John Arquilla and David Ronfeldt
International Policy Department
RAND (1993)

CYBERWAR IS COMING!



ABSTRACT

The information revolution and related organizational innovations are altering the nature of conflict and the kinds of military structures, doctrines, and strategies that will be needed. This study introduces two concepts for thinking about these issues: "cyberwar" and "netwar." Industrialization led to attritional warfare by massive armies (e.g., World War I).Mechanization led to maneuver predominated by tanks (e.g., World War II). The information revolution implies the rise of cyberwar, in which neither mass nor mobility will decide outcomes; instead, the side that knows more, that can disperse the fog of war yet enshroud an adversary in it, will enjoy decisive advantages.

Communications and intelligence have always been important. At a minimum, cyberwar implies that they will grow more so and will develop as adjuncts to overall military strategy. In this sense, it resembles existing notions of "information war" that emphasize C3I. However, the information revolution may imply overarching effects that necessitate substantial modifications to military organization and force posture. Cyberwar may be to the twenty first century what blitzkrieg was to the twentieth. It may also provide a way for the U.S. military to increase "punch" with less "paunch."

Whereas cyberwar refers to knowledge-related conflict at the military level, netwar applies to societal struggles most often associated with low intensity conflict by non-state actors, such as terrorists, drug cartels, or black market proliferators of weapons of mass destruction. Both concepts imply that future conflicts will be fought more by "networks" than by "hierarchies," and that whoever masters the network form will gain major advantages.

        "Knowledge must become capability."
        -- Carl von Clausewitz, On War

EMERGENT MODES OF CONFLICT

 Suppose that war looked like this: Small numbers of light, highly mobile forces defeat and compel the surrender of large masses of heavily armed, dug-in enemy forces, with little loss of life on either side. The mobile forces can do this because they are well prepared, make room for maneuver, concentrate their firepower rapidly n unexpected places, and have superior command, control, and information systems that are decentralized to allow tactical initiatives, yet provide central commanders with unparalleled intelligence and "topsight" for strategic purposes.

Warfare is no longer primarily a function of who puts the most capital, labor, and technology on the battlefield, but of who has the best information about the battlefield. What distinguishes the victors is their grasp of information--not only from the mundane standpoint of knowing how to find the enemy while keeping it in the dark, but also in doctrinaland organizational terms. The analogy is rather like a chess game where you see the entire board, but your opponent sees only his own pieces; you can win even if he is allowed to start with additional powerful pieces. We might appear to be extrapolating from the U.S. victory in the Persian Gulf war against Iraq. But our vision is inspired more by the example of the Mongols of the thirteenth century. Their "hordes" were almost always outnumbered by their opponents, yet they conquered, and held for over a century, the largest continental empire ever seen. The key to Mongol success was their absolute dominance of battlefield information. They struck when and where they deemed appropriate, and their "arrow riders" kept field commanders, often separated by hundreds of miles, in daily communication. Even the Great Khan, sometimes thousands of miles away, was aware of developments in the field within days of their occurrence.

Absent the galvanizing threat that used to be posed by the Soviet Union, domestic political pressures will encourage the United States to make do with a smaller military in the future. The type of war-fighting capability that we envision, which is inspired by the Mongol example, but drawn mainly from our analysis of the information revolution, may allow America to protect itself and its far-flung friends and interests, regardless of the size and strength of our potential future adversaries.



The Advance of Technology and Know-How

Throughout history, military doctrine, organization, and strategy have continually undergone profound changes, owing in part to technological breakthroughs. The Greek phalanx, the combination of gun and sail, the levee en masse, the blitzkrieg, the Strategic Air Command: history is filled with examples in which new weapon, propulsion, communication, and transportation technologies provided a basis for advantageous shifts in doctrine, organization, and strategy that enabled innovators to avoid exhausting attritional battles and pursue instead a form of "decisive" warfare.[1]

Today, a variety of new technologies are again taking hold, and further innovations are on the way. The most enticing include non-nuclear high-explosives, precision-guided munitions, stealth designs for aircraft, tanks, and ships, radio-electronic combat (REC) systems, new electronics for intelligence-gathering, interference, and deception, new information and communications systems that improve command, control, communications and intelligence (C3I) functions, and futuristic designs for space-based weapons and for automated and robotic warfare. In addition, virtual reality systems are being developed for simulation and training. Many of these advances enter into a current notion of a military technology revolution (MTR).[2]

The future of war--specifically the U.S. ability to anticipate and wage war--will be shaped in part by how these technological advances are assessed and adopted. Yet, as military historians frequently warn, technology permeates war but does not govern it. It is not technology per se, but rather the organization of technology, broadly defined, that is important. Russell Weigley describes the situation this way:

"... the technology of war does not consist only of instruments intended primarily for the waging of war. A society's ability to wage war depends on every facet of its technology: its roads, its ransport vehicles, its agriculture, its industry, and its methods of organizing its technology. As Van Creveld puts it, 'behind military hardware there is hardware in general, and behind that there is technology as a certain kind of know-how, as a way of looking at the world and coping with its problems.'"[3]

In our view, the technological shift that matches this broad view is the information revolution. This is what will bring the next major shift in the nature of conflict and warfare.



Effects of the Information Revolution

The information revolution reflects the advance of computerized information and communications technologies and related innovations in organization and management theory. Sea-changes are occurring in how information is collected, stored, processed, communicated, and
presented, and in how organizations are designed to take advantage of increased information.[4] Information is becoming a strategic resource that may prove as valuable and influential in the post-
industrial era as capital and labor have been in the industrial age.

Advanced information and communications systems, properly applied, can improve the efficiency of many kinds of activities. But improved efficiency is not the only, or even the best, possible effect. The new technology is also having a transforming effect, for it disrupts old ways of thinking and operating, provides capabilities to do things differently, and suggests how some things may be done better if done differently:

"The consequences of new technology can be usefully thought of as first-level, or efficiency, effects and second-level, or social system, effects. The history of previous technologies demonstrates
that early in the life of a new technology, people are likely to emphasize the efficiency effects and underestimate or overlook potential social system effects. Advances in networking technologies now make it possible to think of people, as well as databases and processors, as resources on a network."Many organizations today are installing electronic networks for first-level efficiency reasons. Executives now beginning to deploy electronic mail and other network applications can realize efficiency gains such as reduced elapsed time for transactions. If we look beyond efficiency at behavioral and organizational changes, we'll see
where the second-level leverage is likely to be. These technologies can change how people spend their time and what and who they know and care about. The full range of payoffs, and the dilemmas, will come from how the technologies affect how people can think and work together--the second-level effects" (Sproull and Kiesler, 1991: 15-16).

The information revolution, in both its technological and non-technological aspects, sets in motion forces that challenge the design of many institutions. It disrupts and erodes the hierarchies around which institutions are normally designed. It diffuses and redistributes power, often to the benefit of what may be considered weaker, smaller actors. It crosses borders, and redraws the boundaries of offices and responsibilities. It expands the spatial and temporal horizons that actors should take into account. Thus, it generally compels closed systems to open up. But while this may make life difficult, especially for large, bureaucratic, aging institutions, the institutional form per se is not becoming obsolete. Institutions of all types remain essential to the organization of society. The responsive, capable institutions will adapt their structures and processes to the information age. Many will evolve from traditional hierarchical forms to new, flexible, network-like models of organization. Success will depend on learning to interlace hierarchical and network principles.[5]

Meanwhile, the very changes that trouble institutions, such as the erosion of hierarchy, favor the rise of multi-organizational networks. Indeed, the information revolution is strengthening the importance of all forms of networks, such as social networks and communications networks. The network form is very different from the institutional form. While institutions (large ones, in particular) are traditionally built around hierarchies and aim to act on their own, multi-organizational networks consist of (often small) organizations or parts of institutions that have linked together to act jointly. The information revolution favors the growth of such networks by making it possible for diverse, dispersed actors to communicate, consult, coordinate, and operate together across greater distances, and on the basis of more and better information than ever before.[6]

These points bear directly on the future of the military, and of onflict and warfare more generally.



Both Netwar and Cyberwar Are Likely

The thesis of this thinkpiece is that the information revolution will cause shifts, both in how societies may come into conflict and how their armed forces may wage war. We offer a distinction between what we call "netwar"--societal-level ideational conflicts waged in part through internetted modes of communication--and "cyberwar" at the military level. These terms are admittedly novel, and better ones may yet be devised.[7] But, for now, they help illuminate a useful distinction, and identify the breadth of ways in which the information revolution may alter the nature of conflict short of war,
as well as the context and the conduct of warfare.[8]

While both netwar and cyberwar revolve around information and communications matters, at a deeper level they are forms of war about "knowledge," about who knows what, when, where, and why, and about how secure a society or a military is regarding its knowledge of itself and its adversaries.[9]


Explaining Netwar

Netwar refers to information-related conflict at a grand level between nations or societies. It means trying to disrupt, damage, or modify what a target population knows or thinks it knows about itself
and the world around it. A netwar may focus on public or elite opinion, or both. It may involve public diplomacy measures, propaganda and psychological campaigns, political and cultural
subversion, deception of or interference with local media, infiltration of computer networks and databases, and efforts to promote dissident or opposition movements across computer networks. Thus, designing a strategy for netwar may mean grouping together from a new perspective a number of measures that have been used before but were viewed separately.

In other words, netwar represents a new entry on the spectrum of conflict that spans economic, political, and social, as well as military forms of "war." In contrast to economic wars that target
the production and distribution of goods, and political wars that aim at the leadership and institutions of a government, netwars would be distinguished by their targeting of information and communications. Like other forms on this spectrum, netwars would be largely non-military, but they could have dimensions that overlap into military war. For example, an economic war may involve trade restrictions, the dumping of goods, the illicit penetration and subversion of businesses and markets in a target country, and the theft of technology, none of which need involve the armed forces. Yet an economic war may also come to include an armed blockade or strategic bombing of economic assets, meaning it has also become a military war. In like manner, a netwar that leads to targeting an enemy's military C3I capabilities turns, at least in part, into what we mean by cyberwar.

Netwar will take various forms, depending on the actors. Some may occur between the governments of rival nation-states. In some respects, the U.S. and Cuban governments are already engaged in a netwar. This is manifested in the activities of Radio and TV Marti on the U.S. side, and on Castro's side by the activities of pro-Cuban support networks around the world.

Other kinds of netwar may arise between governments and non-state actors. For example, netwar may be waged by governments against illicit groups and organizations involved in terrorism, proliferation of weapons of mass destruction, or drug smuggling. Or, to the contrary, it may be waged against the policies of specific governments by advocacy groups and movements, involving, for example, environmental, human-rights, or religious issues. The non-state actors may or may not be associated with nations, and in some cases
they may be organized into vast transnational networks and coalitions.

Another kind of netwar may occur between rival non-state actors, with governments maneuvering on the sidelines to prevent collateral damage to national interests and perhaps to support one side or another. This is the most speculative kind of netwar, but the elements for it have already appeared, especially among advocacy movements around the world. Some movements are increasingly organizing into cross-border networks and coalitions, identifying more with the development of civil society (even global civil society) than with nation-states, and using advanced information and communications technologies to strengthen their activities. This may well turn out to be the next great frontier for ideological conflict, and netwar may be a prime characteristic.

Most netwars will probably be non-violent, but in the worst cases one could combine the possibilities into some mean low-intensity conflict scenarios. Martin Van Creveld (1991: 197) does this when he worries that, "In the future, war will not be waged by armies but by groups whom today we call terrorists, guerrillas, bandits and robbers, but who will undoubtedly hit on more formal titles to describe themselves." In his view, war between states will diminish, and the state may become obsolete as a major form of societal organization. Our views coincide with many of Van Creveld's, though we do not believe that the state is even potentially obsolete. Rather, it will be transformed by these developments.

Some netwars will involve military issues. Possible issue areas include nuclear proliferation, drug smuggling, and anti-terrorism because of the potential threats they pose to international order and
national security interests. Moreover, broader societal trends (e.g., the redefinition of security concepts, the new roles of advocacy groups, the blurring of traditional boundaries between what
is military and what is non-military, between what is public and what is private, and between what pertains to the state and what pertains to society) may engage the interests of at least some military
offices in some netwar-related activities.

Netwars are not real wars, traditionally defined. But netwar might be developed into an instrument for trying, early on, to prevent a real war from arising. Deterrence in a chaotic world may become as much a function of one's cyber posture and presence as of one's force posture and presence.



Explaining Cyberwar

Cyberwar refers to conducting, and preparing to conduct, military operations according to information-related principles. It means disrupting, if not destroying, information and communications systems, broadly defined to include even military culture, on which an adversary relies in order to know itself: who it is, where it is, what it can do when, why it is fighting, which threats to counter
first, and so forth. It means trying to know everything about an adversary while keeping the adversary from knowing much about oneself. It means turning the "balance of information and knowledge" in one's favor, especially if the balance of forces is not. It means using knowledge so that less capital and labor may have to be expended.

This form of warfare may involve diverse technologies, notably for C3I, for intelligence collection, processing, and distribution, for tactical communications, positioning, and identification-friend-or-
foe (IFF), and for "smart" weapons systems, to give but a few examples. It may also involve electronically blinding, jamming, deceiving, overloading, and intruding into an adversary's information and communications circuits. Yet, cyberwar is not simply a set of measures based on technology. And it should not be confused with past meanings of computerized, automated, robotic, or electronic warfare.

Cyberwar may have broad ramifications for military organization and doctrine. As noted, the literature on the information revolution calls for organizational innovations, so that different parts of an institution function like interconnected networks rather than separate hierarchies. Thus, cyberwar may imply some institutional redesign for a military in both intra- and inter-service areas.
Moving to networked structures may require some decentralization of command and control, which may well be resisted in light of earlier views that the new technology would provide greater central control of military operations. But decentralization is only part of the picture: the new technology may also provide greater "topsight," a central understanding of the big picture that enhances the management of complexity.[10] Many treatments of organizational redesign laud decentralization; yet decentralization alone is not the key issue. The pairing of decentralization with topsight brings the real gains.

Cyberwar may also imply developing new doctrines about the kinds of forces needed, where and how to deploy them, and what and how to strike on the enemy's side. How and where to position what kinds of computers and related sensors, networks, databases, and so forth., may become as important as the question once was for the deployment of bombers and their support functions. Cyberwar may also have implications for integrating the political and psychological with the military aspects of warfare.

In sum, cyberwar may raise broad issues of military organization and doctrine, as well as strategy, tactics, and weapons design. It may be applicable in low- and high-intensity conflicts, in conventional and non-conventional environments, and for defensive or offensive purposes.

As an innovation in warfare, we anticipate that cyberwar may be to the twenty first century what blitzkrieg was to the twentieth century. Yet, for now, we also believe that the concept is too
speculative for precise definition. At a minimum, it represents an extension of the traditional importance of obtaining information in
war: having superior C3I and trying to locate, read, surprise, and deceive the enemy before he does the same to you. That remains important no matter what overall strategy is pursued. In this sense, the concept means that information-related factors are more important than ever due to new technologies, but it does not indicate a break with tradition. Indeed, it resembles Thomas Rona's (1976: 2) concept of an "information war" that is "intertwined with, and superimposed on, other military operations." Our concept is broader than Rona's, which focused on countermeasures to degrade an enemy's weapons systems while protecting one's own; yet, we believe that this approach to defining cyberwar will ultimately prove too limiting.

In a deeper sense, cyberwar signifies a transformation in the nature of war. This, we believe, will prove to be the better approach to defining cyberwar. Our position is at odds with a view (see Arnett 1992) that uses the terms "hyperwar" and "cyberwar" to claim that the key implication of the MTR is the automated battlefield, that future wars will be fought mainly by "brilliant" weapons, robots, and autonomous computers, that man will be subordinate to the machine, and that combat will be unusually fast and laden with stand-off attacks. This view errs in its understanding of the effects of the information revolution, and our own view differs on every point. Cyberwar is about organization as much as technology. It implies new man-machine interfaces that amplify man's capabilities, not a separation of man and machine. In some situations, combat may be
waged fast and from afar, but in many other situations, it may be slow and close-in. New combinations of far and close and fast and slow may be the norm, not one extreme or the other.

The post-modern battlefield stands to be fundamentally altered by the information technology revolution, at both the strategic and tactical levels. The increasing breadth and depth of this battlefield and the ever-improving accuracy and destructiveness of even conventional munitions have heightened the importance of C3I matters to the point where dominance in this aspect alone may now yield consistent war-winning advantages to able practitioners. Yet cyberwar is a much broader idea than attacking an enemy's C3I systems while improving and defending one's own. In Clausewitz's sense, it is characterized by the effort to turn knowledge into capability.

Indeed, even though its full design and implementation requires advanced technology, cyberwar is not reliant upon advanced technology per se. The continued development of advanced information and communications technologies is crucial for U.S. military capabilities. But cyberwar, whether waged by the United States or other actors, does not necessarily require the presence of advanced
technology. The organizational and psychological dimensions may be as important as the technical. Cyberwar may actually be waged with low technology under some circumstances.


The lesson: Institutions can be defeated by networks, and it may take networks to counter networks. The future may belong to whoever masters the network form.

FOOTNOTES

[1] Delbruck (1985 edn.) describes warfare as a dual phenomenon: it
may be waged with either "exhaustion" or "annihilation" in mind.

[2] This notion borrows from an earlier Soviet notion of a scientific
technology revolution (STR).

[3] Weigley (1989: 196), quoting Van Creveld, (1989: 1).

[4] See Bell (1980), Beniger (1986), and Toffler (1990).

[5] The literature on these points is vast. Recent additions
include: Bankes and Builder (1991), Malone and Rockart (September
1991); Ronfeldt (1991); Sproull and Keisler (1991, and September
1991); Toffler (1990).

[6] Ronfeldt, "Institutions, Markets, and Networks," in preparation.

[7] Terms with "cyber-" as the prefix--e.g., cyberspace--are
currently in vogue among some visionaries and technologists who are
seeking names for new concepts related to the information revolution.
The prefix is from the Greek root kybernan, meaning to steer or
govern, and a related word kybernetes, meaning pilot, governor, or
helmsman. The prefix was introduced by Norbert Wiener in the 1940s
in his classic works creating the field of "cybernetics" (which is
related to cybernetique, an older French word meaning the art of
government). Some readers may object to our additions to the
lexicon, but we prefer them to alternative terms like "information
warfare," which has been used in some circles to refer to warfare
that focuses on C3I capabilities. In our view, a case exists for
using the prefix in that it bridges the fields of information and
governance better than does any other available prefix or term.
Indeed, kybernan, the root of "cyber-" is also the root of the word
" govern" and its extensions. Perhaps rendering the term in German
would help. A likely term would be leitenkrieg, which translates
loosely as "control warfare" (Our thanks to Denise Quigley for
suggesting this term).

[8] We are indebted to Carl Builder for observing that the
information revolution may have as much impact on the context as on
the conduct of warfare, and that an analyst ought to identify how the
context may change before he or she declares how a military's conduct
should change.

[9] The difficult term is "information;" defining it remains a key
problem of the information revolution. While no current definition
is satisfactory, as a rule many analysts subscribe to a hierarchy
with data at the bottom, information in the middle, and knowledge at
the top (some would add wisdom above that). Like many analysts, we
often use the term information (or information-related) to refer
collectively to the hierarchy, but sometimes we use the term to mean
something more than data but less than knowledge. Finally, one
spreading view holds that new information amounts to "any difference
that makes a difference."

[10] The importance of topsight is identified by Gelernter (1991:
52), who observes: "If you're a software designer and you can't
master and subdue monumental complexity, you're dead: your machines
don't work. They run for a while and then sputter to a halt, or they
never run at all. Hence, 'managing complexity' must be your goal.
Or, we can describe exactly the same goal in a more positive light.
We can call it the pursuit of topsight. Topsight--an understanding
of the big picture is an essential goal of every software builder.
It's also the most precious intellectual commodity known to man."


BIBLIOGRAPHY

Arnett, Eric H., Gunboat Diplomacy and the Bomb: Nuclear
Proliferation and the U.S. Navy, New York: Praeger, 1989.

_______________, "Welcome to Hyperwar," The Bulletin of the Atomic
Scientists, Vol. 48, No. 7, September 1992, pp. 14-21.

Arquilla, John, "Nuclear Proliferation: Implications for Conventional
Deterrence." In Arquilla and Preston Niblack, eds., American Grand
Strategy in the Post-Cold War World, Santa Monica: RAND, 1992a.

______________, "Louder Than Words: Tacit Communication in
International Crises," Political Communication, Vol. 9, pp. 155-172,
1992b.

Bankes, Steve, and Carl Builder, The Etiology of European Change,
Santa Monica: RAND, 1991.

_______________________________, "Seizing the Moment: Harnessing the
Information Technologies," The Information Society, Vol. 8, No. 1,
1992, pp. 1-59.

Bell, Daniel, "The Social Framework of the Information Society," in
Tom Forester (ed.), The Micro Electronics Revolution: The Complete
Guide to the New Technology and Its Impact on Society, The MIT Press,
Cambridge, Mass., 1980, pp. 500-549.

Bellamy, Chris, The Future of Land Warfare, London: Helm, 1987.

Benedikt, Michael, ed., Cyberspace: First Steps, Cambridge: MIT
Press, 1991.

Bracken, Paul, "Electronics, Sensors, and Command and Control in the
Developing World: An overview of the Issues," Draft prepared for
discussion at the AAAS Workshop on Advanced Weaponry in the
Developing World, Westfields Conference Center, Virginia, June 1992.

Beniger, James, The Control Revolution, Cambridge, MA: Harvard
University Press, 1986.

Brodie, Bernard, A Guide to Naval Strategy, Princeton: Princeton
University Press, 1944.

Caven, Brian, The Punic Wars, New York: St. Martin's Press, 1980.

Chambers, James, The Devil's Horsemen, New York: Atheneum, 1985.

Clausewitz, Carl von, On War, Ed. and trans. by Michael Howard and
Peter Paret, Princeton: Princeton University Press, 1976.

Curtin, Jeremiah, The Mongols, Boston: Little, Brown, 1908.

De Landa, Manuel, War in the Age of the Intellligent Machines, New
York: Zone Books, 1991.

Delbruck, Hans, History of the Art of War, 3 vols. Westport, CT:
Greenwood Press, 1985 edn.

Drucker, Peter F., The New Realities: In Government and Politics, In
Economics and Business, In Society and World View, New York: Harper
and Row, Publishers, 1989.

________________, "The Coming of the New Organization," Harvard
Business Review, JanuaryPFebruary 1988, reprinted in the unauthored
book Revolution in Real Time: Managing Information Technology in the
1990s, A Harvard Business Review Book, 1990.

Gelernter, David, Mirror Worlds, or the Day Software Puts the
Universe in a Shoebox...How It Will Happen and What It Will Mean, New
York: Oxford University Press, 1991.

Gibson, William, Neuromancer, New York: Ace Books, 1984.

Grier, Peter, "The Data Weapon," Government Executive, June 1992, pp.
20-23.

Grimble, Ian, The Sea Wolf: The Life of Admiral Cochrane, London:
Blond & Briggs, 1978.

Guderian, Heinz, Panzer Leader, New York: Ballantine Books, Inc.,
1972 edn.

Kenney, George and Michael J. Dugan, "Operation Balkan Storm: Here's
a Plan," The New York Times, November 29, 1992.

Lamb, Harold, Genghis Khan, New York: Macmillan, 1927.

Lawrence, Thomas E., Seven Pillars of Wisdom, New York: Doubleday,
1938 edn.

Liddell Hart, Sir Basil H., Great Captains Unveiled, New York:
Putnam's, 1931.

__________________________, History of the Second World War, New
York: Putnam's, 1970.

Malone, Thomas W., and John F. Rockart, "Computers, Networks and the
Corporation, Scientific American, September 1991, pp. 128-136.

Mao Zedong, trans. by Samuel Griffith, On Guerrilla Warfare, New
York: Praeger Books, 1961 edn.

Mellenthin, F. W. von, Panzer Battles, New York: Ballantine Books,
Inc., 1976 edn.

Miles, Milton E., A Different Kind of War, New York: Doubleday,
1968.

Posen, Barry R., The Sources of Military Doctrine, Ithaca: Cornell
University Press, 1984.

Powell, Colin L., "Information-Age Warriors," Byte, July 1992, p.
370.

Rona, Thomas P., Weapon Systems and Information War, Seattle: Boeing
Aerospace Co., July 1976.

Ronfeldt, David, Cyberocracy, Cyberspace, and Cyberology: Political
Effects of the Information Revolution, Santa Monica: RAND, 1991.

_______________, "Cyberocracy Is Coming," The Information Society,
Vol. 8, #4, 1992, pp. 243-296.

Sproull, Lee, and Sara Kiesler, Connections: New Ways of Working in
the Networked Organization, Cambridge: MIT Press, 1991.

______________________________, "Computers, Networks and Work,"
Scientific American, September 1991, pp. 116-123.

Stolfi, R.H.S., Hitler's Panzers East: World War II Reinterpreted,
Tulsa: University of Oklahoma Press, 1992.

Toffler, Alvin, Powershift: Knowledge, Wealth, and Violence at the
Edge of the 21st Century, New York: Bantam Books, 1990.

Waltz, Kenneth N., Theory of International Politics, New York:
Random House, 1979.

Van Creveld, Martin, Command in War, Cambridge: Harvard Press, 1985.

___________________, Technololgy and War: From 2000 B.C. to the
Present, New York: The Free Press, 1989.

___________________, The Transformation of War, New York: Free
Press, 1991.

Weigley, Russell F., "War and the Paradox of Technology" (review of
Van Creveld, 1989), International Security, Fall 1989, pp. 192-202.



Copyright 1993 Taylor & Francis
ISSN 0149-5933/93

This article is copyrighted 1993 by Taylor & Francis, 1900 Frost
Road, Suite 101, Bristol, PA 19007, 1-800-821-8312. It was
originally published in the journal Comparative Strategy, Volume 12,
no. 2, pp. 141-165.
Electronic reproduction and transmission for individual, non-commercial use only is permitted. Authors' note: As a courtesy to Taylor & Francis, individuals or organizations that down-load this article are requested to notify the publisher at the above address, or the authors via e-mail at
< ronfeldt@well.sf.ca.us> or <ronfeldt@rand.org>.