Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Network-Centric Warfare: How Navies Learned to Fight Smarter Through Three World Wars Hardcover – March 1, 2009
Top 20 lists in Books
View the top 20 best sellers of all time, the most reviewed books of all time and some of our editors' favorite picks. Learn more
Frequently Bought Together
Customers Who Bought This Item Also Bought
About the Author
More About the Author
Top Customer Reviews
The first phase is what he calls the [wireless] radio phase. This began in the first ten years of the 20th Century, when First Sea Lord, Sir John Fisher (of Dreadnaught fame) determined that the most economical way to deal with the problems facing the Royal Navy was to introduce what today would be called a centralized C2 system based on ocean surveillance, wireless communications, signals intelligence and what today are called flag plots (i.e. ship locations). Fisher then proposed to use the information produced by this system to vector ships against enemy naval threats. WWI (1914-1918) saw Fisher's concept tested and proven. Fisher essentially created the first command, control, communications , intelligence, surveillance and reconnaissance (C3ISR) system concept on which all future developments were based.
The U.S. Navy took the lead in Friedman's radar phase which really began in WWII and lasted through the Cold War.Read more ›
Friedman asserts the British Navy first showed the capability of Network Centric Warfare to process multiple intelligence systems during World War I. By combining two nascent intelligence capabilities -- direction finding & code breaking -- the British were able to locate the German fleet, thus solving one of the oldest problems of naval warfare (locating the adversary's fleet). Now that they had the ability to do that, the British were able to free up ships from blockade duty (they already knew where the adversary was, so they didn't need to look anywhere else). The Battle of Jutland was the acme of the application of Network Centric Warfare, where the British were able to anticipate the location of the German fleet before they sailed, and were therefore able to have their fleet in perfect position to "Cross the T."
Friedman then follows the natural evolution of the application of American intelligence collection & fusion through World War II, Vietnam, and the Gulf War.Read more ›
I will quibble about one thing...Friedman lays great stress on Moore's Law (that the cost of computing is halved every 18 months). This may be true, but it has become increasingly irrelevant. Software, not hardware, now drives networked systems. And software is much, much harder to create.
Most Recent Customer Reviews
Mr. Friedman's history of network-centric warfare is complete and informative. Drawing on early 20th century British methods through both world wars and the Cold War, Friedman... Read morePublished on April 23, 2010 by J. Scott Shipman