 |
John Arquilla and David Ronfeldt
International Policy Department
RAND (1993)
CYBERWAR IS COMING!

ABSTRACT
The information revolution and related organizational innovations
are altering the nature of conflict and the kinds of military
structures, doctrines, and strategies that will be needed. This
study introduces two concepts for thinking about these issues: "cyberwar" and "netwar." Industrialization
led to attritional warfare by massive armies (e.g., World War
I).Mechanization led to maneuver predominated by tanks (e.g.,
World War II). The information revolution implies the rise of
cyberwar, in which neither mass nor mobility will decide outcomes;
instead, the side that knows more, that can disperse the fog
of war yet enshroud an adversary in it, will enjoy decisive advantages.
Communications and intelligence have always been important.
At a minimum, cyberwar implies that they will grow more so and
will develop as adjuncts to overall military strategy. In this
sense, it resembles existing notions of "information war" that
emphasize C3I. However, the information revolution may imply
overarching effects that necessitate substantial modifications
to military organization and force posture. Cyberwar may be to
the twenty first century what blitzkrieg was to the twentieth.
It may also provide a way for the U.S. military to increase "punch" with
less "paunch."
Whereas cyberwar refers to knowledge-related conflict
at the military level, netwar applies to societal struggles
most often
associated with low intensity conflict by non-state actors, such
as terrorists, drug cartels, or black market proliferators of
weapons of mass destruction. Both concepts imply that future
conflicts will be fought more by "networks" than by "hierarchies," and
that whoever masters the network form will gain major advantages.
"Knowledge must become capability."
-- Carl von Clausewitz, On War

EMERGENT MODES OF CONFLICT
Suppose that war looked like this: Small numbers of light,
highly mobile forces defeat and compel the surrender of large
masses of heavily armed, dug-in enemy forces, with little loss
of life on either side. The mobile forces can do this because
they are well prepared, make room for maneuver, concentrate their
firepower rapidly n unexpected places, and have superior command,
control, and information systems that are decentralized to allow
tactical initiatives, yet provide central commanders with unparalleled
intelligence and "topsight" for strategic purposes.
Warfare is no longer primarily a function of who puts the most
capital, labor, and technology on the battlefield, but of who
has the best information about the battlefield. What distinguishes
the victors is their grasp of information--not only from the
mundane standpoint of knowing how to find the enemy while keeping
it in the dark, but also in doctrinaland organizational terms.
The analogy is rather like a chess game where you see the entire
board, but your opponent sees only his own pieces; you can win
even if he is allowed to start with additional powerful pieces.
We might appear to be extrapolating from the U.S. victory in
the Persian Gulf war against Iraq. But our vision is inspired
more by the example of the Mongols of the thirteenth century.
Their "hordes" were almost always outnumbered by their
opponents, yet they conquered, and held for over a century, the
largest continental empire ever seen. The key to Mongol success
was their absolute dominance of battlefield information. They
struck when and where they deemed appropriate, and their "arrow
riders" kept field commanders, often separated by hundreds
of miles, in daily communication. Even the Great Khan, sometimes
thousands of miles away, was aware of developments in the field
within days of their occurrence.
Absent the galvanizing threat that used to be posed by the Soviet
Union, domestic political pressures will encourage the United
States to make do with a smaller military in the future. The
type of war-fighting capability that we envision, which is inspired
by the Mongol example, but drawn mainly from our analysis of
the information revolution, may allow America to protect itself
and its far-flung friends and interests, regardless of the size
and strength of our potential future adversaries.

The Advance of Technology and Know-How
Throughout history, military doctrine, organization, and strategy
have continually undergone profound changes, owing in part to
technological breakthroughs. The Greek phalanx, the combination
of gun and sail, the levee en masse, the blitzkrieg, the Strategic
Air Command: history is filled with examples in which new weapon,
propulsion, communication, and transportation technologies provided
a basis for advantageous shifts in doctrine, organization, and
strategy that enabled innovators to avoid exhausting attritional
battles and pursue instead a form of "decisive" warfare.[1]
Today, a variety of new technologies are again taking hold,
and further innovations are on the way. The most enticing include
non-nuclear high-explosives, precision-guided munitions, stealth
designs for aircraft, tanks, and ships, radio-electronic combat
(REC) systems, new electronics for intelligence-gathering, interference,
and deception, new information and communications systems that
improve command, control, communications and intelligence (C3I)
functions, and futuristic designs for space-based weapons and
for automated and robotic warfare. In addition, virtual reality
systems are being developed for simulation and training. Many
of these advances enter into a current notion of a military technology
revolution (MTR).[2]
The future of war--specifically the U.S. ability to anticipate
and wage war--will be shaped in part by how these technological
advances are assessed and adopted. Yet, as military historians
frequently warn, technology permeates war but does not govern
it. It is not technology per se, but rather the organization
of technology, broadly defined, that is important. Russell Weigley
describes the situation this way:
"... the technology of war does not consist only of instruments
intended primarily for the waging of war. A society's ability
to wage war depends on every facet of its technology: its roads,
its ransport vehicles, its agriculture, its industry, and its
methods of organizing its technology. As Van Creveld puts it,
'behind military hardware there is hardware in general, and behind
that there is technology as a certain kind of know-how, as a
way of looking at the world and coping with its problems.'"[3]
In our view, the technological shift that matches this broad
view is the information revolution. This is what will bring the
next major shift in the nature of conflict and warfare.

Effects of the Information Revolution
The information revolution reflects the advance of computerized
information and communications technologies and related innovations
in organization and management theory. Sea-changes are occurring
in how information is collected, stored, processed, communicated,
and
presented, and in how organizations are designed to take advantage
of increased information.[4] Information is becoming a strategic
resource that may prove as valuable and influential in the post-
industrial era as capital and labor have been in the industrial
age.
Advanced information and communications systems, properly applied,
can improve the efficiency of many kinds of activities. But improved
efficiency is not the only, or even the best, possible effect.
The new technology is also having a transforming effect, for
it disrupts old ways of thinking and operating, provides capabilities
to do things differently, and suggests how some things may be
done better if done differently:
"The consequences of new technology can be usefully thought
of as first-level, or efficiency, effects and second-level, or
social system, effects. The history of previous technologies
demonstrates
that early in the life of a new technology, people are likely
to emphasize the efficiency effects and underestimate or overlook
potential social system effects. Advances in networking technologies
now make it possible to think of people, as well as databases
and processors, as resources on a network."Many organizations
today are installing electronic networks for first-level efficiency
reasons. Executives now beginning to deploy electronic mail and
other network applications can realize efficiency gains such
as reduced elapsed time for transactions. If we look beyond efficiency
at behavioral and organizational changes, we'll see
where the second-level leverage is likely to be. These technologies
can change how people spend their time and what and who they
know and care about. The full range of payoffs, and the dilemmas,
will come from how the technologies affect how people can think
and work together--the second-level effects" (Sproull and
Kiesler, 1991: 15-16).
The information revolution, in both its technological
and non-technological aspects, sets in motion forces that challenge
the design of many
institutions. It disrupts and erodes the hierarchies around which
institutions are normally designed. It diffuses and redistributes
power, often to the benefit of what may be considered weaker,
smaller actors. It crosses borders, and redraws the boundaries
of offices and responsibilities. It expands the spatial and temporal
horizons that actors should take into account. Thus, it generally
compels closed systems to open up. But while this may make
life difficult, especially for large, bureaucratic, aging institutions,
the institutional form per se is not becoming obsolete. Institutions
of all types remain essential to the organization of society.
The responsive, capable institutions will adapt their structures
and processes to the information age. Many will evolve from traditional
hierarchical forms to new, flexible, network-like models of organization.
Success will depend on learning to interlace hierarchical and
network principles.[5]
Meanwhile, the very changes that trouble institutions,
such as the erosion of hierarchy, favor the rise of multi-organizational
networks. Indeed, the information revolution is strengthening
the
importance of all forms of networks, such as social networks
and communications networks. The network form is very different
from the institutional form. While institutions (large ones,
in particular)
are traditionally built around hierarchies and aim to act on
their own, multi-organizational networks consist of (often small)
organizations or parts of institutions that have linked together
to act jointly. The information revolution favors the growth
of such networks by making it possible for diverse, dispersed
actors to communicate, consult, coordinate, and operate together
across greater distances, and on the basis of more and better
information than ever before.[6]
These points bear directly on the future of the military, and
of onflict and warfare more generally.

Both Netwar and Cyberwar Are Likely
The thesis of this thinkpiece is that the information revolution
will cause shifts, both in how societies may come into conflict
and how their armed forces may wage war. We offer a distinction
between what we call "netwar"--societal-level ideational
conflicts waged in part through internetted modes of communication--and "cyberwar" at
the military level. These terms are admittedly novel, and better
ones may yet be devised.[7] But, for now, they help illuminate
a useful distinction, and identify the breadth of ways in which
the information revolution may alter the nature of conflict short
of war,
as well as the context and the conduct of warfare.[8]
While both netwar and cyberwar revolve around information and
communications matters, at a deeper level they are forms of war
about "knowledge," about who knows what, when, where,
and why, and about how secure a society or a military is regarding
its knowledge of itself and its adversaries.[9]

Explaining Netwar
Netwar refers to information-related conflict at a grand level
between nations or societies. It means trying to disrupt, damage,
or modify what a target population knows or thinks it knows about
itself
and the world around it. A netwar may focus on public or elite
opinion, or both. It may involve public diplomacy measures, propaganda
and psychological campaigns, political and cultural
subversion, deception of or interference with local media, infiltration
of computer networks and databases, and efforts to promote dissident
or opposition movements across computer networks. Thus, designing
a strategy for netwar may mean grouping together from a new perspective
a number of measures that have been used before but were viewed
separately.
In other words, netwar represents a new entry on the spectrum
of conflict that spans economic, political, and social, as well
as military forms of "war." In contrast to economic
wars that target
the production and distribution of goods, and political wars
that aim at the leadership and institutions of a government,
netwars would be distinguished by their targeting of information
and communications. Like other forms on this spectrum, netwars
would be largely non-military, but they could have dimensions
that overlap into military war. For example, an economic war
may involve trade restrictions, the dumping of goods, the illicit
penetration and subversion of businesses and markets in a target
country, and the theft of technology, none of which need involve
the armed forces. Yet an economic war may also come to include
an armed blockade or strategic bombing of economic assets, meaning
it has also become a military war. In like manner, a netwar that
leads to targeting an enemy's military C3I capabilities turns,
at least in part, into what we mean by cyberwar.
Netwar will take various forms, depending on the actors. Some
may occur between the governments of rival nation-states. In
some respects, the U.S. and Cuban governments are already engaged
in a netwar. This is manifested in the activities of Radio and
TV Marti on the U.S. side, and on Castro's side by the activities
of pro-Cuban support networks around the world.
Other kinds of netwar may arise between governments and non-state
actors. For example, netwar may be waged by governments against
illicit groups and organizations involved in terrorism, proliferation
of weapons of mass destruction, or drug smuggling. Or, to the
contrary, it may be waged against the policies of specific governments
by advocacy groups and movements, involving, for example, environmental,
human-rights, or religious issues. The non-state actors may or
may not be associated with nations, and in some cases
they may be organized into vast transnational networks and coalitions.
Another kind of netwar may occur between rival non-state actors,
with governments maneuvering on the sidelines to prevent collateral
damage to national interests and perhaps to support one side
or another. This is the most speculative kind of netwar, but
the elements for it have already appeared, especially among advocacy
movements around the world. Some movements are increasingly organizing
into cross-border networks and coalitions, identifying more with
the development of civil society (even global civil society)
than with nation-states, and using advanced information and communications
technologies to strengthen their activities. This may well turn
out to be the next great frontier for ideological conflict, and
netwar may be a prime characteristic.
Most netwars will probably be non-violent, but in the worst
cases one could combine the possibilities into some mean low-intensity
conflict scenarios. Martin Van Creveld (1991: 197) does this
when he worries that, "In the future, war will not be waged
by armies but by groups whom today we call terrorists, guerrillas,
bandits and robbers, but who will undoubtedly hit on more formal
titles to describe themselves." In his view, war between
states will diminish, and the state may become obsolete as a
major form of societal organization. Our views coincide with
many of Van Creveld's, though we do not believe that the state
is even potentially obsolete. Rather, it will be transformed
by these developments.
Some netwars will involve military issues. Possible issue areas
include nuclear proliferation, drug smuggling, and anti-terrorism
because of the potential threats they pose to international order
and
national security interests. Moreover, broader societal trends
(e.g., the redefinition of security concepts, the new roles of
advocacy groups, the blurring of traditional boundaries between
what
is military and what is non-military, between what is public
and what is private, and between what pertains to the state and
what pertains to society) may engage the interests of at least
some military
offices in some netwar-related activities.
Netwars are not real wars, traditionally defined. But netwar
might be developed into an instrument for trying, early on, to
prevent a real war from arising. Deterrence in a chaotic world
may become as much a function of one's cyber posture and presence
as of one's force posture and presence.

Explaining Cyberwar
Cyberwar refers to conducting, and preparing to conduct, military
operations according to information-related principles. It means
disrupting, if not destroying, information and communications
systems, broadly defined to include even military culture, on
which an adversary relies in order to know itself: who it is,
where it is, what it can do when, why it is fighting, which threats
to counter
first, and so forth. It means trying to know everything about
an adversary while keeping the adversary from knowing much about
oneself. It means turning the "balance of information and
knowledge" in one's favor, especially if the balance of
forces is not. It means using knowledge so that less capital
and labor may have to be expended.
This form of warfare may involve diverse technologies, notably
for C3I, for intelligence collection, processing, and distribution,
for tactical communications, positioning, and identification-friend-or-
foe (IFF), and for "smart" weapons systems, to give
but a few examples. It may also involve electronically blinding,
jamming, deceiving, overloading, and intruding into an adversary's
information and communications circuits. Yet, cyberwar is not
simply a set of measures based on technology. And it should not
be confused with past meanings of computerized, automated, robotic,
or electronic warfare.
Cyberwar may have broad ramifications for military organization
and doctrine. As noted, the literature on the information revolution
calls for organizational innovations, so that different parts
of an institution function like interconnected networks rather
than separate hierarchies. Thus, cyberwar may imply some institutional
redesign for a military in both intra- and inter-service areas.
Moving to networked structures may require some decentralization
of command and control, which may well be resisted in light of
earlier views that the new technology would provide greater central
control of military operations. But decentralization is only
part of the picture: the new technology may also provide greater "topsight," a
central understanding of the big picture that enhances the management
of complexity.[10] Many treatments of organizational redesign
laud decentralization; yet decentralization alone is not the
key issue. The pairing of decentralization with topsight brings
the real gains.
Cyberwar may also imply developing new doctrines about the kinds
of forces needed, where and how to deploy them, and what and
how to strike on the enemy's side. How and where to position
what kinds of computers and related sensors, networks, databases,
and so forth., may become as important as the question once was
for the deployment of bombers and their support functions. Cyberwar
may also have implications for integrating the political and
psychological with the military aspects of warfare.
In sum, cyberwar may raise broad issues of military organization
and doctrine, as well as strategy, tactics, and weapons design.
It may be applicable in low- and high-intensity conflicts, in
conventional and non-conventional environments, and for defensive
or offensive purposes.
As an innovation in warfare, we anticipate that cyberwar may
be to the twenty first century what blitzkrieg was to the twentieth
century. Yet, for now, we also believe that the concept is too
speculative for precise definition. At a minimum, it represents
an extension of the traditional importance of obtaining information
in
war: having superior C3I and trying to locate, read, surprise,
and deceive the enemy before he does the same to you. That remains
important no matter what overall strategy is pursued. In this
sense, the concept means that information-related factors are
more important than ever due to new technologies, but it does
not indicate a break with tradition. Indeed, it resembles Thomas
Rona's (1976: 2) concept of an "information war" that
is "intertwined with, and superimposed on, other military
operations." Our concept is broader than Rona's, which focused
on countermeasures to degrade an enemy's weapons systems while
protecting one's own; yet, we believe that this approach to defining
cyberwar will ultimately prove too limiting.
In a deeper sense, cyberwar signifies a transformation in the
nature of war. This, we believe, will prove to be the better
approach to defining cyberwar. Our position is at odds with a
view (see Arnett 1992) that uses the terms "hyperwar" and "cyberwar" to
claim that the key implication of the MTR is the automated battlefield,
that future wars will be fought mainly by "brilliant" weapons,
robots, and autonomous computers, that man will be subordinate
to the machine, and that combat will be unusually fast and laden
with stand-off attacks. This view errs in its understanding of
the effects of the information revolution, and our own view differs
on every point. Cyberwar is about organization as much as technology.
It implies new man-machine interfaces that amplify man's capabilities,
not a separation of man and machine. In some situations, combat
may be
waged fast and from afar, but in many other situations, it may
be slow and close-in. New combinations of far and close and fast
and slow may be the norm, not one extreme or the other.
The post-modern battlefield stands to be fundamentally altered
by the information technology revolution, at both the strategic
and tactical levels. The increasing breadth and depth of this
battlefield and the ever-improving accuracy and destructiveness
of even conventional munitions have heightened the importance
of C3I matters to the point where dominance in this aspect alone
may now yield consistent war-winning advantages to able practitioners.
Yet cyberwar is a much broader idea than attacking an enemy's
C3I systems while improving and defending one's own. In Clausewitz's
sense, it is characterized by the effort to turn knowledge into
capability.
Indeed, even though its full design and implementation requires
advanced technology, cyberwar is not reliant upon advanced technology
per se. The continued development of advanced information and
communications technologies is crucial for U.S. military capabilities.
But cyberwar, whether waged by the United States or other actors,
does not necessarily require the presence of advanced
technology. The organizational and psychological dimensions may
be as important as the technical. Cyberwar may actually be waged
with low technology under some circumstances.
The lesson: Institutions can be defeated by networks, and it
may take networks to counter networks. The future may belong
to whoever masters the network form.

FOOTNOTES
[1] Delbruck (1985 edn.) describes warfare as a dual phenomenon:
it
may be waged with either "exhaustion" or "annihilation" in
mind.
[2] This notion borrows from an earlier Soviet notion of a scientific
technology revolution (STR).
[3] Weigley (1989: 196), quoting Van Creveld, (1989: 1).
[4] See Bell (1980), Beniger (1986), and Toffler (1990).
[5] The literature on these points is vast. Recent additions
include: Bankes and Builder (1991), Malone and Rockart (September
1991); Ronfeldt (1991); Sproull and Keisler (1991, and September
1991); Toffler (1990).
[6] Ronfeldt, "Institutions, Markets, and Networks," in
preparation.
[7] Terms with "cyber-" as the prefix--e.g., cyberspace--are
currently in vogue among some visionaries and technologists who
are
seeking names for new concepts related to the information revolution.
The prefix is from the Greek root kybernan, meaning to steer
or
govern, and a related word kybernetes, meaning pilot, governor,
or
helmsman. The prefix was introduced by Norbert Wiener in the
1940s
in his classic works creating the field of "cybernetics" (which
is
related to cybernetique, an older French word meaning the art
of
government). Some readers may object to our additions to the
lexicon, but we prefer them to alternative terms like "information
warfare," which has been used in some circles to refer to
warfare
that focuses on C3I capabilities. In our view, a case exists
for
using the prefix in that it bridges the fields of information
and
governance better than does any other available prefix or term.
Indeed, kybernan, the root of "cyber-" is also the
root of the word
"
govern" and its extensions. Perhaps rendering the term in
German
would help. A likely term would be leitenkrieg, which translates
loosely as "control warfare" (Our thanks to Denise
Quigley for
suggesting this term).
[8] We are indebted to Carl Builder for observing that the
information revolution may have as much impact on the context
as on
the conduct of warfare, and that an analyst ought to identify
how the
context may change before he or she declares how a military's
conduct
should change.
[9] The difficult term is "information;" defining
it remains a key
problem of the information revolution. While no current definition
is satisfactory, as a rule many analysts subscribe to a hierarchy
with data at the bottom, information in the middle, and knowledge
at
the top (some would add wisdom above that). Like many analysts,
we
often use the term information (or information-related) to refer
collectively to the hierarchy, but sometimes we use the term
to mean
something more than data but less than knowledge. Finally, one
spreading view holds that new information amounts to "any
difference
that makes a difference."
[10] The importance of topsight is identified by Gelernter (1991:
52), who observes: "If you're a software designer and you
can't
master and subdue monumental complexity, you're dead: your machines
don't work. They run for a while and then sputter to a halt,
or they
never run at all. Hence, 'managing complexity' must be your goal.
Or, we can describe exactly the same goal in a more positive
light.
We can call it the pursuit of topsight. Topsight--an understanding
of the big picture is an essential goal of every software builder.
It's also the most precious intellectual commodity known to man."

BIBLIOGRAPHY
Arnett, Eric H., Gunboat Diplomacy and the Bomb: Nuclear
Proliferation and the U.S. Navy, New York: Praeger, 1989.
_______________, "Welcome to Hyperwar," The Bulletin
of the Atomic
Scientists, Vol. 48, No. 7, September 1992, pp. 14-21.
Arquilla, John, "Nuclear Proliferation: Implications for
Conventional
Deterrence." In Arquilla and Preston Niblack, eds., American
Grand
Strategy in the Post-Cold War World, Santa Monica: RAND, 1992a.
______________, "Louder Than Words: Tacit Communication
in
International Crises," Political Communication, Vol. 9,
pp. 155-172,
1992b.
Bankes, Steve, and Carl Builder, The Etiology of European Change,
Santa Monica: RAND, 1991.
_______________________________, "Seizing the Moment: Harnessing
the
Information Technologies," The Information Society, Vol.
8, No. 1,
1992, pp. 1-59.
Bell, Daniel, "The Social Framework of the Information
Society," in
Tom Forester (ed.), The Micro Electronics Revolution: The Complete
Guide to the New Technology and Its Impact on Society, The MIT
Press,
Cambridge, Mass., 1980, pp. 500-549.
Bellamy, Chris, The Future of Land Warfare, London: Helm, 1987.
Benedikt, Michael, ed., Cyberspace: First Steps, Cambridge:
MIT
Press, 1991.
Bracken, Paul, "Electronics, Sensors, and Command and Control
in the
Developing World: An overview of the Issues," Draft prepared
for
discussion at the AAAS Workshop on Advanced Weaponry in the
Developing World, Westfields Conference Center, Virginia, June
1992.
Beniger, James, The Control Revolution, Cambridge, MA: Harvard
University Press, 1986.
Brodie, Bernard, A Guide to Naval Strategy, Princeton: Princeton
University Press, 1944.
Caven, Brian, The Punic Wars, New York: St. Martin's Press,
1980.
Chambers, James, The Devil's Horsemen, New York: Atheneum, 1985.
Clausewitz, Carl von, On War, Ed. and trans. by Michael Howard
and
Peter Paret, Princeton: Princeton University Press, 1976.
Curtin, Jeremiah, The Mongols, Boston: Little, Brown, 1908.
De Landa, Manuel, War in the Age of the Intellligent Machines,
New
York: Zone Books, 1991.
Delbruck, Hans, History of the Art of War, 3 vols. Westport,
CT:
Greenwood Press, 1985 edn.
Drucker, Peter F., The New Realities: In Government and Politics,
In
Economics and Business, In Society and World View, New York:
Harper
and Row, Publishers, 1989.
________________, "The Coming of the New Organization," Harvard
Business Review, JanuaryPFebruary 1988, reprinted in the unauthored
book Revolution in Real Time: Managing Information Technology
in the
1990s, A Harvard Business Review Book, 1990.
Gelernter, David, Mirror Worlds, or the Day Software Puts the
Universe in a Shoebox...How It Will Happen and What It Will Mean,
New
York: Oxford University Press, 1991.
Gibson, William, Neuromancer, New York: Ace Books, 1984.
Grier, Peter, "The Data Weapon," Government Executive,
June 1992, pp.
20-23.
Grimble, Ian, The Sea Wolf: The Life of Admiral Cochrane, London:
Blond & Briggs, 1978.
Guderian, Heinz, Panzer Leader, New York: Ballantine Books,
Inc.,
1972 edn.
Kenney, George and Michael J. Dugan, "Operation Balkan
Storm: Here's
a Plan," The New York Times, November 29, 1992.
Lamb, Harold, Genghis Khan, New York: Macmillan, 1927.
Lawrence, Thomas E., Seven Pillars of Wisdom, New York: Doubleday,
1938 edn.
Liddell Hart, Sir Basil H., Great Captains Unveiled, New York:
Putnam's, 1931.
__________________________, History of the Second World War,
New
York: Putnam's, 1970.
Malone, Thomas W., and John F. Rockart, "Computers, Networks
and the
Corporation, Scientific American, September 1991, pp. 128-136.
Mao Zedong, trans. by Samuel Griffith, On Guerrilla Warfare,
New
York: Praeger Books, 1961 edn.
Mellenthin, F. W. von, Panzer Battles, New York: Ballantine
Books,
Inc., 1976 edn.
Miles, Milton E., A Different Kind of War, New York: Doubleday,
1968.
Posen, Barry R., The Sources of Military Doctrine, Ithaca: Cornell
University Press, 1984.
Powell, Colin L., "Information-Age Warriors," Byte,
July 1992, p.
370.
Rona, Thomas P., Weapon Systems and Information War, Seattle:
Boeing
Aerospace Co., July 1976.
Ronfeldt, David, Cyberocracy, Cyberspace, and Cyberology: Political
Effects of the Information Revolution, Santa Monica: RAND, 1991.
_______________, "Cyberocracy Is Coming," The Information
Society,
Vol. 8, #4, 1992, pp. 243-296.
Sproull, Lee, and Sara Kiesler, Connections: New Ways of Working
in
the Networked Organization, Cambridge: MIT Press, 1991.
______________________________, "Computers, Networks and
Work,"
Scientific American, September 1991, pp. 116-123.
Stolfi, R.H.S., Hitler's Panzers East: World War II Reinterpreted,
Tulsa: University of Oklahoma Press, 1992.
Toffler, Alvin, Powershift: Knowledge, Wealth, and Violence
at the
Edge of the 21st Century, New York: Bantam Books, 1990.
Waltz, Kenneth N., Theory of International Politics, New York:
Random House, 1979.
Van Creveld, Martin, Command in War, Cambridge: Harvard Press,
1985.
___________________, Technololgy and War: From 2000 B.C. to
the
Present, New York: The Free Press, 1989.
___________________, The Transformation of War, New York: Free
Press, 1991.
Weigley, Russell F., "War and the Paradox of Technology" (review
of
Van Creveld, 1989), International Security, Fall 1989, pp. 192-202.

Copyright 1993 Taylor & Francis
ISSN 0149-5933/93
This article is copyrighted
1993 by Taylor & Francis, 1900
Frost
Road, Suite 101, Bristol, PA 19007, 1-800-821-8312. It was
originally published in the journal Comparative Strategy, Volume
12,
no. 2, pp. 141-165.
Electronic reproduction and transmission for individual, non-commercial
use only is permitted. Authors' note: As a courtesy to Taylor & Francis,
individuals or organizations that down-load this article are
requested to notify the publisher at the above address, or the
authors via e-mail at
<
ronfeldt@well.sf.ca.us> or <ronfeldt@rand.org>.
|
 |
 |
 |