information collection? Platforms as diverse as

AWACS, JSTARS, AEGIS, P-3 squadrons, unmanned aerialvehicles, artillery trajectory indicators, portable radars, andthe like are information-intensive and thus similar to fixed-site information systems; but not every function (likeairplane driving) on such platforms is appropriate for theInformation Corps. Consider the case of an AEGIS cruiser:it certainly collects a considerable volume of data, andmuch of it could be transformed into actionable targets forother platforms, but most of its functions call for otherskills. Which among equipment maintainers, screenwatchers, situation assessors, and communicators should bedata corpsmen? Should they be permanently or temporarilyassigned?

Such questions lead into difficult issues of scope, orhow to prioritize among information flows. Theforthcoming information architectures of the 1990s,

complex as they seem, are relatively simple compared towhat the twenty-first century's will bring. As popularlyenvisioned within the armed forces, the key function oftoday's information flows is to enhance the commander'ssituational awareness by developing an accurate, timely, andcorrectly detailed battlespace image. This image isdevolved to the troops as per their needs. The number ofsensors involved in this imagery is relatively small.

With the proliferation of sensors, the task shifts fromproviding the commander a view of the other side's tankcolumns, to providing operators a view of the other side'sindividual tanks. A smaller chunk of information goes tosupporting command; more goes to supporting individualunits of fire. The unitary view of what gets collected, how

66 THE MESH AND THE NET

it gets collected, and what gets analyzed and presentedtherefore becomes much more complex.

Who determines this? The level of detail for the topcommanders (who have only limited familiarity with thepanoply of collection) is too complex for individualdetermination. The limited scope of sub-commanders (plusthe fact that sensors will cross whatever artificial lines areestablished between them) makes their choice inappropriate.Letting the information commander choose may generate acoherent collection solution, but whence user input? Thenatural tendency may be to provide too much collection andinformation using the same logic that, in health care, isknown as defensive medicine. These issues needconsiderable work.

A tougher question will involve the mix of military andcivilians in an Information Corps. Should it be a Defenseor Joint organization? Some functions of an informationservice can be best performed by military personnel withvarying degrees of expertise and experience of the weaponssystems with which they must interface. Other positionswill have to be filled by computer jocks who are notdisposed to military discipline.

Objections to a Corps

The difficulty in delineating an Information Corps suggeststhat creating one, at least in a platform-centric world, is atleast somewhat problematic: it must interface with othercommand and control organizations, will remove criticalfunctions of an operational unit, and may perhaps relievesome of the pressure of jointness.

Autonomy. Single-service cohorts are generallycapable of operating autonomously in tactical environments,with little help needed from the others. Except as noted

7

MARTIN C. LIBICKI 67

above, an Information Corps could not. If limited to fixed-site facilities, the Corps could at least functionautonomously, but its value would depend on its ability toprovide data to others-it could complete few militarymissions on its own. But with dispersed sensors andemitters like UAVs, buoys, and listening posts gathering alarger share of the total data, a fixed-site Information Corpswould be limited to strategic surveillance and distributedinteractive simulations.

Including mobile elements in an Information Corpsintroduces command problems. Each unit of an InformationCorps would have to report through its administrative chainof command, but it would also have to respond to theoperational chain of command as well. Who, below theCINC or JTF commander, determines, for instance, whenand where to deploy sensors? Who determines whether anaircraft is used for reconnaissance, electronic warfare, strikeoperations, or emitter dispersion? Do such needs respondto the requirements of the travelling unit (ship) or thedeployed units of some information command (or undercentralized control if not command)? The time required toresolve these issues or await their eclipse by circumstances(if ships disappear, shipboard problems do also) should notbe underestimated.

A related objection is that even platforms whoseexclusive mission today is to gather information may notnecessarily retain that character. Reconsider UAV sensorpackages. If the developers of this hardware and doctrineare information warriors rather than operators, they may notappreciate the potential of a UAV as a laser designator ora weapon rather than simply as a data collector. Suchconsiderations have to be carefully melded into acquisitionprocess.

68 THE MESH AND THE NET

CW ealt. Every organization is an informationorganization; moreover, information is power. Removinginformation cadres from such an organization may promoteseveral unintended consequences. Operational units may be

Stempted to duplicate their lost capabilities--every importantorganization in the Federal Government, for instance,maintains its own policy analysis shop. Besides wastingresources, duplication reintroduces the very coordinationshortfalls an Information Corps was designed to overcome.Affected military units may simply ignore the informationthey camiot control, relying on time-proven but obsolescentmeans to gathering information (reconnaissance in strength)rather than methods which technology makes moreappropriate (sophisticated sensors). Thus, the verymodernization that an Information Corps was meant toinduce would be retarded by its formation. To avoid thisshortcoming, strong leadership would be required inside andoutside the corps.

Jolntbes. Finally, while creating an InformationCorps may promote a joint battlespace image, it may retardother aspects of jointness. Removing the most importantreason for the services to work together (they would insteadliaise with an Information Corps) removes a large part ofthe impetus for operational units to work and meet acrossservice lines. The need for joint deployment, joint

operations, and, most important, joint thinking, remains, butthe day-to-day practice of working jointly would beundercut by the act of shoving off certain joint duties toseparate organizations. When the time came to act jointly,the various components would be far less prepared than ifthey had interacted on a day-to-day basis. The current

concept of parallel jointness among peer services may needto be revised to accommodate a Corps that thinks itself

MARTIN C. LIBICKI 69

superior working with operators who cannot help seeing theCorpsmen in their former support role.

Conwuso

When it comes to radical reorganization-and forming anindependent Information Corps certainly qualifies--a firstrule of thumb may be: when in doubt, don't As wars arecurrently fought, the need for a data corps is, while perhapsinevitable, not necessarily urgent. Unlike, say, the ArmyAir Corps, which was a single identifiable operational arm,an Information Corps would have to be merged fromseveral disparate organizations. By taking from all services,it would be opposed by all-a resistance difficult toovercome.

The logical conclusion, nevertheless, is that DOD shouldmakes steps to form an Information Corps. The argumentis that a corps would promote jointness where it is criticallyneeded (information interoperability), elevate information asan element of war, develop an information warrior ethosand curriculum, and heighten DOD attention to the globalcivilian net. When threatened with the loss of personneland resources, the services may respond that they are doingall of this and more. The greater the threat, the moremeaningfully the services may respond. With luck, theirresponse may address problems-integration, doctrine, orethos-that would otherwise call for an Information Corps.Solving these problems, after all, was the original point.But can they do it as effectively as an Information Corpscould?

70 THE MESH AND THE NET

4. WARES OF WAR: HARD AND SOFT

Outfitting the Mesh means a shift from few complex itemsto many simple items knit together by software. For systemsacquisition this means building from dual-use parts, fosteringopen systems, and defining a new role for software.

It is no big secret that today's acquisition system is understress both from its own dysfunctional internal dynamicsand the difficulty of accommodating the post Cold Wardrawdown. Problems range from very extended cycletimes, continuously escalating costs, and excessiveoverhead, to a technology base that lags commercialdevelopments and has not made an easy transition tocommercial conversion. Important questions are beingraised on the relative priority of prototyping versusequipping the force, the control of proliferation, and howthe industrial base drawdown should be managed in casethe United States might need it again.

These discussions tend to overlook how changes in theweapons of warfare may, themselves, affect how theacquisition system ought to be run. Not surprisingly, theoptimal method of developing and acquiring elements of theMesh will, for that reason alone, differ radically fromoptimal methods of developing and acquiring industrial-ageweaponry.

Building Swords from Plowslhrs

A typical defense system starts life as an operationalrequirement. This requirement is converted into a basicsystem design which drives development programs. Thedesign, in turn, is broken down into subsystems andcomponents. As presently constituted, defense acquisition

MARTIN C. LIBICKI 71

is predominantly demand-driven. The alternative model,which looks at what is out there and develops innovativeways of using it in defense, is far less appreciated. Moregenerally, system designs are only modestly affected by thecost tradeoffs that routinely go into, say, automobile designdecisions.

True, this logic is coming under increasing attack on itsown merits. Yet, a shift from complex platforms tonetworks of sensors, emitters, and microprojectiles will (orat least ought to) accelerate the trend to greater costsensitivity and growing reliance on commercial capabilitiesin defense acquisition.

One reason that cost competition plays such a small rolein major systems issues is that contractors rarely see thesales gains from lowering their own costs. A 30 percentcut, for instance, in the cost of an F-14 carrier fighter isunlikely to result in commensurate increases in the numberpurchased. Other factors-prior force planning, thelogistics infrastructure, the number of pilots, or carrier deckspace-put an upper limit on the number of F-14s acquired.By contrast, the cheaper are the elements of the Mesh, themore densely they can be dispersed, and thus the morecapable the overall system. As the elements of the Meshbecome less expensive, networked sensors, for instance, canincreasingly substitute for large platforms in the samefunction. The logic of the Mesh, overall, is heavily drivenby economics. Indeed critical architectural and operationalissues (e.g., what is the proper density of flooding,jamming, spoofing, decoying, and coverage) have to bedecided, in large part, on the basis of which side can affordto throw what kind of resources into a thing-on-thingattrition campaign.

As the number of elements in the Mesh runs into themillions, economics will force systems to be designed

72 THE MESH AND THE NET

around technologies already extant in commercial markets,because the latter alone are large enough to offer economiesof scale. Even if military items are not, themselves,commercial items, this linkage requires closer attention tousing commercial production facilities and practices. Whatabout the counterargument: if acquisition rates are really sohigh, might not defense procurement alone generate theeconomies needed? This fails for two reasons. First, theelements of the Mesh are consumables and, in alllikelihood, of relatively quick manufacture. DOD would bebetter off stocking a few months of them and relying onpost-crisis production to make up the rest. A commercialbase permits a faster ramp-up in emergencies. Second, theculture of commercial production makes more sense forquantity items than the culture of military production. Onereason that defense goods are so expensive is that each isengineered and tested to ensure that every single item hasthe highest chance of working. The more fussing, thehigher the cost; the higher the cost, the greater the urgencyof assuring that each works. Elements of the Mesh,however, can do with statistical quality control. Because ofhow they are likely to be deployed, a certain percentagefailure can be assumed. The system, rather than theindividual element, is what needs to be configured forreliability-which it does through planned redundancy.

As it is, information technologies, because they performsimilar functions whether in military or commercialemployment, are already best suited for non-MILSPECtreatment. Many information technologies hitherto thoughtunique to military needs (e.g., encryption, spread-spectrum,frequency-hopping) are being adapted to commercial usersanyway.

For these reasons, the build-or-buy decision for elementsof the Mesh can proceed in a progressive winnow. Some

MARTIN C. LIBICKI 73

capabilities will be available straight off commercialshelves, and some will need to be modified for militaryneeds. Others could be helped by defense-led efforts toaccelerate the development of dual-use items so that theycan appear in defense systems at the right time (and undercontrol of U.S. producers). Still others could be developedin conjunction with new civilian infrastructure projects.The remainder, primarily defense-oriented programs, wouldrepresent a reorientation of existing work plus altogethernew starts.

Key Techol gis: This winnowing can be illustratedby examining the key technologies for the Mesh:electronics, micromechanics, sensors, space, and energy allundergirded with improved manufacturing processes.

Commercial users will drive most electronictechnologies (notably digital computation, neural-nethardware architectures, parallel processing, and digitalsignal processors). DOD could help advance non-siliconoptical and electronic materials in its usual ARPA-likeways, and support generic advances in manufacturing suchas Sematech. DOD is likely to be more independentlyactive in analog areas such as microwave and extra-highfrequency communications, emitters, compact antennas, andcounter-EMP hardening.

Major advances in micromechanics are likely to lagsimilar advances in electronics by one or two decades.Nevertheless, fields with promise include ultra-lightexoskeletons and very small legs, some of which couldlocomote penny-sized sensors and others which couldmanipulate a windsail (to support airborne sensors aloft forlong periods of time). Some micromechanical devices mayfind use in chemical and pressure sensors.

Among sensors, visual and near-visual (IR/UV) passivecollectors are most important. DOD will probably have to

74 THE MESH AND THE NET

be the primary funding agent for improved sensors.Commercial versions could be spun off to uses such asmedical instrumentation, optics, and robotic systems.Similar patterns would prevail for acoustic/pressure sensors,seismic sensors, and various chemical sensors. The lattercan find use in medical, agricultural, and environmentalfields. Fiber optics is showing promise as a basis of veryfine movement detectors.

The successful use of space-based eyes and brains in theMesh is more likely with every drop in the cost of liftinga pound of material into low-earth orbit, and with everymethod to shrink components found in large spacecraft(power, stabilization, maneuverability, common busses).Ultra-stabilization-to permit satellites to communicatedown to specific earth collectors-would also improve theability of space assets to do continuous tactical monitoringas would improved hand-off methods as satellite coveragekeeps changing. DOD-sponsored improvements could beshared with NASA (and vice versa), but commercial spaceactivities-unlikely to grow for another decade ortwo-should not be counted on for much help.

Three energy technologies which need furtherdevelopment are batteries, photovoltaics, and remotedeliveries of energy infusions. Better batteries wouldextend the life of sensors, particularly those usedunderwater. Photovoltaic collectors and energy beamdelivery would allow continuous energy feeds in remotelocations. Battery and photovoltaic technology (which theJapanese lead us in) have strong commercial applications,and both are consistent with a revitalized interest inrenewable energy sources-thus piggyback opportunities.Remote delivery of energy infusions has applications inspace, as well.

MARTIN C. UBICKI 75

Manufacturing technology is also critical for itscontribution to the affordability that a system composed ofmany small items needs. Although a specific researchagenda must be tailored to specific product lines, twothrusts, miniaturization and more effective cost/qualitycontrol, are likely to recur. Any DOD effort to improvemanufacturing technologies is best pursued within aconsolidated federal thrust and need not be separatelyprogrammed.

C momi Mmgqxalcta: In developing technologies thatare needed for the Mesh, DOD may want to look foropportunities to piggyback civilian megaprojects plannedfor this decade and the next.

One candidate, born "Mission to Planet Earth," monitorsthe earth's environment with low-earth orbiters. Theadvance of Earth surveillance in general should supportbetter remote multi-spectral sensing, high-bandwidth datadumps from space, sophisticated software (especially fordistributed access), and orbiters useful for tacticalsurveillance in general. A successful National AerospacePlane could slash per-pound costs to orbit.

The High Performance Computing and Communicationsprogram seeks thousand-fold improvements insupercomputer speeds, and very high capacitycommunications lines-both with Mesh applications. If theprogram connects schoolrooms to global libraries, it maypromote information standards (as a key aspect of systemsintegration) that could help integrate all those sensors,emitters, and nodal processors in the Mesh.

Another program, Intelligent Vehicle/Highway Systems(IVHS), like the Mesh, is also concerned with the problemof coordinating millions of objects. IVHS enables highwaysto talk to cars (to warn them about traffic conditions), carsto talk to highways (to predict traffic flows), and cars to

76 THE MESH AND THE NET

talk to each other (letting them travel more closely packedtogether without fear of collisions). Sensors and softwarepromoted by IVHS may have defense applications, aswould associated developments in non fossil-fuel energy.

Health care is an area whose synergies with defensetechnologies are underexploited. Medical instrumentation,for instance, is similar to defense systems in their cost,complexity, and the fact that their functionality is a matterof life and death. Cost control requirements may requirethat more people be monitored outside expensive hospitalsettings. Doing so would impel the development of remotehealth sensors that engage in periodic and emergencycommunication with health networks---a technology withmany resemblances to the Mesh.

Reorleb ng Defense Remwch: After absorbing whatis available from the commercial world, and gathering whatmight become available from commercial piggybacks, DODneeds to fill the gap with innovations that it develops itself.

At present, the DOD research establishment-with itsbewildering mix of technologies, wide variety of paths, anddiverse clientele-is largely devoted to countering currentcapabilities and threats. Too little effort is designed toward off anticipated threats from emergent technologies.Current parameters emphasize performance maximization(faster, more sensitively, over a wider range ofenvironments), and robustness (versus building redundancyinto the system vice components). The latter methodproduces satellites that cost a billion dollars and carrierbattle groups costing ten billion.

To develop the Mesh requires a different direction forDOD's research and development program. The firstrequirement is a top-down dictum in favor of informationtechnologies that can be deployed as millions of items in anetworked information environment. Such a dictum would

MARTIN C. LIBICKI 77

have to be translated into parameters for systems that canbe composed of smaller and cheaper components adapted orderived from commercial products. Second, adevelopmental bias needs to be inserted in favor of methodsthat divide system functions into decomposable parts, anddevelop open interfaces so that they can fit into bothtoday's and tomorrow's information mesh. Third, bench-scaling, building, and testing should be a large part of thedevelopment process. Fourth, systems planning shouldanticipate that telematics technology will continue toadvance roughly fifty times from one end of the ten-yeardevelopment cycle to the end. Researchers should look forways to solve problems in software or silicon-embeddedmicrocode rather than with hardware. Developing precisionmachinery to align multi-spectral photographs should beavoided, for instance, if a computer of sufficient powercould correlate the various spectral images and determinewhat is the most probable correlation between variousphotographs of the same scene.

Fosterng Open Systems

Rapid technological change virtually dictates open systemsdesign. To understand why requires appreciating how muchof today's acquisition cycle time is spent integratingcomponent to subsystem and subsystem into a final system.At every level, each of N subsystems has to be fit witheach other requiring the simultaneous solution of an N-square problem. Typically, defense systems are very tightlyconstructed for maximum efficiency. Altering onecomponent changes a subsystem's performance, which inturn changes a system's performance, and so on. Thus,minimizing unnecessary changes between specification andintegration is important. So how are parts to be specified?

78 THE MESH AND THE NET

If parts requirements assume current technology (whichmost do), parts will be ten years behind the state-of-the-artwhen fielded. Calling for components with then-currentcapabilities may be necessary in some cases for missionaccomplishment but overdoing it risks the possibility thatsuch performance is not possible or affordable. If so, theprogram is delayed; conservatively specified componentsfall further behind the state of the art. Systems that resultfrom the process tend to contain far too much oldtechnology, but at least with stable technologies the benefitsof tight integration cover the costs.

When technologies advance rapidly and unpredictably,however, this model breaks down. The alternative isbuilding systems not from subsystems fit to each other, butto subsystems each fit to a standard interface which iscarefully specified. This is precisely the approach nowbeing developed for the new generation of object-orientedsoftware modules. As with software, this approach losesefficiency because modules cannot take advantage of knownaspects of other modules. Lost efficiency is more than madeup by greater flexibility. Other modules can get majorupdates without forcing the whole system to be reintegrated.A new capability, suddenly possible, say, two years prior tofielding, can be inserted with less damage to the originalschedule.

Systems integration takes on new meaning formeshes-at that level, it is almost all software. Thecombination of common components, open systems, andexternal systems integration would redefine defenseindustry. Today's typical prime contractor, ostensibly aframe manufacturer has, over time, become a systemsintegrator and software writer. The prime imposeshardware-originated contract specifications upon what are,even now, defense-oriented subcontractors. Tomorrow's

iA

MARTIN C. LIBICKI 79

prime will be almost entirely a software house. Mostsubcontractors will have to find markets in the commercialworld to achieve the low price, and compatible tools andparts that future systems need.

The rise of the Mesh also informs the current debateover what to do with today's shrinking defense giants. TheUnited States, as well as its allies, possesses an excellentdefense industrial base whose existence and capacity areimperiled by expected defense cuts. Many defense analystsare looking for ways to keep them alive: more R&D, extramaintenance work, or weapons purchases, foreign militarysales, or direct preservation.

The usual argument is that such subsidies are wasteful;the more pertinent argument may be that they arecounterproductive. Why? The current force was designedto counter opposing and comparably capable Soviet forcesalmost weapon-for-weapon to engage in like-on-likecombat. For the next decade or two, the odds of a new peercompetitor are low. The United States has enough goodsystems in its inventory to avoid needing many majorsystems starts. Although new systems would be moresurvivable and perhaps more efficient, neither fact justifiesmultibillion dollar development programs. Beyond twodecades, a peer competitor and thus feature-for-featurecompetition may re-emerge. But by then, the value-priceratio for information technology may be a thousand timeshigher than today's and like-on-like platform c.)mbat maybe obsolete. Many skills (software aside) needed to buildships, tanks, and planes will not be relevant to buildingmeshes. Worse, the persistence of a large platform-orientedindustrial base may be inimical to promoting the revolutionin operational concepts needed to change defenseparadigms. The current defense structure may retard ratherthan promote defense reconstitution.

80 THE MESH AND THE NET

Major improvements in software will be necessary torealize the Mesh: remote systems integration (how to gettwo different systems to recognize and talk to each other),pattern recognition, adaptive algorithms, data-flowarchitectures, image compression, and simulation. Thealgorithms required in the Mesh will need to mix deductivedigital components (with their formal logic) and inductiveanalog components (with their dynamic minimizationtechniques). Software tools per se are inherently dual-use,and many of the algorithms will find use in the commercialworld. Some techniques for remote systems integration maybe developed for the infrastructure projects mentionedabove. At the level of specific software for particularapplications, though, the code will almost always beexclusive to defense applications.

Training and testing will become a greater componentof software development. Few complex systems work wellthe first time out; they will miss some targets and identifyother objects as false threats. Neural net components, inparticular, need to be tuned by repeated example until theyare reliable. The Mesh will have to be tested against wilyfoes; B-teams could generate decoys and false images aswell as real targets with unexpected parameters. Mesheswill have to learn, as humans do, how much evidence tocollect, and which anomalous readings to pitch out.

Wars hitherto fought in real media will increasingly befought in abstracted media. Although the same banging andshooting will take place, the cue-search-locate-categorize-target-shoot-assess cycle will require not direct analysis ofsensory data, but its abstraction in the realm of oughts andnoughts. The offense will be as good as the algorithms thatpower the cycle. The defense will be judged on how well

MARTIN C. LIBICKI 81

offensive estimates can be frustrated. Many theaters ofconventional warfare-space, strategic warfare, and navalwarfare-have already been abstracted in that warriorsalready sit in a simulated environment, one that they nolonger directly perceive. This tendency will only becomedeeper and broader (e.g., pilots will increasingly look attheir screens rather than out their windows).

Abstraction implies that what military personneldo-regardless of service-will converge. Successfulperformance will mix an increasing percentage of genericsoftware skills with a decreasing percentage of media-specific ones. True, the algorithms that train sonobuoys tofind submarines differ from those that pick out smallsatellites from those operating in cluttered jungle or urbanenvironments. Experience with a physical medium yieldsbetter algorithms. Yet the underlying skills remain thesame: writing maintainable code, using computer-aidedsoftware engineering, evolving well considered objects,taking advantage of network resources, conducting fuzzyand discrete logical analysis, tuning neural networks,recognizing images faster and more accurately, counteringdeception, improving the efficiency of learning algorithms,integrating systems, wringing more sensitivity fromstatistical processes-and so on.

The evolution of the aforementioned Information Corpsmay yield two distinct types of software skills. One groupwould develop the system, train the Mesh, and maintain thecode to new circumstances. The elite force wouldspecialize in restoring systems in real-time againstunexpected situations or enemy action. Both forces wouldwork together-original writers often do the bestrepair-but the grab-bag of tricks necessary to rewrite andretest code quickly may need to be developed especially formilitary field uses. Because a Mesh is only as effective as

82 THE MESH AND THE NET

its treatment of new threats or new spins on oldthreats-the benefits of fooling it, even for just a day, canbe considerable. Thus the elite force will get plenty ofwork. The elite of the Information Corps would travelglobally to install, oversee, reprogram, or trouble-shoot themassive automated systems that tomorrow's armed forceswill have become.

Strategmi Cogs t on

During the waning days of the Cold War, bothmanufacturers and controllers of American exports workedthemselves into a mutual frenzy trying to differentiateweapons from dual-use items that might have a militaryapplication. The advent of the Mesh will make thisdistinction even less meaningful. Because the Mesh requiresdense coverage to work, economics requires adopting andadapting commercial items-already made by the millionsand billions. The same batteries that power consumercameras would be candidates to power militarized opticalsensors. As world markets continue to broaden, whatprevents an enemy from building systems from the samematerials the United States does?

Nothing, really, and therein lies a dilemma. Our currentmilitary, composed of large expensive systems, is based onhardware that has no commercial substitute, and is largelyunmatched by anything in world markets. Even afterspending a full day at the world's armaments mall, anadversary starts from a weaker position than ours. To scrapour advantage in favor of a system whose technology baseis common to all might seem to aid national security asmuch as the switch from mainframes to microcomputerclones helped IBM. True, America can still afford moreequipment than its adversaries. But even during the Cold

I!

MARTIN C. LIBICKI 83

War, America's military philosophy always emphasizedqualitative over quantitative measures of superiority.

The use of common parts need not translate intocommon capabilities. The hardware may be the same, butthe secret is in the software-as the entire computerindustry is learning. True the computer-aided systemsengineering tools and many of the fundamental computeralgorithms will be the same for both civilian and militaryapplications. But many tasks that the Mesh has toperform-pattern recognition, learning, auto-configuration,counter-deception tactics, and data fusion-need to bereified in specific code. Such code would generally differsharply from what similar tasks look like in commercialapplications. To the extent that the United States wouldinvest tens of billions of dollars a year *n building andrefining such code, an adversary would have to spendcomparable sums to develop a similar system. Capturing acode-intensive device would not be as revealing, forinstance, as capturing a panel from a B-2 bomber.Microcode embedded in silicon is extremely difficult toreverse engineer, some chips in use in the intelligencecommunity already self-destruct upon opening. Capturingthe original source code would compromise security (if it iswell-documented code). However source code could onlybe stolen from the factory, not-as with hardware-in thefield.

America's wide lead in software is another reason toconcentrate our military functionality there. This lead isevident everywhere from our dominance of packagedapplications to our lead in systems integration fortelecommunications and aerospace. Simply put, theAmerican dollar goes further in software than the Germanmark or the Japanese yen. Thus is multiplied the advantagethat our GNP affords our defense. By contrast, American

84 THE MESH AND THE NET

manufacturing skills, dollar-for-dollar are nothing specialand, if anything, may be falling farther behind those of ourrivals. Yet the ability to manufacture lots of littleitems--without having to depend on trade partners reluctantto serve U.S. military interests-remains important.

Can the United States still lead in software, or are wefacing (pace Yourdon) the "decline of the Americanprogrammer"? Without discounting Japan's threat insoftware, its inroads into U.S. markets have yet tomaterialize. Cities diverse as Budapest and Bangalore havecadres of over-educated but under-employed programmerswho write good code for peanuts. Nevertheless, the bestforeigners are more often drawn into our corporate orbitsthan our orbits are rendered asunder by their companies.The lead is there if we choose to maintain it.

5. UNCONVENTIONAL CONFUCT

The expected triumph of information-based warfare overindustrial warfare does not automatically imply its ascendancyover pre-industrial warfare. Yet, better surveillance andcommunications for both sides will alter the character of suchconflict.

If U.S. forces fighting in Korea had had twenty-first centuryinformation capabilities, the Korean War would have gonefar differently. The original invasion would have beenrolled back far faster and the Chinese counterattack wouldhave met far tougher resistance. By and large, the KoreanWar was conventional. The same capabilities backfit intothe Vietnam War, however, would have made far lessdifference, especially prior to Tet 1968, while the war

MARTIN C. LIBICKI 85

remained largely unconventional. Information-basedwarfare works best against industrial-based warfare andmuch less well against pre-industrial warfare.

Nevertheless, the ability to catch platforms in a Mesh isnot entirely unrelated to the ability to catch other things inthe Mesh, bearing in mind that similar powers may be putinto the hands of insurgent forces as well.

Rural Conflict

Information technologies will have limited but distinctaffects on rural irregular warfare. Villages in the ThirdWorld, after all, are likely to be affected last by informationtechnology. In such realms warfare is light on platformsand heavy on cover-physical (e.g., jungle canopies) andvirtual (e.g., peasant by day, fighter by night).

If nothing else, both guerrilla and state forces arebecoming better connected. Digitally encrypted cellularsystems can yield greater reach, much faster responsiveness,and better security for guerrilla communications. Reachimproves the command and control of dispersed forces.Responsiveness permits flexible synchrony of operations.Security nullifies the value of signal intelligence to stateforces. Since state forces tend to have relatively goodcommand-and-control systems today, the relativeimprovements from information technology will be modest,and their advantage over irregular forces will decline.

Movements of both irregular and state forces would bebetter tracked through both sides' use of cheap disposablesensors. Here, the change in relative advantage is harder topredict. State forces are already easier to track; they tendto move in larger units on well-known paths. Jungle feetneed far more sensors to detect than do road trucks. Thus,until sensors become absolutely ubiquitous, information

86 THE MESH AND THE NET

technology may, if anything, increase the vulnerability ofstate forces.

Information technology makes free-fire sensor-minedbarriers around "protected enclaves" easier to establish(even though the problem of filtering the good, the bad, andthe ugly remains). Using theft from state arsenals to armguerrillas would also be complicated if weapons were tocome with built-in radio emitters. Emitters coupled witharsenal security systems could monitor their own movementand broadcast alarms if theft takes them too far from wherethey should be. Weapons can be recovered faster if theyhave such devices (until disabled or removed sufficientlyfar away).

Increased use of overhead surveillance would also allowstate forces to track agricultural cycles more closely.Knowing the onset of crop harvests would permit tightercontrol over resource flows in the rural economy. In nationswith scattered and unpredictable harvest times (due tovarying crop conditions or topography), for instance, stateforces could be dispatched to places where they could havethe greatest impact

Urban Conflict

Over the next several decades, urban conflict is likely tobecome more important than rural unconventional conflict.Cities in the Third World are not only growing much fasterthan their rural hinterlands, but in most parts of the worldthey are growing increasingly independent of them as well.

To illustrate why, consider the world's nations in one ofthree categories. A billion people live in thedemographically stable (if not declining) West: OECDnations plus the former Warsaw Pact nations (less SovietCentral Asia) and the Asian Tigers; Western cities eke out

MARTIN C. LIBICKI 87

1 percent higher growth rates than their countries as awhole. Another billion plus live in China, whosepopulation growth is decelerating but whose urban growthis accelerating to near 4 percent. The rest live in the"South"-the Third World-whose population growth, at 2percent, is rapid, and whose cities grow 2 to 3 percent ayear faster. The following table compares 1990 and 2010total and urban populations of over one million souls. Bearin mind that everyone who will be sixteen or older in 2010has already been conceived.

Population by Region and City Size: 1990, 2010(in billions)

Category Total Big Total BigCities Cities

West 1.2 0.4 1.2 0.5

China 1.1 0.1 1.3 0.4

Other/ 3.0 0.4 4.5 1.5South

TOTAL 1 5.3 1 0.91 7.01 2.4 1

By 2010, one of every three will live in cities of greaterthan a million; these cities will account for over half of the

national income in all three groups. Total city folk(including those in smaller cities) will exceed total ruralfolk.

88 THE MESH AND THE NET

Cities of the South will also evolve in another respect.A tenet of Chinese guerrilla warfare presumed that citieslived off the country, making agriculture the only truesource of wealth. Cities only served the countryside,created markets for their goods, provided low-technologymanufactures (often imposed on rural consumers throughtrade restraints), and housed their masters (and those whoserved them). Third World nations entered global tradelargely by selling commodities originating from farm,forest, mine, and oil patch. Thus with the countrysidetaken, cities-deprived of their livelihood-would fall.

Southern cities are now becoming export centers in theirown right and depend less on their hinterlands. One reasonwhy is demographics. The larger the percentage of citydwellers in a country, the harder it is for them to live offthe countryside. Extracting greater surplus value throughtaxation, price controls on foodstuffs, command transfers,or import restrictions just retards the entire economy.Conversely, the same factors that boost world trade(cheaper transportation and communications) create exportopportunities for low-wage urban manufacturing (as well ascontract services and tourism). As Western economies opento Southern manufactured exports, Southern cities areopening to Western investment capital.

Prototypical Third World cities are becoming weanedfrom their hinterlands and are participating more in theworld's trade network of things (ports), people (air traffic),and information (telecommunications). Physical and virtualnetworks are complementary. Although talk can replacetravel, the more people talk the more they want to meet.Cheap travel lets bright Third World students go toAmerican universities and return; the experience makesthem want to stay plugged into America's Net. Networkslinking cities of the South to those of the West will lag

MARTIN C. LIBICKI 89

those which connect the West's cities (and theirhinterlands). Yet fiber optics and cellular and satellitenetworks, combined with data manipulation andcompression techniques, make the former better all thetime. Trans-Pacific air travel keeps growing at 10 percenta year; trans-Pacific telecommunications, perhaps twice asfast. Miami is, if anything, strengthening its status as thecapital of Latin America.

Because cities are better networked than hinterlands, thegrowth of Southern cities, in and of itself, puts a largershare of Southern populations onto networks. Moreover,capacity in the Net is getting cheaper to build. With theincreasing participation of Third World cities, the world isincreasingly becoming a network of networks.

When Southern cities were a smaller fraction of thenational total, basic insurgent strategy was to exploit villageresentment of urban elites to first win over and next controlrural populations (taking advantage of their relativeisolation). The occupation of enough rural territory leftcities ripe for takeover. Urban growth and autonomy hitsthis strategy on two counts: the strategic mass of thecountryside is relatively smaller, and rural cut-offs have lessimpact. To conquer a country requires taking a city on itsown terms.

As with rural conflict, information technology can help(and thus hurt) both sides in urban conflict. The methodsof urban unconventional conflict--on both sides-mirrorthose of crime fighting, notably gang warfare. Organizedpolitical assassination is not too different from randomassassination here. Terrorist acts resemble vandalism andarson. Many urban guerrillas are financed, in part, throughcrime against property. Street gangs fill their arsenals byrobbing gun shops; guerrilla factions could do the same.

Such analogies have their limits. Although urban gangs

90 THE MESH AND THE NET

vie for control over certain facets of urban life (e.g.,protection)--and thus challenge the state-they rarely seekto di, ',ce all state power. Gangs have little interest incerta,. acts-seizing radio stations, calling out street mobs,creating an alternative legitimacy--otherwise undertaken byinsurrectionists. Where law has broken down entirely andmany urban services have ceased to function as in Beirut,urban warfare more resembles rural conflict. Active controlover neighborhoods under such circumstances is analogousto active control over village districts and is as hard forstate forces to achieve.

How states combat urban terrorism depends on thevalues of the body politic. Certain techniques thattechnology permits iry nevertheless be forbidden by asincere belief that certain methods are entirely too intrusive.Totalitarian societies are rarely bothered by such scruples,but, as Eastern Europe's recent history suggests, a lack ofscruples does not guarantee the long-term security of thestate. Over time, if an organized threat-if identified assuch rather than as,.ribed to general urban chaos--starts topinch, the body politic may tilt toward harsher securitypractices. Conversely, in states opposed by a sufficientlyvocal urban sub-class, arguments for civil liberties maymask a more fundamental desire to overthrow the state.

The greatest help in identifying both criminals andinsurgents is a body populace sufficiently outraged anduncowed to turn opponents of the state into the police.Failing that, information technologies can do only so much,but what they can do is worth noting. By 1995, systems inthe United States will let police identify anyone fromfingerprint records within a minute. GPS transponders inpolice cars are capable already of recording their positionin real.time. DNA fingerprinting is becoming morereliable, and ever more minute samples can link perpetrators

MARTIN C. LIBICKI 91

to crimes. Voiceprinting can also be used as a form ofidentification. Both will become more efficient as largerdata-banks become available. Similarly, key documentssuch as drivers' licenses and passports can be madeforgery-proof (today's methods use holographic imprinting).In addition, large, easily accessible card-to-face data bankscould make it extremely difficult for one person to hold twocards.

Although sufficient computer power to link identifyinginformation, certificate information, financial records, andtelephone records exists today, the American consensusholds that such linking would sharply reduce individualprivacy. Even those who trust the government understandthat such data repositories can be broken and entered byunscrupulous individuals and corporations. The value ofsuch correlations in fighting crime and insurrection islimited. Law-abiding citizens are much more likely thancriminals-who, for instance, pay cash-to leave large datafiles in their wake. However, other countries are lessconcerned about either civil liberties or such distinctionsthan we are.

Certain computer technologies may afford the stategreater control over those captured by state forces. Virtualreality technologies, for instance, could make interrogationand brainwashing, if not more efficient, then at least lesscostly (since human attendants need not be present for suchsessions).

Sensors can also be used more intrusively in the urbanenvironment even though such moves may be resisted.Many toll booths take snapshots of license plates driven bytoll evaders. A system that could read (rather than take asnapshot of) the tags automatically could easily be added.Putting such systems on heavily used streets coupled withcomputers powerful enough to correlate license plate and

92 THE MESH AND THE NET

car make permit organized tracking of people's vehicles.Similar overhead surveillance could be used on battlefieldsand in urban settings. Image recognition software thatcould identify faces inside cars or on street comers willcome, albeit in a few decades.

Aural sensors could pick up stray gunshots orexplosions. Sensitive ones might also recognize voices.Olfactory and other chemical sensors could also pick uptraces of violent crime as it occurs (e.g., gunpowder). Ifsufficiently sensitive they could determine identities muchas well trained dogs can. Seismic and acoustic sensorscould determine the weight of a passing vehicle. Lasersreflected against windows can hear conversations inside.Again, the deployment of such devices in various cultureswill vary according to national mores. Such mores differ.Supposedly, while Americans during the Cold War wereparticularly incensed at the Soviet eavesdropping, Soviets,in turn, were outraged by our overhead surveillance.

Yet all is not lost for those who would conspire. Itsliteral manifestation-to breathe together-may be

anachronistic when video teleconferencing can replace face-to-face conspiracy. As earlier noted, such conferences canbe digitally encrypted to a fare-thee-well. Telephonetapping may, under such circumstances, become a lost art.Sufficiently motivated conspirators can even avoid recordsof their having talked to each other by using a privateswitch that does not log ultimate call destination. Computertechnology facilitates establishing highly compartmentalizedcells in which no one knows the entire organization.Indeed no one need know anyone else unless face-to-facecontact is essential. Using E-mail removes most identifyingfeatures of the respondent compared to voice. Even ifpolice informants could enter a conspiracy and learnimplicating data, the degree of infiltration can be far better

MARTIN C. LIBICKI 93

limited than in the past.The disadvantages of stealth are irrelevant for conflicts

that go public. The political use of crowd psychology stillrequires a physical crowd. As more political discoursetakes place via two-way television and E-mail technologies,gathering people for political purposes becomes that muchharder.

Another relic of previous urban conspiracies may be theold trick of storming the local radio or television station.Not only does storming the core node of a cable system(often separate from the multiple contributing broadcastingstudios) lack the panache of storming a radio or televisionstation, but it may be ultimately irrelevant. Theproliferation of multi-node cable, direct broadcast satellites,redundant cellular systems, and video-on-demand throughthe phone system will put to rest any notion of a centrallycontrolled source of information. Such infrastructure makesit is difficult to shut up a government, its rivals, or anysplinter group. One of 500 channels out there will alwaysfeature someone.

Net Stats?

The information revolution, acting through multinationalcorporations and transnational communities, may weakenmany powers of the state anyway. Would it be much of anexaggeration to posit a nation's expression, not throughgovernment, but as a local ganglion of the world Net? Thatbeing the case, might not the decline of the state coincidewith the rise of the Net, the newest venue for crime,conflict, and chaos?

94 THE MESH AND THE NET

6. THE NET AND ITS DISCONTENTS

The Net is the converging global system which puts peopleand their information in close electronic contact with eachother. The growth of the Net, by permitting subnational andtransnational communities, alters the basis for internationalconflict. The Net, itseyt however, presents certain exploitablevulnerabilities for societies that depend on it.

Patterns of war reflect the relationships of individuals, thecommunities they form, and the nations they live in. Theinformation revolution has already and will continue to alterthis flux, but in unexpected ways. Thirty years ago, theglib consensus was that information technologies wouldcreate a global village; to a large extent it has. The furtherrise of the Net-a future complex of sensors, processors,and communicators-will create global villagers. The newvillages will be unbound by geography, but bound by theirown parochial reflexes. They may find new and excitingways of getting along.

The impact of the information revolution on the sourcesof conflict-the political construction of societies and theexpectations of their members--is both more and lessobvious than its impact on purely military operations. Mostof the technology necessary to power the civilian side ofthe information revolution has already been invented; itonly needs lower costs (as happens continually) and widerdistribution-its application to new uses and new users(particularly in the South). Harder to assess is the dynamicof commercial competition in information markets. Militaryrevolutions tend to be driven by well-known forces.Technologies proven useful are likely to be adopted bysomeone. Once they are demonstrated, complementary andcountervailing capabilities follow. Commercial competition

4!

MARTIN C. LIBICKI 95

is a complex game involving competing vendors andmultiple consumers with varying needs. Only some of thepossible converts to the probable because the calculus ofindividual desire does not lead to a closed set of outcomes.

In its commercial adaptation, the Net is, in one form oranother, inevitable. The declining cost of acquiring,processing, and transmitting bytes will call forth aninfrastructure which puts people (and their machines) incloser, faster, and denser contact with each other. The Netmay be likened to our phone system extended first globally,and then to every possible digital device, removed from itsland-bound linkages, given the power to transmit multiplevideo streams, and overlaid with enough filters andtranslators to find every needle in the global haystack.

The impact of information technology is discussed interms of five broad trends: the erasure of distance; fixedand floating networks; universal translatability; themutability of truth; and, as a consequence of all this, therise of the global villager. This forms the context ofnational security. The discussion concludes with a sectionon the ghosts in the Net.

From Global Vllage

By and large the information revolution has spreadknowledge faster than fearful governments can slow itdown. Cheap cassette players and tapes help spread the1979 Iranian revolution. Fax machines helped power the1989 uprisings in Tiananmen Square. Leaders of the SovietUnion's abortive coup in 1991 failed to appreciate howmodem telecommunications (e.g., voice, video, and E-mail)in the hands of those who understood them (e.g., allies ofBoris Yeltsin) could become such powerful weapons.Although ham radio operators in Bosnia did not stop

4

96 THE MESH AND THE NET

atrocities, they have prevented their taking place in secretAsiaSat is sending television signals that travel past thereach of censors. Traditional regimes cannot easily controlthe information that their populace receives. However, if apopulace (e.g., Serbia's) does not wish to hear bad newsabout itself, only modest amounts of media repression willbe sufficient to keep society closed.

The ubiquity of broadcast media has CNN-izedperception-hence, world politics. The instant access toworld news available in the United States since roughly

¶ Huntley-Brinkley days is now available overseas as well.Many world leaders talk to each other via CNN and othernetworks. This capability has forced the West to respondto suffering in places such as Somalia otherwise beyondpublic attention.

Yet, cheaper telecommunications, while obliterating thedominant role of propinquity in creating communities, cutsboth ways. It is easier to create communities that traversegeographical boundaries, but it is harder to find a unifyingforce or a common set of cultural assumptions incommunities that are defined only by geographicalboundaries. The state is not ready to wither away, but itssuzerainty over a world of global villagers (despite someresurgences of nationalism in the second world) will beredefined. Such redefinition may affect national securitymuch more than would the advent of battlefield meshes.The latter come into play only during those rare momentswhen strife erupts into war.

The Erami of Dstdance: The cost of doing businessover wide distances (especially overseas) will keepdropping dramatically. The volume of international callswill keep rising briskly, and low-power cellular phones arelikely to, in ten years, permit satellite-connected phone callsfrom anywhere. Most cities will also have the

MARTIN C. LIBICKI 97

infrastructure for dial-up videotelephony. Emergingtechnologies of virtual reality could let people sense, inwhatever detail required, a physical phenomenon (e.g., amalfunctioning refinery, a wounded person) half the worldaway.

The reduced cost of coordinating a world-wideenterprise will strengthen the internationalization ofcorporate business, particularly manufacturing. Whether ornot corporations then become truly global, the competitionbetween semi-skilled workers in the Western world andskilled workers in the South will grow sharper. Joiningfootloose manufacturing will be footloose backroomservices and perhaps even some frontroom services thatrequire face-to-face contact.

This transfer cuts both ways. On the one hand, checkprocessing, for instance, is moving from South Dakota(itself relocated from Manhattan) to Barbados. On theother, thanks to remote virtual sensing that allows a personhere to manipulate robotic instruments there, a surgeon inChicago could work on a patient in Caracas who would (ifawake) perceive the doctor as an apparatus.

Freer communications tend to cut the cost of conductingboth routine and knowledge-intensive business in the South.This should work in favor of broadening economic growth(competing with other factors that will narrow it). The easyspread of text and image could spread education everywhereand thus most help bring Southern workers to Westernstandards.

Other barriers to business that derive from differencesin language or currency would also fall. Computers thatcan recognize anyone's speech will reach the market by themid-1990s (replacing systems that must be trained to thenuances of each speaker). Language translation is makingcomparable progress. Good but slow and domain-specific

98 THE MESH AND THE NET

real-time translation is already possible. Newly inventeddevices will read signs in foreign languages and flash thetranslations to video devices such as "heads-up" displaysassociated with your glasses.

In the meantime, more people will want to learn Englishto understand the growing warehouse of entertainment andeducational material about to become globally accessibleon-line (just as they now learn English to conduct business).Most people who have attended high school anywhere inthe world should know English well enough to talk withouttranslators.

Similar barriers are falling in currency translation.Electronic banking and automatic currency markets will let

j people keep bank accounts with equal facility in anycurrency (unless governments stand in the way). Money,after all, is a measuring rod of value just as a yardstickindicates length. Exchanges and contractors can bedenominated in them even if neither side owns them. Thus,little prevents considerably more business in the South frombeing conducted in Western currencies. This is good newsfor countries plagued by high inflation and unstablecurrencies.

Globalization, in the 1980s at least, promoted oldfashioned liberal values (e.g., free commerce) in both Westand South because it freed wealth from state influence. Theinformation revolution can only deepen such trends. Whenwealth is reified in physical, largely immovable objects likeland, resources, factories, and buildings, it is subject todiversion by governments. When markets must be servicedfrom local sites, the state gains similar leverage. As morewealth is contained in the movable intangibles ofinformation, or when markets can be served from anywhere,the influence of the state recedes. Ultimately, majorcorporations can be run out of a collection of networked

MARTIN C. LIBICKI 99

briefcases each situated in one or another vacation spot,where the weather is equable and the taxes are low. In the1970s the South imagined the golden road to wealth ledfrom control over resources; hence governments tried toraise the prices of commodities they commanded. In the1980s, the surer road was to create a subservient but well-educated workforce that multinational corporations couldexploit or trade networks could tap. In the 1990s andbeyond, savvy nations will complement human capital withdense, robust information infrastructures to jack theirgrowth path upwards.

The Global Net: Traditionally, the South (and ruralWest) was characterized by a sense that its denizens weresimply out of touch with the greater universe. The ubiquityof the Net will connect individuals and give them access toa vast library of knowledge. Its core will, more likely thannot, be the global Internet and its twenty million (andgrowing fast) subscribers. The Internet provides a vast, fast,and reliable electronic mail network, the ability to downloadinformation from public files located anywhere, and support

for on-line news and bulletin board groups of every shade,variety, and flavor. All three foster the growth of globalcommunities linked by interest and earlier separated by

geography.With time, the Net should allow anyone with a video-

input-phone to see the world's accumulation of organizedinformation: scientific and medical articles, papers, books,serious journals, newspapers, photographs, and maps.Navigating through such seas will, at first be daunting; buttomorrow's knowledge robots ("knowbots') would stand byto swim through this enormous data base. With growingsophistication, they could find answers for those questionsthat data can answer. Personal filters could cull listener-specific news items from the glut of world news broadcasts

JJ

100 THE MESH AND THE NET

and other sources of new information. Global access to theNet facilitates education and business from all ends of theglobe. Moreover, it overlays the economic potentials of theWest atop Southern societies which are structured to copewith far more restricted economic and social potentials.

The communications revolution will also accelerate thetransfer of open-source, defense-relevant technology,making it much harder to control. Any computer chipreducible to an algorithmic formula could, one day, bemanufactured in one of hundreds of facilities. The worldwill not lack small, rogue fabrication shops willing to evadeexport controls to make money. Technology controlregimes for unclassified software and micro-electronics willbe virtually impossible to police.

Inevitably, every device worth talking to or hearingfrom will come equipped with low-power communications,high-power computations, and a virtual address. Networkswill increasingly link equipments-automobiles and othervehicles, traffic lights and toll booths, factory machinery,remote cameras, various utility meters, medical andscientific instrumentation, and instruments otherwise uselessif not networked--rather than people. Mobile equipmentwith GPS receivers will communicate their locationperiodically. Coupled to this network will be varioussensors used to monitor certain environmental activitiessuch as weather, soil conditions, toxic emissions. Otherswould monitor the health of the sensitive, measuring bloodchemistry, brain wave readings, heartbeat, perspiration,pneumatic functioning, and so on.

What will they all talk about? Remote operation andmonitoring of machinery may be a major topic. Cars andtraffic lights will have long and loving conversations aboutroad conditions. Devices will babble, "I'm OK, are youOK?" Note this picture of the future city-all these

.

MARTIN C. LIBICKI 101

networked sensors coupled with intelligentnodes--increasingly resembles the Mesh (without rockets).How much technology separates the sensor-rich automobile,increasingly sensitive to its immediate surroundings, froma sensor-rich tank?

Building the Net requires all these devices interoperate;their communications protocols, data formats, andassociated algorithms must work with each other. Theamount of attention paid to standards will undoubtedly riseeven though increasing computer power would make theoperation of gateways, translators, and virtual device layersless visible to users.

Ironically, the groups that represent the variousconnected domains may even discourage communicationsthat standards supposedly permit. Should that seem odd?Communities ranging from the professions to street gangsmaintain their own jargon. Ostensibly they (or least theprofessionals) cling to a separate jargon to make precisedistinctions unavailable from ordinary language. Yet themore powerful motivation may be unstated: to excludeoutsiders (for whom a little knowledge is dangerous),establish status distinctions, or preserve privacy. The Netthat unites also divides.

To Global Vilager

What turns the world into a global village, with everyonec~ipable of looking over each others' shoulders, may alsopromote the creation of global villagers--communities ofinterest and inclination that span the globe but let membersisolate themselves from others outside.

CNN, for instance, not only lets you keep tabs on therest of the world, but also lets you keep track of events athome when you are on the road. A community of

* t

102 THE MESH AND THE NET

expatriates with their own cable station (e.g., Iranians wholive in Southern California), can better maintain theirisolation from the worlds outside their door and remainunited in a common lingua franca of interest. The Net'sability to connect people with the world is what allowsthem to identify their own communities, archives, and newsgroups and pretty much stick to them.

The Chinese expression "same bed, different dreams"carries over with fuller force to the evolution of perception.By the 1950s, the reduced costs of transportation andcommunications forged a mass American consumer marketfrom a collection of smaller regional ones. Further declinesin the cost of communications and computer-driven directmail promoted subnets which further fractionated it alongvarious demographic, professional, avocational, religious,and ethnic lines. Communications at first enable the CNN-ization of perception. Continued evolution results in de-CNN-ized perception and the rise of the same voluntarilyisolated communities that pre-date mass consciousness. Thistime, though, such communities will subset and supersetnational boundaries and thus the states that govern them.This distinction could matter a great deal to how nationalsecurity is defined and ensured.

Cellular technologies exacerbate this trend. Text-oriented desk-bound computers are weak devices tomaintain communities. Few want to live tethered to a boxand bits alone cannot convey the look, sound, and feel thatnormal human contact requires. With cellular, the networkneed not be associated with a fixed phone connection andbox. Voice commands make keyboards unnecessary.Screens can be built into eyeglasses. The basic box can beshrunk to the size of a hearing aid. You need never be outof effortless touch with your virtual community or it withyou. Virtual reality may be so compelling that people need

MARTIN C. LIBICKI 103

leave only to eat and exercise (perhaps the resemblance ofthis description to a jail cell carries deeper meanings).

Thus, although information technology can bring theworld together and erase bonds of geography, it also letsutterly different communities maintain their identity againstassimilation.

The MWlity of Trhth: As the amount of informationincreases, its marginal utility declines, but so does itsveracity. Why?

Start with broadcasting. Today's satellite broadcastingsystems relay material to terrestrial broadcasting stationswhich then relay them to television sets. Tomorrow'ssystems will reach television sets (equipped with 18-inchsatellite receivers) directly-bypassing the investment inboth television stations, and the political control that nationscan have over transmissions.

Virtually every Third World village is likely to have atleast one such television (even if not on the national electricnetwork) and probably several. Each can watch hundredsof stations, only a few of which will be state-run. Videosignals from space will be harder to jam. Barring stateconfiscation or control of such sets, they should be able toget a video signal from any group with enough money torent satellite space. Just before Desert Storm, PresidentBush asked for permission to appear on Iraqi television toexplain our actions in the Gulf. Two decades hence, hissuccessor will not have to ask. Dictators will be hardpressed to keep rivals off the air. No coup plotter couldkeep his prey off the air either. By the same methods,conservative regimes will have difficulty preventing thediffusion of the West's best values over the tube: sex anddrugs, rock and roll, and guns.

Technology will also make it impossible to distinguishamong real and fake photographs, video, or recordings.

-~~ ým A f Q- L• 0. 4i l n

II

104 THE MESH AND THE NET

Anyone with a good machine (tomorrow's Silicon Graphicscomputer, perhaps) could create for broadcast a video of anopponent counseling acquiescence to his people. Thisimage would look and sound like the real thing, beingindistinguishable in both grammar, nuance, and gesture.Western audiences, more used to special effectsmanipulation, will grow skeptical of everything on the tubeafter a while. Third World audiences are likely to remaincredulous targets a good while longer.

These two trends-the ability to force information pastcontrols, and the ability to create false information-workboth with and against each other. People tend to believewhat they want to believe (or what others they fear orrespect want them to believe). Contrary reports can beeasily discounted, particularly as people come to understandhow easy faking a video can be. The same technologies thatlet people freely experience the world are those that allowpeople to deny its reality. The resulting cynicism works infavor of people trusting only the information generated bytheir own village--not the globe as a whole. Reality is notuniversally validated but personally validated based onnetworks of trust.

At the same time, the privacy and authenticity ofpersonal communication are likely to improve. Currentmobile phone communications are even easier to interceptthin line-based communications are; cellular is generallyconsidered unacceptable for secure communications.Thanks to digital telephony, public-key cryptography, andfree silicon, secure digital communications will need butone cheap phone chip. Encryption will be so easy as to bethe norm. Such encrypted messages will be unbreakable byany supercomputer. Eavesdropping would have to takeplace at the source or the destination but not in between.Intercepting signals intelligence as a way of figuring out

MARTIN C. LIBICKI 105what the other guy is doing will soon be useless.

The development of digital signature technology will

also lend authenticity to private communications as well.Digital signatures work by having people post public keyswhich alone can unscramble messages. Successfulunscrambling proves that only the person with thecorresponding private key could have written it. Suchtechniques also keep third parties from altering the messagewithout its being obvious. All this assumes that the postedpublic key is authentic and actually linked to the poster.Such facts may have to be verified, again, through a trustednetwork-again, the global villager at work.

Today's virtual reality is far more virtual than real.Tomorrow's, though, may look, sound, smell, and eventaste and feel as real as reality. Information technologyalone will not convince the sane that the virtual reality isreality (prosthetic reception devices are one reason why);yet it can convince them that virtual reality is better.

"MTe W Puochlmlsm: Would all this communicationamong groups hitherto separated by language andgeography make people more or less likely to deal witheach other in friendly and civilized ways?

Ubiquitous communications could promote a globalsuperclass transcending national boundaries. If this classcan define a sufficiently tight set of class interests-anissue of more-than-academic consideration ever sinceMarx-transnational warfare may be muted (but perhaps atthe expense of class warfare) in some ways. Other lessexalted supranational communities--linked by bonds ofprofession, ethnicity, or avocation-are possible. Whereassuch communities have always existed, technology will letthem conduct a much larger share of their daily interactionswith each other.

106 THE MESH AND THE NETI Would the formation of supranational classes make theirmembers feel more solidarity with each other and less withtheir local community? Would they be more likely torespond to attacks on outposts of their superclass, or wouldall this communication only remind people how deeplydifferent national origins impress their marks on otherwisesimilar people? Will inter-ethnic communications lead togreater understanding and thus more tolerance? Conversely,would a little knowledge delude people into thinking thatthey understand how others think? Internecine conflict isoften far less civilized than similar conflict among thosewho originate from opposite ends of the globe.

The ascendence of Net over Nation could alter whatpeople would fight over. Historically, wars have involvedchallenges to territorial control-and not just becauseeveryone has to live and work somewhere. Before theIndustrial Revolution, rural land was the source of wealth.The Industrial Revolution made factories, infrastructure, andresources-all of which could be physically seized-thesource of wealth. Even today's post-industrial serviceeconomies are tied to place. Otherwise why would somany put up with Manhattan when Maine or the Ozarkswould be much more pleasant? Yet, the true assets of WallStreet-the knowledge, connections, and legally validfinancial claims-are, themselves, place-independent.

As networks expand to enable better remotecommunications, the validity of holding onto any one placebecomes increasingly questionable. A future Hong Kongcould as easily be relocated to Vancouver or even to ahundred small Hong Kongs scattered about but networkedtogether. Singapore has a core competency in bulk materialshandling not only because of its port, but for other reasonssuch as knowing how to conduct intermodal transportationefficiently. Such knowledge could be transferred to any

MARTIN C. LIBICKI 107

other similarly wired port. Today's networked, knowledge-intensive, multinational corporation is an increasinglymovable feast. That being so, push less often comes toshove, and more often to slide. Data does not even have tobe sent ahead at the last moment; it is already distributed tobegin with. People need but change their real networkaddresses; their virtual addresses (the ones people write to)stay the same. The less wealth can be captured by physicalpossession, the less motivated others will be to use physicalmeans to capture wealth.

The shift to Net from Nation lets communities be knitby constant communications regardless of place.Communities without political self-governance can maintaintheir cultural mores by establishing their own subnetworksas self-contained universes. Eastern Europe is seeing itsfiercest fights over ethnic and linguistic cultural clans usedto contesting over limited media space. A single mediumsuggests a single culture broadcasting its own values in itsown language to everyone else--to wrest oneself free is toband together to form a competing state. Multiple media,however, suggest the support of multiple cultures. Asinformation technology spreads, any group can turn inwardin a broader variety of ways-fostering its networks apartfrom state or majority interests. True, a believer can bereinforced in his fanaticism by picking and choosing amongcompeting media so that no contrary view intervenes. Suchchoice could exacerbate the energy of those who sought toimpose their culture over others. Yet the ability to carveout separate media spaces also lessens the angst of thosewho wish only to keep their culture from being trampledupon. It will become increasingly easier to tune out the restof the world, for better or worse. The expansion ofcommunications (and easy syntactic if not semantictranslation) and ability to accommodate separate domains

tii

108 THE MESH AND THE NET

gives competing cultures room to roam without collision.Hence, more sprechenrawn, less strife.

Otherwise, traditional cultural mores will be harder tomaintain in a high bandwidth society. Traditional culturesmaintain themselves through the coercion of geography(village life is all they know), custom, and language. Failingthat, maintaining group cohesion by coercing less affiliatedmembers (e.g., the restless young and worldly intelligentsia)leaves community-imposed censorship. All these are harderto maintain when anyone can get access to any information.

k Thus, as Iran's experience presaged, traditional cultures inan urban environment have to become more aggressiveabout such coercion. Minority subcultures, kept tothemselves, posed little threat to the transmission oftraditional ways. In the Net, they can create temptations foryoung of the majority communities. Hence more strife,even though traditional cultures are fighting a losing battle,regardless of how vociferously waged in the comingdecades.

The ability of information technology to promote trans-national communities does not mean that all or even mostpeople will become avid members of them. In the West,most people are part of several communitiessimultaneously: professional, avocational, ethnic,neighborhood (or some are members of no community).Even where they arise, dispersed network communities areunlikely to be so tight as those which live together (cults,for example) and rarely so large as to threaten the state toany serious extent.

MARTIN C. LIBICKI 109

Ghosts In the Nst

The dependence of cities on networks, both internal andexternal, creates-as all dependence does--a majorvulnerability. This vulnerability is likely to take differentexpression in the West and the South. For the foreseeablefuture the Net will be more important to Westerneconomies because the West will realize a higher( percentage of its value added from Net flows then the

j South will. Thus, its vulnerability will be greater, and the( payoffs from the Net's subversion to private ends will begreater as well.J Yet, network warfare is likely to be most salient in theSouth, and politicized from the start. Binding Southerncities into the world economic network draws them into agame whose rules are written by the West. The moreimportant the Net is to a city's life, the more a city dependson an external order of things and the more independentassets are from the state apparatus (and thus also fromsocial claims). Networks are also avenues of culturalinfiltration. The ease by which information can pass backand forth challenges the social controls exercised by closedsystems (a problem that even efficient states such asSingapore will have to contend with soon).

Societies that depend on the Net can be attacked byharning the Net just as industrial societies can be attackedby shutting down electricity. Losing faith in the Net is akinto losing faith in the State. Overt threats against the Netmay yield useful concessions. Picking up the rightinformation on the Net can be used to pressure individuals.Subverting the Net may yield illicitly gained resources.

The Net may also be targeted for no other purpose thanto return society to pre-Net days. If differential access tothe Net has too much influence over the distribution of

110 THE MESH AND THE NET

wealth, losers may wish to change the rules of the game, orfailing that, end it. Those who do well may nonethelessresent the power of a non-human system, particularly one,which, unlike the phone system, makes judgments onpeople's needs. The very notion of a Net that can permitany idea to be exchanged is antithetical to cultures thatprefer hierarchical control over ideas.

Networks are thus vulnerable, and totems themselvesfor attack by forces of the extreme left and right. Futureunconventional warfare will target such vulnerability;insofar as the United States supports legitimate regimes, itmust find ways of countering this threat. Conflict in the Netwould be represented by systematic and organized attemptseither to corrupt the operations of the Net or subvert them.The former would strike at the growing heart of tomorrow'surban economy; if people cannot trust commerce over theNet, they would, with no small dislocation, have to revertto earlier systems of commerce whose paths would havebecome rusty with disuse. To the extent that governancedepended on the Net, attacks on the Net would strike at thelegitimacy and effective control of the state.

Attacks on the Net can be categorized at three levels:physical, syntactic, and semantic-ranked in descendingorder of risk as casually observed. In practice, the reversemay be true.

Physical attacks on the electronics and wires of the Net(switches, trunk wires, major databases and other keynodes) is certainly possible, but, in and of itself, not a newkind of warfare. Industrial-era targets of the electricity,water, natural gas, transportation, or broadcasting systemswill remain equally juicy targets. Moreover, most targetsof the Net are both harder to find (because they lackdistinguishing physical characteristics), easier to protect(because they tend to be relatively small compared to other

'I

MARTIN C. LIBICKI 111

key targets), and cheaper to make redundant (particularlythe few nodes that hold really critical data). Physicalattacks will nonetheless ensue, but society's vulnerability tothem can be substantially lessened by appropriate and notexpensive measures.

The possibility of syntactic attack-one which disablesthe operating logic of the Net and causes it to crash-isconsidered very scary. The wars between security forcesand hackers will be relatively continuous and they willescalate on both sides (security systems will get better, butnew opportunities for mischief will arise, and hackers willget wilier). By and large, however, such attacks will be ofminor consequence.

To understand why, start with the celebrated computervirus. Infecting a stand-alone PC requires the user attemptto run an infected program (or what is very similar, try tostart with an infected diskette), most of which are bootlegcopies of something which, in legitimate form, is mostlysafe. Merely uploading a piece of bad data is relativelyharmless (for the time being). An infected computer on anetwork full of computers is a potentially larger worry(because the carelessness of one can infect many), butnetwork operating systems are generally better protectedthan the operating systems of individual PCs. Indeed, everysuccessive generation of operating systems has securitysystems increasingly immune to attacks from both remote(e.g., a passed-along virus) or connected attackers. Becausemost viruses require the unconscious complicity of thevictim to function, they are unsuitable for anything otherthan random terrorism. Networks with conscientious usersand well-engineered security systems that do not pullprograms from the outside are relatively safe. Isolatedcomputer systems are even safer. Thus, the notion ofbroadcasting viruses Io weapons systems, for instance, is specious.

U. -.

112 THE MESH AND THE NET

What limits today's viruses is the fact that, althoughsystems accept data from random external sources, theyrarely accept programs and only the latter are the venue forviruses. Programs act (and can thus mutate), but data isonly acted upon. No data in a well buffered computer cancause the latter to crash either.

Tomorrow's networks will be different, and morevulnerable thanks to four interrelated shifts in howcomputers are used. Remote procedure calls and object-oriented programming mean that the hitherto safe practiceof passing data around will be replaced by the not-so-safepractice of passing data-specific programs around with thedata themselves (ironically, object-oriented practices weredesigned to make computing safer). As office networksexpand to campus, corporate, and finally global networks,global direct addressing will allow every byte on anyone'scomputer to be addressed directly. Tomorrow's 64-bit chipscan point to a thousand times more bytes than the world'sexisting stock of computer-archived data. Finally,tomorrow's networks are likely to contain floating filtersthat roam the silicon prairie looking for game. Knowbots,mentioned above, will be launched by those seeking theephemeral needle in the infosphere haystack. Auto-filters,in turn, sift through information that others are sending you,inserting some into active programs, bringing others to auser's attention in priority order, and trashing the rest.

In short, tomorrow's active networks are likely to beshuttling, not just data, but code back and forth. Thesuccess of syntactic attack-that on the core operatingfunctions of a computer or a network-depends on whatprotections are wired into tomorrow's computers.Tomorrow's computers are likely to be better protected thantoday's microcomputers (where virtually anything can bealtered by an operating program), but networks might allow

! I

MARTIN C. LIBICKI 113

errant code to travel through the network until it finds anopen door, buries itself in code too complex to manuallyfind, and waits for an external event to awaken. Here,amateur hackers may actually do some good. Uncoordinatedhacker attacks that reveal system deficiencies will beresponded to with security fixes that leave basic operationsintact Another and greater piece of cleverness would thenbe required to conduct a follow-up attack. Coordinatedattacks which leave many errant programs lying latent maydo considerably more damage.

In general, the more critical a system, the moreprotected its architecture will be from successful attack.Military command-and-control systems are likely, forinstance, to be built around nodes that do not accept codeexcept from trusted sites. Money-transferring institutions arealso likely to have tough security systems. Digitalsignatures will be required to transfer money (and only afew people will be able to move really large amounts). Itwould be foolish to predict that such systems cannot besubverted, but most such subversions will be inside jobs,and, as such, one-shot deals.

However, these four elements can also be recombinedin new and wonderful ways that increase the risk ofsemantic attack. Tomorrow's networks are likely to see thesilicon equivalent of conversations between intelligentagents. Consider remote medical diagnosis between a sensorsuite that monitors your health and a collection of doctormodules. The latter assess the data, consult with eachother, perhaps awaken a specialist, and, in concert,negotiate a series of actions consistent with your values,life-style, and means. The task of obtaining a loan mightotherwise require sifting through a thousand banks eachwith its own rates, restrictions, and criteria. Most peoplewould otherwise pick a handful based on sketchy or

114 THE MESH AND THE NET

irrelevant criteria (familiarity, propinquity) and start tonegotiate with them. The Net permits launching a thousandrequests into the system-each of which is trained tounderstand your requirements. Each request, in turn,interacts with a similar software from a bank, with, in turn,its sophisticated set of questions and conditions. Theseconversations result in one or a few choices, which may bedispatched with the usual character assessment via eyecontact and handshake, but most of the work will havetaken place beforehand. (Note how many soft points can befound in the system: a thousand banks now have access toat least some information about both you and your plans;you, in turn, have information on at least some lendingcriteria of a thousand banks).

The challenge of semantic subversion is that falsestatements will be inserted into the network as real ones.Systems will be vulnerable until well after the mismatchesbetween various inputs and sensors becomes obvious. Suchattacks will affect even those chunks of military or financialsystems that collect, analyze, and distribute information:those which negotiate the transfer of information, createprofitable patterns of artificial intelligence, and makeassessments about the outside world, where the greatestdanger for subversion is possible.

Errant code can attempt fraud at levels that a humanwould find untenable. Consider the bank loan example.Code can survey more banks in less time than a human.Unless a bank's program has random elements, its logic canbe figured out by hitting it with a thousand different casesand looking for patterns, biases, and even flaws. Code cankeep a poker face and is undeterred by punishment; thus itcan be a much more efficient and determined prober thanhumans are. Once criminal computer code can be reliablyconnected to persons, the cost of subversion rises--thus

i '$

MARTIN C. LIBICKI 115

anonymity is key. Security may, in turn, come to demanda digital signature before a knowbot is accepted into asystem. A master list of digital signatures would becorrelated with some physical manifestation of a user (e.g.,a snapshot, fingerprint, or DNA print). The tolerance ofWestern societies for what is essentially a nationalidentification card, however, is untested. Systems that holdsignature password owners accountable for damage done intheir name must account for users whose passwords arecompromised (especially if holding a signature passwordmay not be an entirely voluntary act in a wired society).

Humans have a high bandwidth for input and a low onefor analysis; computers are the opposite, they cannot foragefor data. If launching event probes into the Net teachesattackers how systems react, they can prepare false eventsthat trigger a false system-wide reaction. For instance, if anuclear reactor turns itself off should it detect severalprecursors to an earthquake, false precursors could be fedinto various sensors and from affiliated computers to effecta power crisis. However, precisely because such events arepredictable and fixed, they can be tested for and requisitesensors can be programmed to weed out such false inputs.

Another source of vulnerability might be created ascomputers learn how to learn. Today, how computershandle the same data varies little from day to day.Tomorrow's computers, however, are likely to change withexperience and adjust to the human vicissitudes of taste,fashion, and circumstance (after all, they exist to serve us).Yet, such adaptability makes them vulnerable to falselearning based on a flood of false data.

Return to the medical example. Perhaps incoming casedata on a new drug indicates a higher cure rate for its targetdisease with fewer side effects--hitherto, say, increasedsusceptibility to caffeine addiction. The word goes out to

116 THE MESH AND THE NET

prescribe the drug more frequently even though the newcases are false and the new version is very similar to theold one. The result is far more caffeine addiction in the realpopulation, and a sharp loss in the credibility of the medicalnetwork.

Return to the bank example. A silicon loan officerfinds many potential clients want to have their loans paidinto their accounts held by the People's Bank of the ThirdWorld, which happens to be absent a list of registeredbanks. The presence of so much business from that quartersuggests that a subtle change in rules is necessary to winloan business. The program deems such an arrangementacceptable. It later turns out these requests have beenmanufactured. The bank exists but it is a front for illicitarms transfers. Absent the instant credibility from themisinformed loan officer-more likely, thousands of equallymisinformed ones catching the same traffic on thenetwork-it would never have gotten off the ground.Within seconds, the People's Bank has real assets to playwith.

Fraud, of course, was not invented for computers(resemblance between this example and a combination ofPenn Square and BCCI is not accidental). But computersand networks allow far more and far graver mistakes bemade far faster. Error, gossip, and fads can propagatefaster than wisdom. Computers also lack the ability to readsubtle clues in personal interaction that have guided humandecision making for so long. Computers, while immune tocertain human faults, are heir, particularly whenoverconfidently introduced in place of humans, to their ownpsychoses. Such psychoses can be targeted for exploitation.Systems that learn from and react to each other may exhibitextremely chaotic behavior if ticked in precisely the wrongway.

Ii

MARTIN C. LIBICKI 117

How dangerous would Net warfare be? In some ways,more because bad karma will duplicate itself much fasterand farther than in human systems. In other ways, less.Corrective lessons can also propagate faster. Simple safetyrules can save lives (e.g., never have traffic lights showgreen in both directions) even if complex systems arebiased towards gridlock and waste under ambiguousconditions (e.g., if in doubt, shut power stations down butkeep life-support equipment on). Security systems can beisolated from external inputs even at the cost of their beingharder to work with (e.g., certain computers can bereprogrammed only on site).

So What?

The twentieth century has seen large wars result from thealignment of national communities with state violence.Millions died when Germans fighting for the Fatherlandfought Russians protecting Mother Russia. The Net worksagainst such correlation by making it easier for people to bedifferent, letting them pick and choose amongcommunications flows and thus messages.

The increasing importance of spanning communitiesover local or national ones may be a harbinger of lesswar-but not necessarily less violence. True, verydispersed communities, for that reason, cannot easilyassemble enough critical mass to take on state power, but,even dispersed, they can do considerable damage. A groupturned inward becomes deaf to the message of commondiscouragement and can potentially become more hostile totenets of civilization. The Net promotes, not insurrection,but greater anomie-in some cases, group anomie-but notnecessarily at levels conducive to unconventional conflict.

'I

118 THE MESH AND THE NET

Wherever this information revolution takes the world,the United States will get there first. It is the only largenation in this century where random internal violence haskilled more people than wars. If nothing else, the UnitedStates may have worked through the problems of nationalmeaning while they tear at others whose nationhood isbased on thin cultural or genetic ice.

As national cultures compete for global influence in thisnew era, the United States stands to gain most. Ourlanguage is most likely to become universal, our currencyis in greatest circulation, our social culture remains popular(if poorly understood), and our political culture is likely tocontinue its ascendancy in world affairs. The U.S. generatesmore good information-in science, technology, business,entertainment, thought-than any other country. Our cultureabsorbs information (just as it has people) more readily.Those who mine the world's data basins are more likely tohit our nuggets than anyone else's. People everywhere

believe that American life is attractive. This is no smallfactor in favor of our national security, and one thatinformation technology cannot help but widen our lead in.

The tension between vulnerability and service willcharacterize the prospects for conflict in the Net. If the Netbecomes part of our expectations of a good life duringbenign years before being targeted, dependence will growand security will be an afterthought. Attack would lead togreat harm. Too much Net security (perhaps resulting fromearlier attacks) may keep it from winning acceptance, at thecost of valuable efficiency. Somewhere in between lies afuture in which wise security choices and healthyskepticism yield a Net that can ward off most blows, absorbthe rest, and maintain its viability.

MARTIN C. LIBICKI 119

7. CONCLUSIONS: MESH VERSUS NET

Many of the capabilities that the United States haslaboriously constructed to support its Mesh are becomingavailable to others forfee [??] on the Net. Yet the developmentof the Net, in general, still favors U.S. security interests.

As long as the power of information technology doublesevery two to three years, it will continue to be have adisproportionate effect on the evolution of national security.The emergence of meshes-with their dispersed sensors,emitters, microbots, and miniprojectiles-will drasticallyhasten the effective retirement of platforms. Thus habits ofpower based on the differential possession of these itemswill have to be replaced by habits born of a differentcalculus.

For the time being, it is difficult to recall a time whenthe gap between the world's greatest power-whichhappens to be the United States-and whoever is numbertwo has been so large. To some extent our unipolarsuperiority has reflected our economic power. If economicswere the only cause, however, the nontrivial likelihood thatChina and Japan could both enjoy national incomes inexcess of ours in a decade or two should deservedly give usconsiderable pause. Fortunately, our superiority is based onmore than money; the United States clearly retains themilitary capital, infrastructure, institutions, and habits thatcome with being, by a larger margin, the world's leadingmilitary superpower.

Yet all these factors rest, in turn, on our superiority atfielding a platform-based military. If platforms go, wouldour power advantage follow? Not necessarily. In manyways the United States has an even more impressive lead ininformation-based warfare, and our relative superiority in

120 THE MESH AND THE NET

software (both technical and cultural) is putatively ours tolose.

As the discussion above, however, suggests, all this hasa catch. To wit, the large lead the United States has builtup in information warfare has been as a result of a large,DOD-financed, information infrastructure-the Mesh, todate. Many of the capabilities of this infrastructure, viaextension or duplication, will become available to the Netand thus to anyone for far smaller sums then the UnitedStates has laid out over the years.

Examples abound, as earlier passages have suggested.DOD put up a fleet of GPS satellites, but now anyone canaccess them by purchasing a GPS receiver. True, DOD hasthe capability to degrade the signal reaching anyone withoutthe right combinations, but others are developing methodsto go around such restrictions (e.g., differential GPS).Many of our space reconnaissance capabilities can beduplicated by anyone with enough money to purchaseimages from foreign observation satellites. Thanks to theboom in environmental monitoring, the number ofsurveillance birds increases by the year. The global Internetextends everywhere, permitting any attached country tocarry information over borders and in very large quantities.The encryption formerly available only to those withsophisticated computers can be a routine feature of allcommunications gear within a decade or two. Globalcellular communications based on several satellite proposals(e.g., Motorola's Iridium) can be the command and controlapparatus of any group that can pay the bills (or have someostensible neutral pay the bills). The same system used forcivilian air traffic control can easily be adapted to militarycommand and control. When fifty-seven (or five hundred)channels become ubiquitous from direct broadcast satellitesor cellular video, interposing our own video streams in

MARTIN C. LIBICKI 121

exclusive place of someone else's becomes quiteproblematic.

The point is not that DOD cannot shut off access tosuch services. It can, but at a cost which, in political terms,grows more expensive every year. Most of the genies areout of the bottle. Short of a war that puts the survival ofthe United States or its large allies at risk, DOD will bepolitically constrained. Yet that is precisely the mostprobable environment that DOD faces through the next twodecades.

In the long run, however, the Net may enhance ournational security. The emergence of transnationalcommunities made possible by the Net should inhibit thedominance of human monocultures in tomorrow's nationalsecurity environment. Conversely, however, the decline ofconstraints on human behavior coming from traditionalcultures portends a rise in urban anomie which verges on

the anarchic.The future of national security in a time of free silicon

is that war becomes peace. Threats of mass destruction willremain difficult to control for precise ends. These aside,those who go outside the law to threaten states succeedprecisely to the extent that they play at the margins ofsecurity regimes. Like any good disease, they resemblecontaminants that the society chooses not to differentiatefrom legitimate proteins. Societies repel such forcesthrough double filtratio,-. The gross filter determines theproper balance between frcdom and ultimate security (astoo little freedom is the surest underminer of security). Thefine filter differentiates legitimate users from illegitimateintruders in more sophisticated ways.

Information technology, ironically, restores man to thecenter of the struggle for national security-where he wasbefore the machines started taking over. Realms of conflict

122 THE MESH AND THE NET

where machines reign supreme-space, air, sea, deserts, andplains (roughly in that order)--will be the first in which thelarge and complex are brought down by the small and themany. Realms where machines availed little-mountains,forests, jungles, cities, and face-to-face interactions (again,roughly in that order)-are also where the meshes will havesmaller and later influence. There, the individual warriorretains the advantage. With unconventional warfare, wherewarfighting machines are virtually useless, these nets areprecisely the point of maximum vulnerability for both sides.

EPILOGUE: DETOURS FROMTHE INEVITABLE FUTURE

The inevitability and relevance of the Small and the Manymay be challenged by several factors: weapons of massdestruction, wide-area electronic countermeasures, therepeated dificulties of making artificial intelligence work, andthe simple persistence of legacy warfare systems.

Just in case the future wanders away from these predictions,readers can get a head start on Monday morning bycounting, in advance, all the ways it can get lost.

* Obstacles to the triumph of the small and the many arenumerous. Developments in wholesale war-nuclear,biological, or chemical agents-may obviate anytechnologies that alter the calculus of retail war. Even inretail war, new technologies usable only in large complexsystems might nullify or destroy the small and the many enmasse. Much of what lets small chips replace big mannedplatforms assumes advances in artificial intelligence, whoseprogress is notoriously resistant to forecast. Old

MARTIN C. LIBICKI 123

technologies and institutions have ways of fighting backagainst new technologies that promote confusion; thus,crossover points frequently recede.

The Imrevaic of Relil Wfr. To resolve importantissues, would nations worry about the art of grabbing ordefending territory or might they instead reach for weaponsof mass destruction first?

Weapons of mass destruction come in three types:chemical, biological, and nuclear. Chemical weapons arenot likely to affect the dominance of the small and many.Because few chemicals can affect the Mesh, their tacticalapplication is limited. Today's chemicals are just one moreobstacle to manned warfare on the battlefield. The lowchances of a breakthrough chemical weapon mean thecurrent calculus of uncertain effectiveness and certainretaliation will persist. Hitting U.S. civilian targets requiresthe use of strategic delivery vehicles. The few who mayget them would not waste them on chemical weapons ifnuclear ones were available. Successful use invites nuclearretaliation-yielding little scope for chemical weaponry.

Biological weaponry is even harder than chemicals touse tactically. The ability of germs to multiply permitshavoc disproportionate to their payload; yet their battlefielduse has been rare. Germs are hard to control and maybackfire as gas did when first used in World War 1. Theireffect on humans is extremely difficult to test. The moreopen the world, the harder it will be to hide errant tests.Greater sophistication could lead to greater disaster.Anthrax, for instance, is very potent, but infected areas areuninhabitable to friend or foe for eons. Germs that killtheir host quickly will not spread quickly. Germs that killslowly cannot be timed for tactical military advantage. Aswith chemical weapons, effective germ use may triggernuclear retaliation.

124 THE MESH AND THE NET

Would nuclear proliferation make retail war obsolete?During the Cold War, both sides took conventional andnuclear operations seriously. They conducted the formerbut never the latter thanks to the nuclear stalemate.

The advantage of nuclear weaponry against (as opposedto instead of) the small and the many may be that it candestroy or disable the millions without having to look forthem. A field swept clean of such objects would letplatforms march through, even if just temporarily.

Yet, tactical nuclear weapons (even discounting theirpotential for escalauon to strategic ones) may be no moreeffective against Meshes than General Grant's use ofexplosives at the battle of Cold Harbor. Fields cleared byone side may be promptly reseeded by the other with more

j sensors; the respite in between may be too temporary toyield much advantage. Delivery vehicles for nuclear armsare subject to the same real-time tracking and targeting thatconventional platforms are subject to.

Nuclear weapons might also be used to generate anelectromagnetic pulse (EMP) big enough to clear electronicsfrom an area so large that it cannot be reseeded quickly.However, Mesh electronics should be less vulnerable toEMP than are large systems connected to long wires. Theonly wire associated with such items would be receivingantennae which could be fitted with protective diodes tokeep a large induced wave from frying the core chips,themselves. Electronics could be hardened. However, ifMesh components diverge too far from their commercialcounterparts, they would become too expensive to buy inthe right quantities.

Power In th Big: Might there arise militarilydecisive technologies available only in very large sizes thatcould erode the logic of the Mesh?

MARTIN C. LIBICKI 125

EMP effects smaller than those generated by nuclear

weapons can be provided by microwave weapons, forinstance. Such weapons require large inputs of energy tobe effective, but could fry weapons systems electronics ata considerable distance. By staying under the nuclearthreshold, microwave weapons may be more usable. Yet ifthey are less powerful, they would have less effect Theycould also be tracked in real time before being used.

Incoming missiles with electronic targeting may beuseless if countered by microwaves in certain situations;without missiles all the data generated by the Mesh wouldavail naught. Yet must missiles be that vulnerable?Inertially guided and mechanically fuzed, missiles do notneed electronics. Moreover, the cost of the microwavef machine may be greater than the cost of saturating itsdefenses with enough not-very-smart rockets to destroy it.

Finally, many sensors may be simply unavailable insmall form. In particular, those which require being bathedin very cold liquids to work well may only function ifcoupled with large expensive cryogenic devices. The latterinclude SQUIDS (superconducting quantum interferencedevices) and certain types of infrared detectors (otherwiseconfused by ambient heat).

Shorfals In A dflca Intelltnce: The hoary "if itworks, it isn't artificial intelligence" retains a certain bittertruth after several decades. Both advocates and skeptics ofartificial intelligence share a long history of bad predictions.Advocates have consistently underestimated how muchhorsepower is required for useful work. Predictions of easyautomatic language translation were made in the 1960s, butonly now can such programs be purchased. Conversely,skeptics predicted that certain feats-a computer beating agrand-master at chess--were inherently impossible, but

126 THE MESH AND THE NET

within the last two years, a computer has defeated a grand-master.

Each of the three relevant areas of artificialintelligence-pattem recognition, machine learning, andsynthetic logic-has seen startling successes and dismalfailures. For pattern recognition, in particular, the trend isaway from linear logical approaches and toward imitatinghuman neural techniques. The excitement that greeted thewidespread introduction of neural net techniques in the mid-1980s has abated-functional nodal architectures are morecomplex than first realized. On the other hand, companiesare busy casting neural net chips, so there must besomething there.

Broad analogues of the human brain-notably thefaculty of common sense-are still eons away. The morelimited a domain (e.g., all the dialogue concernsbiochemistry), the faster the chances for success. Ironically,the persistence of domain limitation argues against roboticimages of technology and toward complex networks ofsimple sensors. But it still leaves man as integral tocommand and control in warfighting.

"The Peftenc of Lega System: The last barrierto the Mesh is that radical futures seem to take longergetting here than simple technological extrapolation wouldsuggest. Picking broad trends is easy; solving thethousands of problems that must be faced before the broadtrends are realized is not.

The new always faces the resistance of the old, aided bypatterns of familiarity, sunk costs, well-tested habits, and alarge supportive infrastructure-hence the observation thatthe new must improve over the old by a factor of ten if itis to overtake it. In the meantime, the old rarely standsstill. Chips are still made with silicon; even the same chipsrecast in gallium arsenide would run three to five times

MARTIN C. LIBICKI 127

faster. Silicon technology has been pushed past hithertodisabling hurdles, even as the promise of gallium arsenideconfronts problems not clearly understood at the outset.

Yet: Two major considerations still favor the Mesh.First, the commercial technologies continue to advance; asthey do, the gap between existing military systems and newsystems based on commercial components shrinks.Advanced economies that have yet to develop a largemilitary-industrial complex (e.g., Japan or the collectivity ofoverseas Chinese) would find that this gap could be bridgedquickly. The route to a superior military, which otherwisewould retrace the path taken by other nations, could beshortened by flying through a technological worm-hole.

Second, military technology continues to be intenselycompetitive; thus success in one place would promote itsspread elsewhere. True, an agreement among superpowerscan suppress known lines of development. Arms controland non-proliferation treaties have worked. Used tosuppress a speculative line of development in an era ofgreat strategic uncertainty, however, their success is lesscertain.

WNWalr Papers

The McNair Papers are published at Fort Lesley J. McNair,home of the Institute for National Strategic Studies and theNational Defense University. An Army post since 1794, the fortwas given its present name in 1948 in honor of LieutenantGeneral Lesley James McNair. General McNair, known as"Educator of the Army" and trainer of some three million troops,was about to take command of Allied ground forces in Europeunder Eisenhower, when he was killed in combat in Normandy,25 July 1944.

1. Joseph P. Lorenz, Egypt and the New Arab Coalition, February1989.2. John E. Endicott, Grand Strategy and the Pacific Region, May1989.3. Eugene V. Rostow, President, Prime Minister, or ConstitutionalMonarch?, October 1989.4. Howard G. DeWolf, SD! and Arms Control, November 1989.5. Martin C. Libicki, What Makes Industries Strategic, November 1989.6. Melvin A. Goodman, Gorbachev and Soviet Policy in the ThirdWorld, February 1990.7. John Van Oudenaren, "The Tradition of Change in Soviet ForeignPolicy," and Francis Conte, "Two Schools of Soviet Diplomacy," inUnderstanding Soviet Foreign Policy, April 1990.8. Max G. Manwaring and Court Prisk, A Strategic View ofInsurgencies: Insights from El Salvador, May 1990.9. Steven R. Linke, Managing Crises in Defense Industry: ThePEPCON and Avtex Cases, June 1990.10. Christine M. Helms, Arabism and Islam: Stateless Nations andNationless States, September 1990.11. Ralph A. Cossa, Iran: Soviet Interests, US Concerns, July 1990.12. Ewan Jamieson, Friend or Ally? A Question for New Zealand, May1991.13. Richard J. Dunn Il, From Gettysburg to the Gulf and Beyond:Coping with Revolutionary Technological Change in Land Warfare,March 1992.14. Ted Greenwood, U.S. and NATO Force Structure and MilitaryOperations in the Mediterranean, June 1993.

__ _ __ _ __ _ __ _ _

15. Oscar W. Clyatt, Jr., Bulgaria's Quest for Security After the ColdWar, February 1993.16. William C. Bodie, Moscow's "Near Abroad": Security Policy inPost-Soviet Europe, June 1993.17. William H. Lewis (ed.), Military Implications of United NationsPeacekeeping Operations, June 1993.18. Sterling D. Sessions and Carl RL Jones, Interoperability: A DesertStorm Case Study, July 1993.19. Eugene V. Rostow, Should Article 43 of the United NationsCharter Be Raised From the Dead? July 199320. William T. Johnsen and Thomas Durell-Young; Jeffrey Simon;Daniel N. Nelson; William C. Bodie, and James McCarthy, EuropeanSecurity Toward the Year 2000, August 1993.21. Edwin R. Carlisle, ed., Developing Battlefield Technologies in the1990s. August 1993.22. Patrick Clawson, How Has Saddam Hussein Survived? EconomicSanctions, 1990-93, August 1993.23. Jeffrey Simon, Czechoslovakia's "Velvet Divorce," VisegradCohesion, and European Fault Lines, October 1993.24. Eugene V. Rostow, The Future of Palestine, November 1993.25. William H. Lewis, John Mackinlay, John G. Ruggie, and Sir BrianUrquhart, Peacekeeping: The Way Ahead? November 1993.26. Edward Marks and William Lewis, Triage for Failing States,January 1994.27. Gregory D. Foster, In Search of a Post-Cold War SecurityStructure, February 1994.28. Martin C. Libicki, The Mesh and the Net: Speculations on ArmedConflict in a Time of Free Silicon, March 1994.

JEQ

JFQ: Joint Force Quarterly is a new professionalmilitary journal published under the auspices of theChairman, Joint Chiefs of Staff, by the Institute forNational Strategic Studies, National DefenseUniversity, to promote understanding of the integratedemployment of land, sea, air, space, and specialoperations forces. JFQ focuses on joint doctrine,coalition warfare, contingency planning, operationsconducted by the unified commands, and joint forcedevelopment.

The journal is a forum for examining joint andcombined warfare and exchanging ideas of impor-tance to all services. JFQ will appeal to a wide audi-ence across the defense community with an interestin the nature and history of joint warfighting.

TO ORDER A SUBSCRIPTION, cite Joint ForceQuarterly (JFQ) and send your check for $22.00($27.50 foreign), or provide your VISA or MasterCardnumber and expiration date, to Superintendent ofDocuments, P.O. Box 371954, Pittsburgh, PA 15220-7954. You may also place orders by FAX: (202) 512-2233.