Fighting networks the defining challenge of irregular warfare

Download
Author
Dean, Arleigh William
Date
2011-06Advisor
Arquilla, John
Freeman, Michael
Metadata
Show full item recordAbstract
This study examines how networks fight, and how to counter networks. Networks, empowered by information technology, play a powerful role in many different aspects of social and organizational interaction. Notably, recent confrontations with networked opponents have strained the U.S. military, and produced time-intensive, brutally complex, and costly irregular warfare in Iraq and Afghanistan. The challenges that these fighting networks present require a close examination of how they fight, and most importantly, how to combat the threat they pose. The primary purpose of this study is to examine the role of networks in irregular warfare, where they are central and prevalent. Regardless of its many forms, the most salient aspect of modern irregular warfare is the increasingly networked nature of the antagonists. Countering these opponents requires a detailed understanding of the organization, doctrine, methods, and information usage, which both empower networks and generate vulnerabilities. This research generated a theoretical framework that draws on the rich bodies of knowledge that inform network theory, network-based operations, irregular warfare, organizational theory, and information strategy. Each of these theoretical areas provided hypotheses for identifying causal factors, which led to an understanding of how networks fight, and development of a systematic framework for countering them. Comparative case studies focused on a cluster of networks engaged in irregular warfare, which served to test this framework. This cluster consists of three cases, each marked by tough opponents, II and network-based organizations operating in the information age: the Chechen separatists, Lebanese Hezbollah, and Al-Qaeda in Iraq. Overall, this thesis advances theory in a way that provides a systematic understanding of how to counter networked opponents, while generating additional perspective about irregular warfare.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
IRREGULAR WARFARE IN THE HIGH NORTH
Heinola, Antti J. (Monterey, CA; Naval Postgraduate School, 2022-12);The strategic importance of the High North––defined in this thesis as the Arctic areas of Finland, Norway, and Sweden––is increasing. Previous research on the region focuses on assessing the often-competing interests of ... -
Understanding "understanding" flow for network-centric warfare: military knowledge-flow mechanics
Nissen, Mark E. (Monterey, California. Naval Postgraduate School, 2002); NPS-GSBPP-02-001Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication ... -
Conditions for adopting an irregular defense strategy
Santa, Gabor (Monterey, California: Naval Postgraduate School, 2014-06);From small countries’ perspectives, the four general defensive postures—conventional military build-ups, WMD acquisition, alliance formation, and neutrality—are not always viable choices, and are often unaffordable. So ...