Command and influence

Last updated

Command and influence is a component of Military C2 ('Command and control') and is a key aspect of Terrorist Tactics, Techniques, and Procedures.

Contents

Definition

Chris Flaherty in 2003 distinguished the concept of command and influence is a component of Military C2 ('command and control'), in the following terms: "Influence, is fundamental to effective Command where forces manoeuvre. Thus, recognition of "Influence" is an important element in any future warfighting concept. As an alternative to relying on Command and Control (C2) based effective Command there should be utilization of command and "influence" (CI) based effective Command. [1] [2]

Role of influence in military theory

Notionally, 'influence' is definable as the effect of one person or thing on another. [3] In particular military information operations (IO) implicitly incorporates a variety of influence strategies, in order to shape the military and political spheres in conflict.

Relevance of Arquilla and Ronfeldt work

The work of John Arquilla and David Ronfeldt, on the netwar actor, [4] was used as the basis for developing the 'command and influence' model. In particular, their characterization of the network based organisation, as these routinely employ non-hierarchical based decision structures:

This later dictum clearly identifies 'Influence' as the enabling mechanism allowing actors/agents to disperse, devote to different tasks, as well as coordinate from a ground level up emulating operational centrality.

Relationship swarming tactics

Swarming attackers or defenders take advantage of any happenstance they can manipulate (to their own advantage); and are able to overcome coordination barriers, as these adopt the following strategies: [5]

Cohesive factors

The key command and influence cohesive factors, are:

Related Research Articles

An organizational structure defines how activities such as task allocation, coordination, and supervision are directed toward the achievement of organizational aims.

<span class="mw-page-title-main">Theory X and Theory Y</span> Theories of human motivation

Theory X and Theory Y are theories of human work motivation and management. They were created by Douglas McGregor while he was working at the MIT Sloan School of Management in the 1950s, and developed further in the 1960s. McGregor's work was rooted in motivation theory alongside the works of Abraham Maslow, who created the hierarchy of needs. The two theories proposed by McGregor describe contrasting models of workforce motivation applied by managers in human resource management, organizational behavior, organizational communication and organizational development. Theory X explains the importance of heightened supervision, external rewards, and penalties, while Theory Y highlights the motivating role of job satisfaction and encourages workers to approach tasks without direct supervision. Management use of Theory X and Theory Y can affect employee motivation and productivity in different ways, and managers may choose to implement strategies from both theories into their practices.

<span class="mw-page-title-main">Maneuver warfare</span> Military strategy focused on movement

Maneuver warfare, or manoeuvre warfare, is a military strategy which emphasizes movement, initiative and surprise to achieve a position of advantage. Maneuver seeks to inflict losses indirectly by envelopment, encirclement and disruption, while minimizing the need to engage in frontal combat. In contrast to attrition warfare where strength tends to be applied against strength, maneuver warfare attempts to apply strength against weakness in order to accomplish the mission.

Fourth-generation warfare (4GW) is conflict characterized by a blurring of the distinction between war and politics, and of the distinction between combatants and civilians.

Network-centric warfare, also called network-centric operations or net-centric warfare, is a military doctrine or theory of war that aims to translate an information advantage, enabled partly by information technology, into a competitive advantage through the computer networking of dispersed forces. It was pioneered by the United States Department of Defense in the 1990s.

<span class="mw-page-title-main">Terrorism Research Center</span> Non-profit think-tank

The Terrorism Research Center (TRC) is a non-profit think tank focused on investigating and researching global terrorism issues through multi-disciplinary collaboration amongst a group of international experts.

In military science, force multiplication or a force multiplier is a factor or a combination of factors that gives personnel or weapons the ability to accomplish greater feats than without it. The expected size increase required to have the same effectiveness without that advantage is the multiplication factor. For example, if a technology like GPS enables a force to accomplish the same results as a force five times as large without GPS, then the multiplier is five. Such estimates are used to justify the investment for force multipliers.

John Arquilla is an American analyst and academic of international relations.

Battlespace or battle-space is a term used to signify a military strategy which integrates multiple armed forces for the military theatre of operations, including air, information, land, sea, cyber and outer space to achieve military goals. It includes the environment, timeframe and other factors, and conditions that must be understood to successfully apply combat power, protect the force, or complete the mission. This includes enemy and friendly armed forces, infrastructure, weather, terrain, and the electromagnetic spectrum within the operational areas and areas of interest.

<span class="mw-page-title-main">Command and control</span> Military exercise of authority by a commanding officer over assigned forces

Command and control is a "set of organizational and technical attributes and processes ... [that] employs human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or enterprise, according to a 2015 definition by military scientists Marius Vassiliou, David S. Alberts, and Jonathan R. Agre. The term often refers to a military system.

Swarming is a battlefield tactic designed to maximize target saturation, and thereby overwhelm or saturate the defences of the principal target or objective. Defenders can overcome attempts at swarming by launching counter-swarming measures that are designed to neutralize or otherwise repel such attacks.

The following is a list of terms specific to anarchists. Anarchism is a political and social movement which advocates voluntary association in opposition to authoritarianism and hierarchy.

Tactics, Techniques, and Procedures (TTPs) is an essential concept in terrorism and cyber security studies. The role of TTPs in terrorism analysis is to identify individual patterns of behavior of a particular terrorist activity, or a particular terrorist organisation, and to examine and categorize more general tactics and weapons used by a particular terrorist activity, or a particular terrorist organisation.

<span class="mw-page-title-main">Rhizome manoeuvre</span> Urban warfare tactic

A rhizome manoeuvre is a surprise attack in a built environment, made from an unexpected direction, such as through a wall or floor. It is a key concept in contemporary warfare tactics, techniques, and procedures.

Three-Dimensional (3D) Tactics Analysis, is a tactical analysis methodology under the concept of Terrorist Tactics, Techniques, and Procedures, and is related to Rhizome Manoeuvre. The approach is applicable to urban combat, and takes into account mass gatherings of people located in highly complex urban structures, incorporating features such as multi-level buildings, open spaces between buildings, crowd congregation points, and transport hubs.

Mimicking operations is a tactical concept, developed under Terrorist Tactics, Techniques, and Procedures, to explain a form of deception, commonly used by terrorists in their attacks. The concept is commonly used in military tactical modelling and scientific simulation; and is connected to the idea of shielding friendly forces from detection and deception.

<span class="mw-page-title-main">Networked swarming warfare</span>

The concept of networked swarming warfare was first proposed by HUO Dajun in 2003. The key feature of the information age is the networking of organizational structure. The rising networked organization will overcome the limitation of traditional geography and link the operational resources distributed widely to form a military action network which combine strike range, speed and lethality, three elements of originally different developing, fundamentally transforming our idea of battle space. With the trend of decentralization of forces, we need to develop more small units with independent combat functions; meanwhile we can join these small units into a whole network as the technology's development. The warfare based on this network is called networked swarming warfare.

The Fifth Dimension of Warfare complements the four classical dimensions: land, sea, air, and space. It was enunciated in 1995 as information operations.

<span class="mw-page-title-main">Joint Deployable Analysis Team</span>

The Joint Deployable Analysis Team (JDAT) is part of the J6 Directorate of the Joint Chiefs of Staff.

David Ronfeldt is an American researcher known for his work on information-centric and network-centric warfare. He holds a doctoral degree from Stanford University and has been a prominent figure at the RAND Corporation.

References

  1. Flaherty, C.J. (2003) The Role of Command and Influence in Australian Multidimensional Manoeuvre Theory, Defence Force Journal. (162): 31-38. URL: http://www.adfjournal.adc.edu.au/UserFiles/issues/162%202003%20Sep_Oct.pdf Archived 2014-02-05 at the Wayback Machine
  2. Flaherty, C. (2010) Command, Influence and Information in 3D Tactics. Journal of Information Warfare. (9)1: 18-31.
  3. Flaherty, C. (2010) Command, Influence and Information in 3D Tactics. Journal of Information Warfare. (9)1: 18-31.
  4. Arquilla,J. Ronfeldt, D.F. (1996) The Advent of Netwar. RAND, Santa Monica, CA.
  5. Flaherty, C. (2012) Dangerous Minds: A Monograph on the Relationship Between Beliefs –Behaviours – Tactics. Published by OODA LOOP (7 September 2012). URL: http://www.oodaloop.com/security/2012/09/07/dangerous-minds-the-relationship-between-beliefs-behaviors-and-tactics/