• Home
  • About RSIS
    • Introduction
    • Building the Foundations
    • Welcome Message
    • Board of Governors
    • Staff Profiles
      • Executive Deputy Chairman’s Office
      • Dean’s Office
      • Management
      • Distinguished Fellows
      • Faculty and Research
      • Associate Research Fellows, Senior Analysts and Research Analysts
      • Visiting Fellows
      • Adjunct Fellows
      • Administrative Staff
    • Honours and Awards for RSIS Staff and Students
    • RSIS Endowment Fund
    • Endowed Professorships
    • Career Opportunities
    • Getting to RSIS
  • Research
    • Research Centres
      • Centre for Multilateralism Studies (CMS)
      • Centre for Non-Traditional Security Studies (NTS Centre)
      • Centre of Excellence for National Security (CENS)
      • Institute of Defence and Strategic Studies (IDSS)
      • International Centre for Political Violence and Terrorism Research (ICPVTR)
    • Research Programmes
      • National Security Studies Programme (NSSP)
      • Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
    • Future Issues and Technology Cluster
    • [email protected] Newsletter
    • Other Research
      • Science and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
    • Graduate Programmes Office
    • Overview
    • MSc (Asian Studies)
    • MSc (International Political Economy)
    • MSc (International Relations)
    • MSc (Strategic Studies)
    • NTU-Warwick Double Masters Programme
    • PhD Programme
    • Exchange Partners and Programmes
    • How to Apply
    • Financial Assistance
    • Meet the Admissions Team: Information Sessions and other events
    • RSIS Alumni
  • Alumni & Networks
    • Alumni
    • Asia-Pacific Programme for Senior Military Officers (APPSMO)
    • Asia-Pacific Programme for Senior National Security Officers (APPSNO)
    • International Strategy Forum-Asia (ISF-Asia)
    • SRP Executive Programme
    • Terrorism Analyst Training Course (TATC)
  • Publications
    • RSIS Publications
      • Annual Reviews
      • Books
      • Bulletins and Newsletters
      • Commentaries
      • Counter Terrorist Trends and Analyses
      • Commemorative / Event Reports
      • IDSS Paper
      • Interreligious Relations
      • Monographs
      • NTS Insight
      • Policy Reports
      • Working Papers
      • RSIS Publications for the Year
    • Glossary of Abbreviations
    • External Publications
      • Authored Books
      • Journal Articles
      • Edited Books
      • Chapters in Edited Books
      • Policy Reports
      • Working Papers
      • Op-Eds
      • External Publications for the Year
    • Policy-relevant Articles Given RSIS Award
  • Media
    • Great Powers
    • Sustainable Security
    • Other Resource Pages
    • Media Highlights
    • News Releases
    • Speeches
    • Vidcast Channel
    • Audio/Video Forums
  • Events
  • Giving
  • Contact Us
Facebook
Twitter
YouTube
RSISVideoCast RSISVideoCast rsis.sg
Linkedin
instagram instagram rsis.sg
RSS
  • Home
  • About RSIS
      • Introduction
      • Building the Foundations
      • Welcome Message
      • Board of Governors
      • Staff Profiles
        • Executive Deputy Chairman’s Office
        • Dean’s Office
        • Management
        • Distinguished Fellows
        • Faculty and Research
        • Associate Research Fellows, Senior Analysts and Research Analysts
        • Visiting Fellows
        • Adjunct Fellows
        • Administrative Staff
      • Honours and Awards for RSIS Staff and Students
      • RSIS Endowment Fund
      • Endowed Professorships
      • Career Opportunities
      • Getting to RSIS
  • Research
      • Research Centres
        • Centre for Multilateralism Studies (CMS)
        • Centre for Non-Traditional Security Studies (NTS Centre)
        • Centre of Excellence for National Security (CENS)
        • Institute of Defence and Strategic Studies (IDSS)
        • International Centre for Political Violence and Terrorism Research (ICPVTR)
      • Research Programmes
        • National Security Studies Programme (NSSP)
        • Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      • Future Issues and Technology Cluster
      • [email protected] Newsletter
      • Other Research
        • Science and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      • Graduate Programmes Office
      • Overview
      • MSc (Asian Studies)
      • MSc (International Political Economy)
      • MSc (International Relations)
      • MSc (Strategic Studies)
      • NTU-Warwick Double Masters Programme
      • PhD Programme
      • Exchange Partners and Programmes
      • How to Apply
      • Financial Assistance
      • Meet the Admissions Team: Information Sessions and other events
      • RSIS Alumni
  • Alumni & Networks
      • Alumni
      • Asia-Pacific Programme for Senior Military Officers (APPSMO)
      • Asia-Pacific Programme for Senior National Security Officers (APPSNO)
      • International Strategy Forum-Asia (ISF-Asia)
      • SRP Executive Programme
      • Terrorism Analyst Training Course (TATC)
  • Publications
      • RSIS Publications
        • Annual Reviews
        • Books
        • Bulletins and Newsletters
        • Commentaries
        • Counter Terrorist Trends and Analyses
        • Commemorative / Event Reports
        • IDSS Paper
        • Interreligious Relations
        • Monographs
        • NTS Insight
        • Policy Reports
        • Working Papers
        • RSIS Publications for the Year
      • Glossary of Abbreviations
      • External Publications
        • Authored Books
        • Journal Articles
        • Edited Books
        • Chapters in Edited Books
        • Policy Reports
        • Working Papers
        • Op-Eds
        • External Publications for the Year
      • Policy-relevant Articles Given RSIS Award
  • Media
      • Great Powers
      • Sustainable Security
      • Other Resource Pages
      • Media Highlights
      • News Releases
      • Speeches
      • Vidcast Channel
      • Audio/Video Forums
  • Events
  • Giving
  • Contact Us
  • instagram instagram rsis.sg
Connect

Getting to RSIS

Map

Address

Nanyang Technological University
Block S4, Level B3,
50 Nanyang Avenue,
Singapore 639798

View location on Google maps Click here for directions to RSIS

Get in Touch

    Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
    RSISVideoCast RSISVideoCast rsisvideocast
      school/rsis-ntu
    instagram instagram rsis.sg
      RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    RSIS Intranet

    S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
    Nanyang Technological University Nanyang Technological University

    Skip to content

     
    • RSIS
    • Publication
    • RSIS Publications
    • CO07098 | 21st Century Warfare: Computers as the New Centre of Gravity
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • Commentaries
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • IDSS Paper
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers
    • RSIS Publications for the Year

    CO07098 | 21st Century Warfare: Computers as the New Centre of Gravity
    Bernard Loo Fook Weng

    24 September 2007

    download pdf
    RSIS Commentary is a platform to provide timely and, where appropriate, policy-relevant commentary and analysis of topical and contemporary issues. The authors’ views are their own and do not represent the official position of the S. Rajaratnam School of International Studies (RSIS), NTU. These commentaries may be reproduced with prior permission from RSIS and due credit to the author(s) and RSIS. Please email to Editor RSIS Commentary at [email protected].

    Commentary

    Computer networks are becoming the single most important aspect of modern nation-states. Government services, military organisations, economic activities, all are increasingly dependent on computer networks. The recent spate of computer attacks and hackings might presage a new approach to warfare, where states target the increasingly important – and vulnerable – parts of modern nation- states, namely the computer networks that virtually all aspects of national life depend fundamentally upon.

    IN 2007, TWO events have defined the changing face of warfare more than all the displays of precision weaponry on CNN and BBC since the 1991 Iraq war. The first was the Russian computer attacks against Estonian computer networks in May. The second was the Chinese computer attacks, this time hacking into American networks.

    The public face of the Revolution in Military Affairs – the RMA for short – has always been the iconic image of so-called ‘smart’ weapons hitting their targets with pinpoint accuracy. This public face masked what is the more important aspect of the RMA, which is the ever-increasing importance of computing and networking technologies in all aspects of military activities. However, muddled strategic thinking is preventing a proper appreciation of the prospects – and the problems – of the central role of these technologies in the RMA.

    Understanding the Centre of Gravity

    This muddled strategic thinking revolves around the centre of gravity, which was one of the most important concepts that the great German philosopher of war, Carl von Clausewitz, had proposed in his classic Vom Kriege (On War).

    Unfortunately, Clausewitz himself was not entirely clear as to what precisely this concept – the centre of gravity – meant. As a consequence, this lack of clarity results in the debates within strategic communities as to what it actually means, and what it refers to. Basically there are two ways by which we can think of this concept – either as a critical vulnerability, or as a source of strength and stability. The problem with this debate over the concept is that it fails to see a third way – that the centre of gravity is both a source of strength and stability as well as a critical vulnerability.

    Computer Networks as Centre of Gravity

    It is when we think of the centre of gravity as this potentially self-contradictory concept – as strength and vulnerability – that the centrality of computers and networks in the RMA becomes clear. Everything about this RMA depends fundamentally on computing and networking technologies. It is computing technologies that underpins the various aspects of the RMA. These include increased battlespace awareness through the employment of multiple arrays of different sensor technologies to gain a pervasive ability to monitor any and every aspect of the battlespace; precision guidance technologies that give weapons systems increasing lethality and renders the battlespace an increasingly dangerous environment to be in. Both aspects of the RMA create this situation for the opponent: to survive in the battlespace, the opponent needs to be both concealed and covered; any movement on his part will reveal his position to battlespace sensors, which will then result in the projection of very precise firepower onto his position, and almost guarantee his destruction and death.

    Secondly, it is networking technologies that allow for this battlespace awareness to be communicated throughout the organisation. More importantly, these allow for the joining of the different services – land, air and naval forces – into a cohesive whole whose power is greater than the sum of its individual parts. Networking allows for jointness in the military, and networked jointness promises force multiplier effects to unprecedented degrees. There used to be a clear divide between all three component forces – there were areas that were beyond the ability of naval, air or land forces to attack and destroy. Networked jointness allows any weapons platform to attack and destroy emerging enemy positions. Whereas in the past, it was quite common for an enemy position to become known, only to remain intact for lack of sufficient land or air force components to attack and destroy this position.

    The end result is a picture where the modern military organisation undergoing the RMA comes to depend fundamentally on both technologies. If either technology is rendered inoperable, for even a short period, it can bring what is a highly complex organisation to a grinding halt. In so doing, it can render what is otherwise a highly lethal organisation strategically irrelevant. For any military organisation, the quality of its weapons systems is strategically meaningless if these weapons systems cannot be deployed for whatever reasons against the enemy where and when it matters the most.

    Understanding Computer Attacks

    It is in this light that the recent spate of computer attacks mentioned earlier ought to be regarded by RMA proponents and military planners as a source of potentially great concern. Computer hacking has traditionally been seen in terms of espionage – of seeking to gain access to otherwise classified information that might prove crucial to one’s own strategic efforts. This aspect has not gone away. It is entirely likely that the recent spate of Chinese hackings into various national networks was espionage, for the purposes of gathering information. This is a source of concern, although one should not overreact, since espionage is an unavoidable fact of international life. Basically all states conduct espionage activities against each other.

    What is the greater concern about these recent computer attacks is that it might presage a new approach to waging war. Given the centrality of computers and networks, the most powerful military organisation in the world can be rendered strategically impotent if its computer networks are shut down even for a few hours by a computer attack. It is generally well known, for instance, that the entire eastern seaboard of the USA can be shut down for several hours by a concerted attack against the key handful of nodes in the computer networks that control the power grids of that part of the country. The consequences of such a shutdown – economic, political and military – are only dimly comprehended. The worst case scenario is this: a concerted computer attack shuts down the nation’s early warning and monitoring facilities, rendering the military blind. Such a computer attack is then followed by a devastating military attack against the most important military assets, rendering the state now defenceless. The opponent then imposes its demands on the state, and in this blind and defenceless position, the state has no choice but to surrender.

    Ponder the Improbable

    This is a hypothetical scenario, something that probably remains within the realms of moviedom imagination. The point is this – we once considered the prospect of airplanes being deliberately flown into buildings to be the realm of pure fiction. This is no longer the case. Which means that the responsibility of policy makers and strategic planners is to ponder the improbable. However improbable it may seem, computer attacks may become the new way of warfare; it is something that all policy makers and strategic planners need to seriously consider.

    About the Author

    Bernard Fook Weng Loo is an Assistant Professor with the Institute of Defence and Strategic Studies at the Rajaratnam School of International Studies, Nanyang Technological University. He specialises in war and strategic studies. 

    Categories: Commentaries / / Global

    Last updated on 07/10/2014

    RSIS Commentary is a platform to provide timely and, where appropriate, policy-relevant commentary and analysis of topical and contemporary issues. The authors’ views are their own and do not represent the official position of the S. Rajaratnam School of International Studies (RSIS), NTU. These commentaries may be reproduced with prior permission from RSIS and due credit to the author(s) and RSIS. Please email to Editor RSIS Commentary at [email protected].

    Commentary

    Computer networks are becoming the single most important aspect of modern nation-states. Government services, military organisations, economic activities, all are increasingly dependent on computer networks. The recent spate of computer attacks and hackings might presage a new approach to warfare, where states target the increasingly important – and vulnerable – parts of modern nation- states, namely the computer networks that virtually all aspects of national life depend fundamentally upon.

    IN 2007, TWO events have defined the changing face of warfare more than all the displays of precision weaponry on CNN and BBC since the 1991 Iraq war. The first was the Russian computer attacks against Estonian computer networks in May. The second was the Chinese computer attacks, this time hacking into American networks.

    The public face of the Revolution in Military Affairs – the RMA for short – has always been the iconic image of so-called ‘smart’ weapons hitting their targets with pinpoint accuracy. This public face masked what is the more important aspect of the RMA, which is the ever-increasing importance of computing and networking technologies in all aspects of military activities. However, muddled strategic thinking is preventing a proper appreciation of the prospects – and the problems – of the central role of these technologies in the RMA.

    Understanding the Centre of Gravity

    This muddled strategic thinking revolves around the centre of gravity, which was one of the most important concepts that the great German philosopher of war, Carl von Clausewitz, had proposed in his classic Vom Kriege (On War).

    Unfortunately, Clausewitz himself was not entirely clear as to what precisely this concept – the centre of gravity – meant. As a consequence, this lack of clarity results in the debates within strategic communities as to what it actually means, and what it refers to. Basically there are two ways by which we can think of this concept – either as a critical vulnerability, or as a source of strength and stability. The problem with this debate over the concept is that it fails to see a third way – that the centre of gravity is both a source of strength and stability as well as a critical vulnerability.

    Computer Networks as Centre of Gravity

    It is when we think of the centre of gravity as this potentially self-contradictory concept – as strength and vulnerability – that the centrality of computers and networks in the RMA becomes clear. Everything about this RMA depends fundamentally on computing and networking technologies. It is computing technologies that underpins the various aspects of the RMA. These include increased battlespace awareness through the employment of multiple arrays of different sensor technologies to gain a pervasive ability to monitor any and every aspect of the battlespace; precision guidance technologies that give weapons systems increasing lethality and renders the battlespace an increasingly dangerous environment to be in. Both aspects of the RMA create this situation for the opponent: to survive in the battlespace, the opponent needs to be both concealed and covered; any movement on his part will reveal his position to battlespace sensors, which will then result in the projection of very precise firepower onto his position, and almost guarantee his destruction and death.

    Secondly, it is networking technologies that allow for this battlespace awareness to be communicated throughout the organisation. More importantly, these allow for the joining of the different services – land, air and naval forces – into a cohesive whole whose power is greater than the sum of its individual parts. Networking allows for jointness in the military, and networked jointness promises force multiplier effects to unprecedented degrees. There used to be a clear divide between all three component forces – there were areas that were beyond the ability of naval, air or land forces to attack and destroy. Networked jointness allows any weapons platform to attack and destroy emerging enemy positions. Whereas in the past, it was quite common for an enemy position to become known, only to remain intact for lack of sufficient land or air force components to attack and destroy this position.

    The end result is a picture where the modern military organisation undergoing the RMA comes to depend fundamentally on both technologies. If either technology is rendered inoperable, for even a short period, it can bring what is a highly complex organisation to a grinding halt. In so doing, it can render what is otherwise a highly lethal organisation strategically irrelevant. For any military organisation, the quality of its weapons systems is strategically meaningless if these weapons systems cannot be deployed for whatever reasons against the enemy where and when it matters the most.

    Understanding Computer Attacks

    It is in this light that the recent spate of computer attacks mentioned earlier ought to be regarded by RMA proponents and military planners as a source of potentially great concern. Computer hacking has traditionally been seen in terms of espionage – of seeking to gain access to otherwise classified information that might prove crucial to one’s own strategic efforts. This aspect has not gone away. It is entirely likely that the recent spate of Chinese hackings into various national networks was espionage, for the purposes of gathering information. This is a source of concern, although one should not overreact, since espionage is an unavoidable fact of international life. Basically all states conduct espionage activities against each other.

    What is the greater concern about these recent computer attacks is that it might presage a new approach to waging war. Given the centrality of computers and networks, the most powerful military organisation in the world can be rendered strategically impotent if its computer networks are shut down even for a few hours by a computer attack. It is generally well known, for instance, that the entire eastern seaboard of the USA can be shut down for several hours by a concerted attack against the key handful of nodes in the computer networks that control the power grids of that part of the country. The consequences of such a shutdown – economic, political and military – are only dimly comprehended. The worst case scenario is this: a concerted computer attack shuts down the nation’s early warning and monitoring facilities, rendering the military blind. Such a computer attack is then followed by a devastating military attack against the most important military assets, rendering the state now defenceless. The opponent then imposes its demands on the state, and in this blind and defenceless position, the state has no choice but to surrender.

    Ponder the Improbable

    This is a hypothetical scenario, something that probably remains within the realms of moviedom imagination. The point is this – we once considered the prospect of airplanes being deliberately flown into buildings to be the realm of pure fiction. This is no longer the case. Which means that the responsibility of policy makers and strategic planners is to ponder the improbable. However improbable it may seem, computer attacks may become the new way of warfare; it is something that all policy makers and strategic planners need to seriously consider.

    About the Author

    Bernard Fook Weng Loo is an Assistant Professor with the Institute of Defence and Strategic Studies at the Rajaratnam School of International Studies, Nanyang Technological University. He specialises in war and strategic studies. 

    Categories: Commentaries

    Last updated on 07/10/2014

    Back to top

    Terms of Use | Privacy Statement
    Copyright © S. Rajaratnam School of International Studies. All rights reserved.
    This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
    OK
    Latest Book
    CO07098 | 21st Century Warfare: Computers as the New Centre of Gravity

    Commentary

    Computer networks are becoming the single ...
    more info