Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • RSIS Publications
    • CO07098 | 21st Century Warfare: Computers as the New Centre of Gravity
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • RSIS Commentary Series
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • Future Issues
    • IDSS Papers
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers

    CO07098 | 21st Century Warfare: Computers as the New Centre of Gravity
    Bernard Loo Fook Weng

    24 September 2007

    download pdf

    Commentary

    Computer networks are becoming the single most important aspect of modern nation-states. Government services, military organisations, economic activities, all are increasingly dependent on computer networks. The recent spate of computer attacks and hackings might presage a new approach to warfare, where states target the increasingly important – and vulnerable – parts of modern nation- states, namely the computer networks that virtually all aspects of national life depend fundamentally upon.

    IN 2007, TWO events have defined the changing face of warfare more than all the displays of precision weaponry on CNN and BBC since the 1991 Iraq war. The first was the Russian computer attacks against Estonian computer networks in May. The second was the Chinese computer attacks, this time hacking into American networks.

    The public face of the Revolution in Military Affairs – the RMA for short – has always been the iconic image of so-called ‘smart’ weapons hitting their targets with pinpoint accuracy. This public face masked what is the more important aspect of the RMA, which is the ever-increasing importance of computing and networking technologies in all aspects of military activities. However, muddled strategic thinking is preventing a proper appreciation of the prospects – and the problems – of the central role of these technologies in the RMA.

    Understanding the Centre of Gravity

    This muddled strategic thinking revolves around the centre of gravity, which was one of the most important concepts that the great German philosopher of war, Carl von Clausewitz, had proposed in his classic Vom Kriege (On War).

    Unfortunately, Clausewitz himself was not entirely clear as to what precisely this concept – the centre of gravity – meant. As a consequence, this lack of clarity results in the debates within strategic communities as to what it actually means, and what it refers to. Basically there are two ways by which we can think of this concept – either as a critical vulnerability, or as a source of strength and stability. The problem with this debate over the concept is that it fails to see a third way – that the centre of gravity is both a source of strength and stability as well as a critical vulnerability.

    Computer Networks as Centre of Gravity

    It is when we think of the centre of gravity as this potentially self-contradictory concept – as strength and vulnerability – that the centrality of computers and networks in the RMA becomes clear. Everything about this RMA depends fundamentally on computing and networking technologies. It is computing technologies that underpins the various aspects of the RMA. These include increased battlespace awareness through the employment of multiple arrays of different sensor technologies to gain a pervasive ability to monitor any and every aspect of the battlespace; precision guidance technologies that give weapons systems increasing lethality and renders the battlespace an increasingly dangerous environment to be in. Both aspects of the RMA create this situation for the opponent: to survive in the battlespace, the opponent needs to be both concealed and covered; any movement on his part will reveal his position to battlespace sensors, which will then result in the projection of very precise firepower onto his position, and almost guarantee his destruction and death.

    Secondly, it is networking technologies that allow for this battlespace awareness to be communicated throughout the organisation. More importantly, these allow for the joining of the different services – land, air and naval forces – into a cohesive whole whose power is greater than the sum of its individual parts. Networking allows for jointness in the military, and networked jointness promises force multiplier effects to unprecedented degrees. There used to be a clear divide between all three component forces – there were areas that were beyond the ability of naval, air or land forces to attack and destroy. Networked jointness allows any weapons platform to attack and destroy emerging enemy positions. Whereas in the past, it was quite common for an enemy position to become known, only to remain intact for lack of sufficient land or air force components to attack and destroy this position.

    The end result is a picture where the modern military organisation undergoing the RMA comes to depend fundamentally on both technologies. If either technology is rendered inoperable, for even a short period, it can bring what is a highly complex organisation to a grinding halt. In so doing, it can render what is otherwise a highly lethal organisation strategically irrelevant. For any military organisation, the quality of its weapons systems is strategically meaningless if these weapons systems cannot be deployed for whatever reasons against the enemy where and when it matters the most.

    Understanding Computer Attacks

    It is in this light that the recent spate of computer attacks mentioned earlier ought to be regarded by RMA proponents and military planners as a source of potentially great concern. Computer hacking has traditionally been seen in terms of espionage – of seeking to gain access to otherwise classified information that might prove crucial to one’s own strategic efforts. This aspect has not gone away. It is entirely likely that the recent spate of Chinese hackings into various national networks was espionage, for the purposes of gathering information. This is a source of concern, although one should not overreact, since espionage is an unavoidable fact of international life. Basically all states conduct espionage activities against each other.

    What is the greater concern about these recent computer attacks is that it might presage a new approach to waging war. Given the centrality of computers and networks, the most powerful military organisation in the world can be rendered strategically impotent if its computer networks are shut down even for a few hours by a computer attack. It is generally well known, for instance, that the entire eastern seaboard of the USA can be shut down for several hours by a concerted attack against the key handful of nodes in the computer networks that control the power grids of that part of the country. The consequences of such a shutdown – economic, political and military – are only dimly comprehended. The worst case scenario is this: a concerted computer attack shuts down the nation’s early warning and monitoring facilities, rendering the military blind. Such a computer attack is then followed by a devastating military attack against the most important military assets, rendering the state now defenceless. The opponent then imposes its demands on the state, and in this blind and defenceless position, the state has no choice but to surrender.

    Ponder the Improbable

    This is a hypothetical scenario, something that probably remains within the realms of moviedom imagination. The point is this – we once considered the prospect of airplanes being deliberately flown into buildings to be the realm of pure fiction. This is no longer the case. Which means that the responsibility of policy makers and strategic planners is to ponder the improbable. However improbable it may seem, computer attacks may become the new way of warfare; it is something that all policy makers and strategic planners need to seriously consider.

    About the Author

    Bernard Fook Weng Loo is an Assistant Professor with the Institute of Defence and Strategic Studies at the Rajaratnam School of International Studies, Nanyang Technological University. He specialises in war and strategic studies. 

    Categories: RSIS Commentary Series / Global

    Commentary

    Computer networks are becoming the single most important aspect of modern nation-states. Government services, military organisations, economic activities, all are increasingly dependent on computer networks. The recent spate of computer attacks and hackings might presage a new approach to warfare, where states target the increasingly important – and vulnerable – parts of modern nation- states, namely the computer networks that virtually all aspects of national life depend fundamentally upon.

    IN 2007, TWO events have defined the changing face of warfare more than all the displays of precision weaponry on CNN and BBC since the 1991 Iraq war. The first was the Russian computer attacks against Estonian computer networks in May. The second was the Chinese computer attacks, this time hacking into American networks.

    The public face of the Revolution in Military Affairs – the RMA for short – has always been the iconic image of so-called ‘smart’ weapons hitting their targets with pinpoint accuracy. This public face masked what is the more important aspect of the RMA, which is the ever-increasing importance of computing and networking technologies in all aspects of military activities. However, muddled strategic thinking is preventing a proper appreciation of the prospects – and the problems – of the central role of these technologies in the RMA.

    Understanding the Centre of Gravity

    This muddled strategic thinking revolves around the centre of gravity, which was one of the most important concepts that the great German philosopher of war, Carl von Clausewitz, had proposed in his classic Vom Kriege (On War).

    Unfortunately, Clausewitz himself was not entirely clear as to what precisely this concept – the centre of gravity – meant. As a consequence, this lack of clarity results in the debates within strategic communities as to what it actually means, and what it refers to. Basically there are two ways by which we can think of this concept – either as a critical vulnerability, or as a source of strength and stability. The problem with this debate over the concept is that it fails to see a third way – that the centre of gravity is both a source of strength and stability as well as a critical vulnerability.

    Computer Networks as Centre of Gravity

    It is when we think of the centre of gravity as this potentially self-contradictory concept – as strength and vulnerability – that the centrality of computers and networks in the RMA becomes clear. Everything about this RMA depends fundamentally on computing and networking technologies. It is computing technologies that underpins the various aspects of the RMA. These include increased battlespace awareness through the employment of multiple arrays of different sensor technologies to gain a pervasive ability to monitor any and every aspect of the battlespace; precision guidance technologies that give weapons systems increasing lethality and renders the battlespace an increasingly dangerous environment to be in. Both aspects of the RMA create this situation for the opponent: to survive in the battlespace, the opponent needs to be both concealed and covered; any movement on his part will reveal his position to battlespace sensors, which will then result in the projection of very precise firepower onto his position, and almost guarantee his destruction and death.

    Secondly, it is networking technologies that allow for this battlespace awareness to be communicated throughout the organisation. More importantly, these allow for the joining of the different services – land, air and naval forces – into a cohesive whole whose power is greater than the sum of its individual parts. Networking allows for jointness in the military, and networked jointness promises force multiplier effects to unprecedented degrees. There used to be a clear divide between all three component forces – there were areas that were beyond the ability of naval, air or land forces to attack and destroy. Networked jointness allows any weapons platform to attack and destroy emerging enemy positions. Whereas in the past, it was quite common for an enemy position to become known, only to remain intact for lack of sufficient land or air force components to attack and destroy this position.

    The end result is a picture where the modern military organisation undergoing the RMA comes to depend fundamentally on both technologies. If either technology is rendered inoperable, for even a short period, it can bring what is a highly complex organisation to a grinding halt. In so doing, it can render what is otherwise a highly lethal organisation strategically irrelevant. For any military organisation, the quality of its weapons systems is strategically meaningless if these weapons systems cannot be deployed for whatever reasons against the enemy where and when it matters the most.

    Understanding Computer Attacks

    It is in this light that the recent spate of computer attacks mentioned earlier ought to be regarded by RMA proponents and military planners as a source of potentially great concern. Computer hacking has traditionally been seen in terms of espionage – of seeking to gain access to otherwise classified information that might prove crucial to one’s own strategic efforts. This aspect has not gone away. It is entirely likely that the recent spate of Chinese hackings into various national networks was espionage, for the purposes of gathering information. This is a source of concern, although one should not overreact, since espionage is an unavoidable fact of international life. Basically all states conduct espionage activities against each other.

    What is the greater concern about these recent computer attacks is that it might presage a new approach to waging war. Given the centrality of computers and networks, the most powerful military organisation in the world can be rendered strategically impotent if its computer networks are shut down even for a few hours by a computer attack. It is generally well known, for instance, that the entire eastern seaboard of the USA can be shut down for several hours by a concerted attack against the key handful of nodes in the computer networks that control the power grids of that part of the country. The consequences of such a shutdown – economic, political and military – are only dimly comprehended. The worst case scenario is this: a concerted computer attack shuts down the nation’s early warning and monitoring facilities, rendering the military blind. Such a computer attack is then followed by a devastating military attack against the most important military assets, rendering the state now defenceless. The opponent then imposes its demands on the state, and in this blind and defenceless position, the state has no choice but to surrender.

    Ponder the Improbable

    This is a hypothetical scenario, something that probably remains within the realms of moviedom imagination. The point is this – we once considered the prospect of airplanes being deliberately flown into buildings to be the realm of pure fiction. This is no longer the case. Which means that the responsibility of policy makers and strategic planners is to ponder the improbable. However improbable it may seem, computer attacks may become the new way of warfare; it is something that all policy makers and strategic planners need to seriously consider.

    About the Author

    Bernard Fook Weng Loo is an Assistant Professor with the Institute of Defence and Strategic Studies at the Rajaratnam School of International Studies, Nanyang Technological University. He specialises in war and strategic studies. 

    Categories: RSIS Commentary Series

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info