Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Арзуманян Р., Сложное мышление и сеть парадигма нелинейности и среда безопасности 21 века

.pdf
Скачиваний:
17
Добавлен:
28.02.2021
Размер:
3.02 Mб
Скачать

ǹdzǶǮǵǶǭ ǴȃȀdzǭǵǰǭ ǰ ǹǭǺȄ: ǷǨǸǨǬǰǫǴǨ ǵǭdzǰǵǭDZǵǶǹǺǰ ǰ ǹǸǭǬǨ ǩǭǯǶǷǨǹǵǶǹǺǰ 21 ǪǭDzǨ

«ǫȖșțȌȈȘșȚȊȍ», ȗȖȧșȕȧȦȡȐȑ șȚȘȍȔȓȍȕȐȍ ȟȍȓȖȊȍȒȈ ȗȘȐȖȉȘȍșȚȐ ȏȕȈȕȐȧ Ȗȉ ȖȒȘțȎȈȦȡȍȔ ȔȐȘȍ Ȑ ȔȐȘȍ ȐȌȍȈȓȤȕȖȋȖ. ǿȍȓȖȊȍȒ ș șȈȔȖȋȖ ȘȖȎȌȍȕȐȧ ȕȈȝȖȌȐȚșȧ Ȋ ȗȍȡȍȘȍ Ȑ ȕȍ ȐȔȍȍȚ ȊȖȏȔȖȎȕȖșȚȐ ȊȐȌȍȚȤ «ȘȍȈȓȤȕȣȑ ȔȐȘ», ȕȖ ȚȖȓȤȒȖ ȚȍȕȐ, ȒȖȚȖȘȣȍ ȚȖȚ ȖȚȉȘȈșȣȊȈȍȚ ȕȈșȚȍȕț ȍȋȖ ȗȍȡȍȘȣ1. ǨȕȈȓȖȋȐȟȕȣȔ ȖȉȘȈȏȖȔ șȖȖȚȕȖșȐȚșȧ șȜȖȘȔȐȘȖȊȈȕȕȈȧ ȕȈ ȖșȕȖȊȍ ȌȈȕȕȣȝ șȐșȚȍȔ ȘȈȏȊȍȌȒȐ Ȑ ȕȈȉȓȦȌȍȕȐȧ ȖȗȍȘȈȞȐȖȕȕȈȧ ȒȈȘȚȐȕȈ ș ȊȖȍȕȕȖȑ ȘȍȈȓȤȕȖșȚȤȦ, ȕȈ ȒȖȚȖȘțȦ ȒȖȔȈȕȌȖȊȈȕȐȍ ȊȣȕțȎȌȍȕȖ șȔȖȚȘȍȚȤ șȒȊȖȏȤ ȗȘȐȏȔț ȚȍȝȕȐȟȍșȒȐȝșȐșȚȍȔ, ȈȏȕȈȟȐȚ, ȐȖȋȘȈȕȐȟȍȕȐȑ, ȒȖȚȖȘȣȍȖȕȐȐȔȍȦȚ.

ǶȗȘȍȌȍȓȍȕȕțȦ ȗȖȓȕȖȚț Ȗȉȡȍȑ ȒȈȘȚȐȕȣ ȔȖȎȕȖ ȖȉȍșȗȍȟȐȚȤ ȟȍȘȍȏ ȗȘȐȊȓȍȟȍȕȐȍ ȔȕȖȎȍșȚȊȈ ȚȍȝȕȐȟȍșȒȐȝ șȐșȚȍȔ, Ȑ Ȋ ȥȚȖȔ șȓțȟȈȍ ȉȖȓȤȠțȦ ȘȖȓȤ ȐȋȘȈȍȚ șȗȖșȖȉȕȖșȚȤ ȖȉȍșȗȍȟȐȚȤ ȉȈȓȈȕș Ȋ Ȑȝ ȐșȗȖȓȤȏȖȊȈȕȐȐ, Ȉ ȚȈȒȎȍ ȒȖȘȘȍȒȚȕȈȧ ȕȈȞȍȓȍȕȕȖșȚȤ șȐșȚȍȔ ȕȈ ȖȉȕȈȘțȎȍȕȐȍ Țȍȝ ȐȓȐ Ȑȕȣȝ ȖȉȢȍȒȚȖȊ Ȑ șȖȉȣȚȐȑ. Ǫ șȊȖȦ ȖȟȍȘȍȌȤ ȥȚȖ ȊȖ ȔȕȖȋȖȔ ȏȈȊȐșȐȚ ȖȚ ȚȖȋȖ, ȟȚȖ ȖȎȐȌȈȍȚșȧ țȊȐȌȍȚȤ ȐȓȐ ȖȉȕȈȘțȎȐȚȤ. ǺȍȔ șȈȔȣȔ, ȒȈȒ Ȑ Ȋ șȓțȟȈȍ ȟȍȓȖȊȍȒȈ Ȋ ȗȍȡȍȘȍ, ȉȖȓȤȠȖȍ ȏȕȈȟȍȕȐȍ ȗȘȐȖȉȘȍȚȈȍȚ ȊȕțȚȘȍȕȕȍȍ ȊȐȌȍȕȐȍ ȖȗȍȘȈȞȐȖȕȕȖȑ ȒȈȘȚȐȕȣ ȗȘȐȕȐȔȈȦȡȐȔ ȘȍȠȍȕȐȍ – ȚȈ ȋȐȗȖȚȍȏȈ, ȊȖȒȘțȋ ȒȖȚȖȘȖȑ ȖȕȈ ȜȖȘȔȐȘțȍȚșȧ. ǰȔȍȕȕȖ ȖȕȈ ȊȖ ȔȕȖȋȖȔ ȖȗȘȍȌȍȓȧȍȚ, ȒȈȒȐȍ ȐșȚȖȟȕȐȒȐ ȐȕȜȖȘȔȈȞȐȐ ȉțȌțȚ ȗȘȐȊȓȍȟȍȕȣ, țȌȍȓȤȕȣȑ Ȋȍș ȐșȚȖȟȕȐȒȖȊ Ȑ Ț.Ȍ. ǰșȚȖȘȐȧ ȌȈȍȚ ȔȕȖȎȍșȚȊȖ ȗȘȐȔȍȘȖȊ ȗȖȘȈȏȐȚȍȓȤȕȖȑ șȓȍȗȖȚȣ ȒȖȔȈȕȌțȦȡȐȝ, ȕȍ șȗȖșȖȉȕȣȝ ȊȖșȗȘȐȕȧȚȤ ȐȕȜȖȘȔȈȞȐȦ, ȕȍ țȒȓȈȌȣȊȈȦȡțȦșȧ Ȋ țȎȍ șȜȖȘȔȐȘȖȊȈȕȕȖȍ ȊȐȌȍȕȐȍ ȖȗȍȘȈȞȐȖȕȕȖȑ ȒȈȘȚȐȕȣ. Ǫ ȌȈȕȕȖȔ șȓțȟȈȍ ȗȘȖȞȍșșȣ ȖȒȈȏȣȊȈȦȚșȧ ȕȈ ȋȘȈȕȐȞȍ, ȖȚȌȍȓȧȦȡȍȑ ȐȕȜȖȘȔȈȞȐȖȕȕȣȑ ȌȖȔȍȕ, Ȋ ȒȖȚȖȘȖȔ ȗȘȖȐșȝȖȌȐȚ șȉȖȘ Ȑ ȖȉȘȈȉȖȚȒȈ ȐȕȜȖȘȔȈȞȐȐ, ȖȚ ȒȖȋȕȐȚȐȊȕȖȋȖ, Ȋ ȒȖȚȖȘȖȔ ȗȘȖȐșȝȖȌȐȚ ȍȍ ȖșȔȣșȓȍȕȐȍ, ȋȖȚȖȊȧȚșȧ Ȑ ȗȘȐȕȐȔȈȦȚșȧ ȘȍȠȍȕȐȧ2.

ǸȈșșȔȖȚȘȍȕȕȣȍ ȊȣȠȍ ȚȍȝȕȐȟȍșȒȐȍ șȐșȚȍȔȣ ȕȈȉȓȦȌȍȕȐȧ Ȑ ȘȈȏȊȍȌȒȐ ȖȘȐȍȕȚȐȘțȦȚșȧ ȕȈ ȌȖșȚȈȚȖȟȕȖ țȏȒȐȑ șȍȒȚȖȘ ȜȐȏȐȟȍșȒȖȋȖ Ȑ ȐȕȜȖȘȔȈȞȐȖȕȕȖȋȖ ȌȖȔȍȕȖȊ Ȑ ȐșȗȖȓȤȏțȦȚșȧ ȕȈ ȖȗȍȘȈȞȐȖȕȕȖȔ țȘȖȊȕȍ ȊȖȑȕȣ. DzȘȖȔȍ ȚȖȋȖ, ȚȍȝȕȐȟȍșȒȐȍ șȐșȚȍȔȣ Ȋ ȏȕȈȟȐȚȍȓȤȕȖȑ șȚȍȗȍȕȐ ȐȋȕȖȘȐȘțȦȚ ȐȕȜȖȘȔȈȞȐȦ, ȗȖȓțȟȈȍȔțȦ ȖȚ ȓȦȌȍȑ (human information), ȚȖ ȍșȚȤ ȌȈȕȕȣȍ Ȑ ȐȕȜȖȘȔȈȞȐȦ, ȋȌȍ Ȋ ȒȈȟȍșȚȊȍ ȐșȚȖȟȕȐȒȈ ȊȣșȚțȗȈȍȚ ȟȍȓȖȊȍȒ3. ǵȈ ȚȈȒȚȐȟȍșȒȖȔ țȘȖȊȕȍ ȖȕȈ ȔȖȎȍȚ ȗȖșȚțȗȈȚȤ ȖȚ ȈȘȔȍȑșȒȖȑ ȘȈȏȊȍȌȒȐ ȐȓȐ ȔȍșȚȕȖȋȖ ȕȈșȍȓȍȕȐȧ. ǵȈ ȖȗȍȘȈȞȐȖȕȕȖȔ Ȑ ȊȖȍȕȕȖșȚȘȈȚȍȋȐȟȍșȒȖȔ țȘȖȊȕȧȝ ȒȖȕȜȓȐȒȚȈ – ȖȚ ȈȋȍȕȚțȘȕȖȑ șȍȚȐ, ȖȘȋȈȕȖȊ ȊȖȍȕȕȖȑ ȘȈȏȊȍȌȒȐ. ǵȈ ȕȈȞȐȖȕȈȓȤȕȖȔ Ȑ ȋȍȖșȚȘȈȚȍȋȐȟȍșȒȖȔ țȘȖȊȕȍ – ȖȚ ȋȖșțȌȈȘșȚȊȍȕȕȣȝ ȖȘȋȈȕȖȊ, ȗȖȓȐȚȐȟȍșȒȖȋȖ ȘțȒȖȊȖȌșȚȊȈ, ȔȍȎȌțȕȈȘȖȌȕȣȝ ȖȘȋȈȕȐȏȈȞȐȑ Ȑ ȗȘ. ǰȕȜȖȘȔȈȞȐȧ ȖȚ ȟȍȓȖȊȍȒȈ ȗȖ șȊȖȍȑ ȗȘȐȘȖȌȍ ȕȍȖȌȕȖȏȕȈȟȕȈ Ȑ ȚȘȍȉțȍȚ ȈȕȈȓȐȚȐȟȍșȒȖȑ ȖȞȍȕȒȐ, ȒȖȋȌȈ ȉȖȓȤȠțȦ ȘȖȓȤ ȐȋȘȈȍȚ ȊȖșȗȘȐȧȚȐȍ, ȔȣȠȓȍȕȐȍ Ȑ șțȎȌȍȕȐȍ ȈȕȈȓȐȚȐȒȈ – ȒȖȋȕȐȚȐȊȕȣȍ ȗȘȖȞȍșșȣ, ȒȖȚȖȘȣȍ ȗȖȚȍȕȞȐȈȓȤȕȖ ȔȖȋțȚ ȉȣȚȤ ȒȈȒ ȖȟȍȕȤ

1 ǷȓȈȚȖȕ, ǫȖșțȌȈȘșȚȊȖ // ǹȖȟȐȕȍȕȐȧ Ȋ 3-ȝ Ț. – Ǵ.,1971. Ǻ.3, ȟ.1, ș. 321.

2 Smith, Effects Based Operations, pp. 165-167. 3 Ibid, pp. 170-171.

251

ǸȈȟȤȧ ǨǸǯǻǴǨǵȇǵ

ȗȘȖșȚȣȔȐ, ȒȈȒ ȍȎȍȌȕȍȊȕȣȑ ȔȖȕȐȚȖȘȐȕȋ ȘȈȑȖȕȈ ȗȈȚȘțȓȐȘȖȊȈȕȐȧ, ȚȈȒ Ȑ ȒȘȐȚȐȟȍșȒȐ șȓȖȎȕȣȔ, ȒȈȒ Ȋ șȓțȟȈȍ ȗȘȐȕȧȚȐȧ ȘȍȠȍȕȐȧ Ȗ ȕȈȟȈȓȍ ȊȖȑȕȣ. ǰ ȊȕȖȊȤ ȗȘȖȞȍșșȣ ȖȒȈȏȣȊȈȦȚșȧ ȕȈ ȋȘȈȕȐȞȍ ȐȕȜȖȘȔȈȞȐȖȕȕȖȋȖ Ȑ ȒȖȋȕȐȚȐȊȕȖȋȖ ȌȖȔȍȕȖȊ.

ǷȖȔȐȔȖ ȘȈșșȔȖȚȘȍȕȕȣȝ ȗȘȖȞȍșșȖȊ șȉȖȘȈ, ȖȉȘȈȉȖȚȒȐ Ȑ ȘȈșȗȘȖșȚȘȈȕȍȕȐȧ ȐȕȜȖȘȔȈȞȐȐ Ȍȓȧ ȖȉȔȍȕȈ șȐȚțȈȞȐȖȕȕȖȑ ȖșȊȍȌȖȔȓȍȕȕȖșȚȤȦ, ȐȕȜȖȘȔȈȞȐȖȕȕȣȑ ȌȖȔȍȕ ȖȝȊȈȚȣȊȈȍȚ Ȋșȍ ȔȍȚȖȌȣ Ȑ șȘȍȌșȚȊȈ ȗȍȘȍȌȈȟȐ ȘȍȠȍȕȐȑ, ȗȓȈȕȖȊ Ȑ ȗȘȐȒȈȏȖȊ, ȒȖȚȖȘȣȍ ȚȘȈȕșȓȐȘțȦȚ ȈȒȚȐȊȕȖșȚȤ ȒȖȋȕȐȚȐȊȕȖȋȖ ȌȖȔȍȕȈ Ȋ ȜȐȏȐȟȍșȒȐȍ ȌȍȑșȚȊȐȧ1.

DzȖȋȕȐȚȐȊȕȣȑ ȌȖȔȍȕ. ǬȖȔȍȕ, Ȋ ȒȖȚȖȘȖȔ ȘȈșșȔȈȚȘȐȊȈȦȚșȧ ȔȣșȓȐȚȍȓȤȕȣȍ ȗȘȖȞȍșșȣ Ȑ ȕȍȔȈȚȍȘȐȈȓȤȕȣȍ ȈȒȚȐȊȣ ȒȖȔȈȕȌȖȊȈȕȐȧ – ȗȘȖȉȓȍȔȣ ȔȖȘȈȓȐ Ȑ ȉȖȍȊȖȋȖ ȌțȝȈ, țȘȖȊȍȕȤ Ȑ ȗȖȓȕȖȚȈ ȉȖȍȊȖȑ ȗȖȌȋȖȚȖȊȒȐ, ȉȖȍȊȖȑ ȖȗȣȚ ȊȖȖȘțȎȍȕȕȣȝ șȐȓ Ȑ ȋȖșțȌȈȘșȚȊȈ Ȑ Ț.Ȍ. Ǫ ȕȍȋȖ ȚȘȈȕșȓȐȘțȦȚșȧ Ȑ ȗȖȓțȟȈȦȚ șȊȖȍ ȖȚȖȉȘȈȎȍȕȐȍ ȗȘȖȞȍșșȣ ȊȖșȗȘȐȧȚȐȧ Ȑ ȖșȔȣșȓȍȕȐȧ șȐȚțȈȞȐȐ, ȏȌȍșȤ ȗȘȖȐșȝȖȌȐȚ ȖȞȍȕȒȈ ȈȓȤȚȍȘȕȈȚȐȊ Ȑ ȗȘȐȕȐȔȈȦȚșȧ ȘȍȠȍȕȐȧ. Dz ȒȖȋȕȐȚȐȊȕȖȔț ȌȖȔȍȕț ȖȚȕȖșȧȚșȧ ȚȈȒȎȍ ȒȖȕȞȍȗȞȐȐ Ȑ ȌȖȒȚȘȐȕȣ, șȚȘȈȚȍȋȐȧ Ȑ ȚȈȒȚȐȒȈ ȊȖȖȘțȎȍȕȕȣȝ șȐȓ Ȑ ȗȘ. ǷȘȖȞȍșșȣ ȒȖȋȕȐȚȐȊȕȖȋȖ ȌȖȔȍȕȈ ȔȖȋțȚ ȉȣȚȤ ȘȈȏȌȍȓȍȕȣ ȕȈ ȌȊȈ ȉȖȓȤȠȐȝ ȒȓȈșșȈ, Ȉ șȈȔ ȌȖȔȍȕ ȗȘȍȌșȚȈȊȓȍȕ Ȋ ȒȈȟȍșȚȊȍ ȌȊțȝ șțȉȌȖȔȍȕȖȊ. ǷȍȘȊȣȑ ȖȝȊȈȚȣȊȈȍȚ ȗȘȖȞȍșșȣ, ȗȘȖȚȍȒȈȦȡȐȍ Ȋ ȖȉȓȈșȚȐ șȖȏȕȈȚȍȓȤȕȖȋȖ (ȘȈȞȐȖȕȈȓȤȕȣȑ șțȉȌȖȔȍȕ), ȊȚȖȘȖȑ – ȗȖȌșȖȏȕȈȚȍȓȤȕȖȋȖ (șțȉȌȖȔȍȕ ȊȍȘȖȊȈȕȐȑ)2.

ǷȘȐ ȖȉșțȎȌȍȕȐȐ ȗȘȖȉȓȍȔȣ șȐșȚȍȔ ȕȈȉȓȦȌȍȕȐȧ Ȑ ȘȈȏȊȍȌȒȐ Ȋ ȐȕȜȖȘȔȈȞȐȖȕȕȖȔ ȌȖȔȍȕȍ ȋȖȊȖȘȐȓȖșȤ Ȗ ȕȍȖȉȝȖȌȐȔȖșȚȐ ȌȖșȚȐȎȍȕȐȧ ȉȈȓȈȕșȈ Ȋ ȐșȚȖȟȕȐȒȈȝ Ȑ ȖȉȢȍȔȈȝ ȐȕȜȖȘȔȈȞȐȐ Ȍȓȧ ȗȘȐȕȧȚȐȧ ȈȌȍȒȊȈȚȕȣȝ Ȑ ȥȜȜȍȒȚȐȊȕȣȝ ȘȍȠȍȕȐȑ. ǺȍȔ ȕȍ Ȕȍȕȍȍ ȚȈȒȖȋȖ ȘȖȌȈ ȗȘȖȉȓȍȔȣ ȖȚȕȖșȧȚșȧ șȒȖȘȍȍ Ȓ ȖȉȓȈșȚȐ ȐȕȎȍȕȍȘȕȖȑ ȗșȐȝȖȓȖȋȐȐ Ȑ ȔȖȋțȚ ȉȣȚȤ ȖȚȕȖșȐȚȍȓȤȕȖ ȓȍȋȒȖ ȘȍȠȍȕȣ. ǸȍȈȓȤȕȣȑ ȊȣȏȖȊ ȏȈȒȓȦȟȈȍȚșȧ Ȋ ȗȖȕȐȔȈȕȐȐ Ȑ ȜȖȘȔȈȓȐȏȈȞȐȐ ȗȘȖȞȍșșȈ ȗȘȐȕȧȚȐȧ ȘȍȠȍȕȐȧ: ȒȈȒ ȗȘȐȕȐȔȈȦȡȐȑ ȘȍȠȍȕȐȍ ȊȖșȗȘȐȕȐȔȈȍȚ Ȑ ȖșȔȣșȓȐȊȈȍȚ ȌȍȑșȚȊȐȧ Ȋ ȜȐȏȐȟȍșȒȖȔ ȌȖȔȍȕȍ ȗȖ ȒȈȘȚȐȕȍ, șȒȓȈȌȣȊȈȦȡȍȑșȧ Ȋ ȐȕȜȖȘȔȈȞȐȖȕȕȖȔ Ȑ șȖȞȐȈȓȤȕȖȔ ȌȖȔȍȕȈȝ, ȒȈȒȐȔ ȖȉȘȈȏȖȔ ȖȞȍȕȐȊȈȍȚ ȊȖȏȔȖȎȕȣȍ ȈȓȤȚȍȘȕȈȚȐȊȣ Ȑ ȗȘȐȕȐȔȈȍȚ ȘȍȠȍȕȐȍ. ǴȕȖȋȖȟȐșȓȍȕȕȣȍ ȐșșȓȍȌȖȊȈȕȐȧ ȗȖȒȈȏȣȊȈȦȚ, ȟȚȖ ȗȘȖȞȍșș ȗȘȐȕȧȚȐȧ ȘȍȠȍȕȐȧ ȕȍȘȈȏȘȣȊȕȖ șȊȧȏȈȕ ș ȓȐȟȕȖșȚȤȦ, ȍȍ ȥȔȖȞȐȖȕȈȓȤȕȖȑ Ȑ ȜȐȏȐȖȓȖȋȐȟȍșȒȖȑ ȒȖȕșȚȐȚțȞȐȍȑ3. ǷȘȐȕȐȔȈȦȡȐȑ ȘȍȠȍȕȐȍ Ȋ ȒȘȐȚȐȟȍșȒȐȝ țșȓȖȊȐȧȝ ȌȍȑșȚȊțȍȚ șȒȖȘȍȍ ȗȖ ȈȕȈȓȖȋȐȐ, ȕȍȎȍȓȐ «ȊȣȟȐșȓȧȍȚ» ȘȍȠȍȕȐȍ, ȖȗȐȘȈȧșȤ ȗȘȐ ȥȚȖȔ ȕȈ ȓȐȟȕȣȑ Ȑ ȒȖȓȓȍȒȚȐȊȕȣȑ ȖȗȣȚ, ȗȘȖȞȍșșȣ, ȗȘȖȚȍȒȈȦȡȐȍ Ȋ șȜȍȘȍ ȉȍșșȖȏȕȈȚȍȓȤȕȖȋȖ4. ȅȚȖ ȖȏȕȈȟȈȍȚ, ȟȚȖ ȘȍȓȐȋȐȧ, ȒțȓȤȚțȘȈ, ȐȌȍȖȓȖȋȐȧ, ȏȕȈȕȐȧ Ȑ ȖȗȣȚ, ȖȉȘȈȏȖȊȈȕȐȍ Ȑ șȜȖȘȔȐȘȖȊȈȕȕȣȍ ȐȔ Ȕȍȕ-

1 Cebrowski, The Implementation of Network-Centric Warfare, p. 20. 2 Smith, Effects Based Operations, p. 173.

3 Klein, Gary. "Strategies of Decision Making," Military Review, May 1989, pp. 56-64. http://handle.dtic.mil/100.2/ADA226146.

4 Czerwinski, Coping with the Bounds, pp. 165-182.

252

ǹdzǶǮǵǶǭ ǴȃȀdzǭǵǰǭ ǰ ǹǭǺȄ: ǷǨǸǨǬǰǫǴǨ ǵǭdzǰǵǭDZǵǶǹǺǰ ǰ ǹǸǭǬǨ ǩǭǯǶǷǨǹǵǶǹǺǰ 21 ǪǭDzǨ

ȚȈȓȤȕȣȍ ȔȖȌȍȓȐ ȧȊȓȧȦȚșȧ ȒȘȐȚȐȟȕȣȔȐ ȥȓȍȔȍȕȚȈȔȐ ȒȖȋȕȐȚȐȊȕȖȋȖ ȗȘȖȞȍșșȈ. DzțȓȤȚțȘȈ ȗȘȐȕȧȚȐȧ ȘȍȠȍȕȐȧ, ȕȈȗȘȐȔȍȘ, ȖȒȈȏȣȊȈȍȚ ȘȍȠȈȦȡȍȍ ȊȖȏȌȍȑșȚȊȐȍ Ȋ ȚȖȔ, ȒȈȒȐȔ șȐșȚȍȔȈȔ ȕȈȉȓȦȌȍȕȐȧ Ȑ ȐșȚȖȟȕȐȒȈȔ ȐȕȜȖȘȔȈȞȐȐ ȖȚȌȈȍȚșȧ ȗȘȍȌȗȖȟȚȍȕȐȍ Ȑ ȒȈȒȐȔ ȖȉȘȈȏȖȔ ȐȕȜȖȘȔȈȞȐȧ ȚȘȈȕșȓȐȘțȍȚșȧ Ȋ ȖșȔȣșȓȍȕȐȍ șȐȚțȈȞȐȐ. ǭșȓȐ ȒȖȋȕȐȚȐȊȕȣȑ ȌȖȔȍȕ ȕȍȈȌȍȒȊȈȚȍȕ, ȊȖșȗȘȐȧȚȐȍ Ȑ ȖșȔȣșȓȍȕȐȍ șȐȚțȈȞȐȐ ȖșȚȈȍȚșȧ ȐșȒȈȎȍȕȕȣȔ, Ȋȕȍ ȏȈȊȐșȐȔȖșȚȐ ȖȚ ȖȉȢȍȔȈ Ȑ ȒȈȟȍșȚȊȈ ȐȕȜȖȘȔȈȞȐȐ. ǺȈȒȖȍ ȔȖȎȍȚ ȗȘȖȐȏȖȑȚȐ, ȍșȓȐ ȗȘȐȕȐȔȈȦȡȐȑ ȘȍȠȍȕȐȍ ȗȓȖȝȖ ȗȘȍȌșȚȈȊȓȧȍȚ șȍȉȍ ȊȕȍȠȕȐȑ ȔȐȘ ȐȓȐ ȐȌȍȖȓȖȋȐȟȍșȒȐ ȏȈȠȖȘȍȕ1.

ǹȖȞȐȈȓȤȕȣȑ ȌȖȔȍȕ. Ǫ ȖȚȓȐȟȐȍ ȖȚ ȒȖȋȕȐȚȐȊȕȖȋȖ ȌȖȔȍȕȈ, șȖșȘȍȌȖȚȈȟȐȊȈȦȡȍȋȖșȧ ȕȈ ȗȘȖȞȍșșȈȝ, ȗȘȖȚȍȒȈȦȡȐȝ ȊȕțȚȘȐ ȓȐȟȕȖșȚȐ, șȖȞȐȈȓȤȕȣȑ ȌȖȔȍȕ ȘȈșșȔȈȚȘȐȊȈȍȚ ȗȘȖȞȍșșȣ, ȒȈșȈȦȡȐȍșȧ șȖȞȐȈȓȤȕȣȝ ȈșȗȍȒȚȖȊ Ȑ ȖȚȕȖȠȍȕȐȑ Ȋ ȖȘȋȈȕȐȏȈȞȐȧȝ. ǹȖȞȐȈȓȤȕȣȑ ȌȖȔȍȕ ȚȈȒȎȍ ȚȍșȕȖ șȊȧȏȈȕ ș ȒțȓȤȚțȘȖȑ, ȖȉȡȍșȚȊȍȕȕȣȔȐ ȞȍȕȕȖșȚȧȔȐ Ȑ ȖȚȕȖȠȍȕȐȧȔȐ, ȘȍȓȐȋȐȖȏȕȖȑ șȐșȚȍȔȖȑ ȖȉȡȍșȚȊȈ Ȑ ȕȈȒȓȈȌȣȊȈȍȚșȧ ȕȈ ȐȕȜȖȘȔȈȞȐȖȕȕȣȑ Ȑ ȒȖȋȕȐȚȐȊȕȣȑ. ǰ ȍșȓȐ ȒȖȋȕȐȚȐȊȕȈȧ ȈȒȚȐȊȕȖșȚȤ ȗȖ șȊȖȍȑ ȗȘȐȘȖȌȍ ȧȊȓȧȍȚșȧ ȐȕȌȐȊȐȌțȈȓȤȕȖȑ Ȑ ȗȘȖȚȍȒȈȍȚ ȊȕțȚȘȐ ȓȐȟȕȖșȚȐ, ȚȖ ȖȉȔȍȕ șȐȚțȈȞȐȖȕȕȖȑ ȖșȊȍȌȖȔȓȍȕȕȖșȚȤȦ, ȜȖȘȔȐȘȖȊȈȕȐȍ ȖșȔȣșȓȍȕȐȧ Ȑ ȗȘȐȕȧȚȐȍ ȘȍȠȍȕȐȧ ȧȊȓȧȍȚșȧ șȖȞȐȖ-ȒȖȋȕȐȚȐȊȕȖȑ ȈȒȚȐȊȕȖșȚȤȦ, Ȋ ȒȖȚȖȘȖȑ ȒȖȋȕȐȚȐȊȕȣȍ ȌȍȑșȚȊȐȧ ȓȐȟȕȖșȚȐ ȟȍȘȍȏ ȊȏȈȐȔȖȌȍȑșȚȊȐȍ Ȑ ȖȉȔȍȕ ȕȍȗȖșȘȍȌșȚȊȍȕȕȖ ȊȖȏȌȍȑșȚȊțȦȚ ȕȈ șȖȞȐȈȓȤȕțȦ ȗȘȐȘȖȌț Ȑ ȌȖȓȎȕȣ ȉȣȚȤ ȖȚȕȍșȍȕȣ Ȓ ȋȘȈȕȐȞȍ șȖȞȐȈȓȤȕȖȋȖ Ȑ ȒȖȋȕȐȚȐȊȕȖȋȖ ȌȖȔȍȕȖȊ2.

ǺȈȒȐȔ ȖȉȘȈȏȖȔ, ȗȍȘȍșȍȟȍȕȐȧ ȌȖȔȍȕȖȊ ȜȖȘȔȐȘțȦȚ ȊȈȎȕȣȍ ȌȐȕȈȔȐȟȍșȒȐȍ ȖȉȓȈșȚȐ, ȕțȎȌȈȦȡȐȍșȧ Ȋ ȐșșȓȍȌȖȊȈȕȐȐ (ǸȐș. 11). DzȘȐȚȐȟȍșȒȐ ȊȈȎȕȈȧ Ȍȓȧ ȗȘȖȊȍȌȍȕȐȧ țșȗȍȠȕȣȝ ȖȉȢȍȌȐȕȍȕȕȣȝ ȖȗȍȘȈȞȐȑ șȗȖșȖȉȕȖșȚȤ ȊȖȖȘțȎȍȕȕȣȝ șȐȓ ȌȍȑșȚȊȖȊȈȚȤ ȉȣșȚȘȖ Ȑ ȚȖȟȕȖ, ȗȘȐȔȍȕȧȧ ȊȍșȤ ȕȈȉȖȘ ȊȖȏȔȖȎȕȖșȚȍȑ Ȑ șȘȍȌșȚȊ șȍȚȍȞȍȕȚȘȐȟȕȣȝ ȊȖȑȕ, ȖȉȍșȗȍȟȐȊȈȍȚșȧ ȕȈ ȗȍȘȍșȍȟȍȕȐȐ ȐȕȜȖȘȔȈȞȐȖȕȕȣȝ Ȑ ȜȐȏȐȟȍșȒȐȝ ȌȖȔȍȕȖȊ. ǶȉȔȍȕ șȐȚțȈȞȐȖȕȕȖȑ ȖșȊȍȌȖȔȓȍȕȕȖșȚȤȦ Ȑ ȚȈȒȚȐȟȍșȒȐȍ ȐȕȕȖȊȈȞȐȐ ȖȉȍșȗȍȟȐȊȈȦȚșȧ ȕȈ ȗȍȘȍșȍȟȍȕȐȐ ȐȕȜȖȘȔȈȞȐȖȕȕȖȋȖ Ȑ ȒȖȋȕȐȚȐȊȕȖȋȖ ȌȖȔȍȕȖȊ. ǵȈ ȗȍȘȍșȍȟȍȕȐȐ ȜȐȏȐȟȍșȒȖȋȖ Ȑ ȒȖȋȕȐȚȐȊȕȖȋȖ ȌȖȔȍȕȖȊ ȖȉȍșȗȍȟȐȊȈȍȚșȧ șȎȐȔȈȕȐȍ ȊȘȍȔȍȕȐ Ȑ șȎȈȚȣȍ ȖȗȍȘȈȞȐȐ, ȒȖȋȌȈ ȚȈȒȚȐȒȈ ȗȖȓțȟȈȍȚ ȊȖȏȔȖȎȕȖșȚȤ ȗȘȖȐȏȊȖȌȐȚȤ ȖȗȍȘȈȞȐȖȕȕȣȍ Ȑ ȌȈȎȍ șȚȘȈȚȍȋȐȟȍșȒȐȍ ȥȜȜȍȒȚȣ. ǶȉȓȈșȚȤ ȚȍȖȘȐȐ ǹǾǪ ȕȈȝȖȌȐȚșȧ ȞȍȕȚȘȍ, ȋȌȍ ȗȍȘȍșȍȒȈȦȚșȧ Ȋșȍ ȟȍȚȣȘȍ ȌȖȔȍȕȈ3.

1 Smith, Effects Based Operations, pp. 174-177.

2 Cebrowski, The Implementation of Network-Centric Warfare, p. 20. 3 Ibid, p. 21.

253

ǸȈȟȤȧ ǨǸǯǻǴǨǵȇǵ

2.4 DzȖȕȞȍȗȚțȈȓȤȕȣȑ ȜȘȍȑȔ șȍȚȍȞȍȕȚȘȐȟȕȣȝ ȖȗȍȘȈȞȐȑ

2.4.1 ǹȍȚȍȞȍȕȚȘȐȟȕȣȍ ȖȗȍȘȈȞȐȐ. DzȖȕȞȍȗȞȐȧ șȍȚȍȞȍȕȚȘȐȟȕȣȝ ȖȗȍȘȈȞȐȑ ȖȉȍșȗȍȟȐȊȈȍȚ ȗȘȐȔȍȕȍȕȐȍ ȖșȕȖȊȕȣȝ ȗȘȐȕȞȐȗȖȊ Ȑ ȘțȒȖȊȖȌȧȡȐȝ ȗȘȈȊȐȓ ȚȍȖȘȐȐ ǹǾǪ Ȓ ȊȖȍȕȕȣȔ ȖȗȍȘȈȞȐȧȔ ȕȈ ȊșȍȔ șȗȍȒȚȘȍ ȒȖȕȜȓȐȒȚȈ: ȖȚ ȔȐȘȈ – Ȓ ȒȘȐȏȐșț, ȊȖȑȕȍ Ȑ șȚȈȉȐȓȐȏȈȞȐȐ. ǷȍȘȊȣȍ ȥȒșȗȍȘȐȔȍȕȚȣ ǪǴǼ ǹȀǨ ș șȍȚȍȞȍȕȚȘȐȟȕȣȔȐ ȖȗȍȘȈȞȐȧȔȐ ȖȚȕȖșȧȚșȧ Ȓ ȒȖȕȞț 80-ȣȝ, ȒȖȋȌȈ ȉȣȓȈ ȘȈȏȘȈȉȖȚȈȕȈ Ȑ ȕȈȟȈȓȈ ȚȍșȚȐȘȖȊȈȚȤșȧ șȐșȚȍȔȈ șȐșȚȍȔ «ǹȗȖșȖȉȕȖșȚȤ Ȓ șȖȊȔȍșȚȕȖȔț ȉȖȦ» (Cooperative Engagement Capability (CEC)1), șȖȍȌȐȕȐȊȠȈȧ șȍȕșȖȘȕȣȍ șȐșȚȍȔȣ ș ȊȣșȖȒȖȥȜȜȍȒȚȐȊȕȣȔȐ șȐșȚȍȔȈȔȐ ȉȖȧ. ǪȖ ȊȘȍȔȧ ȚȈȑȊȈȕȤșȒȖȋȖ ȒȘȐȏȐșȈ ȗȘȖȓȐȊȖȊ 1996 ȋȖȌȈ șȍȌȤȔȖȑ ȜȓȖȚ ǪǴǼ ǹȀǨ ȗȖȌ ȒȖȔȈȕȌȖȊȈȕȐȍȔ ȊȐȞȍ-ȈȌȔȐȘȈȓȈ ǨȘȟȐ DzȓȍȔȐȕșȈ (Archie Clemins) ȗȘȖȊȍȓ țșȗȍȠȕțȦ ǹǾǶ2. Ǫ 1996 ȋȖȌț ȗȖșȓȍ ȗȘȖȊȍȌȍȕȐȧ ȘȧȌȈ ȐșȗȣȚȈȕȐȑ Ȑ ȌȖȊȍȌȍȕȐȧ CEC ȕȈȟȈȓȈ ȗȖșȚțȗȈȚȤ Ȋ ȊȖȑșȒȈ, ȝȖȚȧ ȚȍșȚȐȘȖȊȈȕȐȍ Ȑ ȖȞȍȕȒȈ ȊȖȏȔȖȎȕȖșȚȍȑ șȐșȚȍȔȣ ȗȘȖȌȖȓȎȈȓȐșȤ ȊȗȓȖȚȤ ȌȖ ȕȈȟȈȓȈ 21 ȊȍȒȈ. ǹȍȋȖȌȕȧ ǹǭǹ ȊȔȍșȚȍ ș ȒȖȔȗȓȍȒșȕȖȑ șȍȚȤȦ șȚȈȕȞȐȑ șȓȍȎȍȕȐȧ Ȑ șȖȗȘȖȊȖȎȌȍȕȐȧ Ȟȍȓȍȑ (Composite Tracking Network) DzȖȘȗțșȈ ȔȖȘșȒȖȑ ȗȍȝȖȚȣ, ȚȈȒȎȍ ȉȈȏȐȘțȦȡȍȑșȧ ȕȈ ǹǭǹ, șȖȏȌȈȓȐ ȥȜȜȍȒȚȐȊȕțȦ ȖȉȡțȦ șȍȚȤ șȍȕșȖȘȕȣȝ șȐșȚȍȔ Ȑ șȐșȚȍȔ ȖȘțȎȐȧ, ȧȊȓȧȦȡțȦșȧ ȊȈȎȕȣȔ ȥȓȍȔȍȕȚȖȔ ȈȘȝȐȚȍȒȚțȘȣ șȐșȚȍȔȣ ȒȖȔȈȕȌȖȊȈȕȐȧ Ȑ țȗȘȈȊȓȍȕȐȧ FORCEnet3. ǹǾǶ ȧȊȓȧȍȚșȧ ȘȈȏȊȐȊȈȦȡȍȑșȧ ȒȖȕȞȍȗȞȐȍȑ, Ȑ ȗȖȕȐȔȈȕȐȍ ȚȖȋȖ, ȒȈȒ ȌȖȓȎȕȣ ȗȘȖȊȖȌȐȚȤșȧ șȍȚȍȞȍȕȚȘȐȟȕȣȍ ȖȗȍȘȈȞȐȐ, ȐȏȔȍȕȧȍȚșȧ ȊȔȍșȚȍ ș ȗȘȖȊȍȌȍȕȐȍȔ ȘȍȈȓȤȕȣȝ ȊȖȍȕȕȣȝ ȖȗȍȘȈȞȐȑ Ȑ ȕȈȒȖȗȓȍȕȐȍȔ ȉȖȍȊȖȋȖ ȖȗȣȚȈ.

ǹǾǶ Ȋ ǨȜȋȈȕȐșȚȈȕȍ Ȑ ǰȘȈȒȍ. ǪȖȍȕȕȣȍ ȖȗȍȘȈȞȐȐ «ǵȍșȖȒȘțȠȐȔȈȧ șȊȖȉȖȌȈ, 2001-2002» (Operation Enduring Freedom, 2001-02) Ȋ ǨȜȋȈȕȐșȚȈȕȍ Ȑ «ǹȊȖȉȖȌȈ ǰȘȈȒț, 2003-2010» (Operation Iraqi Freedom, 2003-2010) ȗȖșȓțȎȐȓȐ ȗȖȓȐȋȖȕȖȔ Ȍȓȧ ȖȞȍȕȒȐ ȥȜȜȍȒȚȐȊȕȖșȚȐ ȚȍȖȘȐȐ ǹǾǪ Ȑ ȒȖȕȞȍȗȞȐȐ ǹǾǶ Ȋ țșȓȖȊȐȧȝ ȘȍȈȓȤȕȣȝ ȉȖȍȊȣȝ ȌȍȑșȚȊȐȑ. ǪȖ ȊȘȍȔȧ ȖȗȍȘȈȞȐȐ «ǵȍșȖȒȘțȠȐȔȈȧ șȊȖȉȖȌȈ» șȍȚȍȞȍȕȚȘȐȟȕȣȍ ȊȖȏȔȖȎȕȖșȚȐ ȖȒȈȏȈȓȐșȤ ȊȈȎȕȣȔ ȥȓȍȔȍȕȚȖȔ șȐșȚȍȔȣ ȗȖȌȋȖȚȖȊȒȐ Ȑ ȗȘȐȕȧȚȐȧ ȘȍȠȍȕȐȑ ǾȍȕȚȘȈȓȤȕȣȔ ȒȖȔȈȕȌȖȊȈȕȐȍȔ ǹȀǨ (USCENTCOM) Ȑ ȖȒȈȏȈȓȐ ȏȕȈȟȐȚȍȓȤȕȖȍ ȊȓȐȧȕȐȍ ȕȈ ȉȣșȚȘȣȑ ȘȈȏȋȘȖȔ ȗȘȖȚȐȊȕȐȒȈ ȕȈ ȗȍȘȊȖȑ ȜȈȏȍ ȊȖȍȕȕȖȑ ȒȈȔȗȈȕȐȐ4. ǷȖșȓȍ ȈȜȋȈȕșȒȖȑ ȖȗȍȘȈȞȐȐ Ȋ ȒȖȕȞȍȗȞȐȦ ǹǾǶ ȉȣȓȐ Ȋȕȍșȍȕȣ ȏȕȈȟȐȚȍȓȤȕȣȍ ȐȏȔȍȕȍȕȐȧ, Ȑ ȊȖ ȊȘȍȔȧ ȖȗȍȘȈȞȐȐ «ǹȊȖȉȖȌȈ ǰȘȈȒț» ȖȕȐ ȗȖȒȈȏȈȓȐ șȊȖȦ ȥȜȜȍȒȚȐȊȕȖșȚȤ, Ȋȕȍșȧ ȊȍșȖȔȣȑ ȊȒȓȈȌ Ȋ ȌȖșȚȐȎȍȕȐȍ ȉȣșȚȘȖȋȖ țșȗȍȝȈ ȕȈ ȥȚȈȗȍ ȖșȕȖȊȕȣȝ ȉȖȍȊȣȝ ȌȍȑșȚȊȐȑ Ȋ ȔȈȘȚȍ-ȈȗȘȍȓȍ 2003 ȋȖȌȈ.

1 O’Neil, William D. “The Cooperative Engagement Capability (CEC): Transforming Naval Anti-air Warfare,” Center for Technology and National Security Policy, Washington, DC: National Defense University, 2007. 12 January 2011. http://handle.dtic.mil/100.2/ADA471258.

2 Cebrowski, Arthur K. and John J. Garstka, Network-Centric Warfare: Its Origin and Future, pp. 28-35.

3 U.S. Department of the Navy. Naval Transformation Roadmap 2003: Assured Access & Power Projection … From the Sea. Washington, DC, Jul 2003. 12 January 2011. http://handle.dtic.mil/100.2/ADA440097.

4 Cebrowski, The Implementation of Network-Centric Warfare, p. 20.

254

ǸȐș. 11

ǬȖȔȍȕȣȊȖȑȕȣȐȕȜȖȘȔȈȞȐȖȕȕȖȑȥȗȖȝȐ

ǬȈȕȖȗȖ Cebrowski, The Implementation of Network-Centric Warfare

 

 

ǹȖȞȐȈȓȤȕȣȑ ȌȖȔȍȕ

 

 

 

 

ǶȉȡȐȍ ȘȍȠȍȕȐȧ

 

 

 

 

 

DzȖȋȕȐȚȐȊȕȣȑ ȌȖȔȍȕ

 

 

ǬȖȊȍȌȍȕȐȍ ȌȖ șȊȍȌȍȕȐȧ ȕȈȔȍ-

DzȖȋȕȐȚȐȊȕȖȍ ȗȘȍȐȔțȡȍșȚȊȖ

 

ǾȐȒȓȣ ȗȓȈȕȐȘȖȊȈȕȐȧ,

 

ȘȍȕȐȑ DzȖȔȈȕȌțȦȡȍȋȖ

 

 

ȘȈȏȊȖȘȈȟȐȊȈȕȐȧ, ȗȘȖȊȍ-

 

 

 

 

 

 

 

 

 

 

 

ȌȍȕȐȧ Ȑ ȖȉȍșȗȍȟȍȕȐȧ

 

 

ǹȖȊȔȍșȚȕȈȧȖș-

 

ǹȎȈȚȣȍ

 

 

 

 

ȊȍȌȖȔȓȍȕȕȖșȚȤ

 

ȖȗȍȘȈȞȐȐ

 

 

 

 

 

ǹǾǪ

 

 

 

 

ǰȕȜȖȘȔȈȞȐȖȕȕȣȑ

 

ǼȐȏȐȟȍșȒȐȑ ȌȖȔȍȕ

 

 

 

 

ȌȖȔȍȕ

 

 

 

 

 

 

ǪȣșȖȒȖȚȖȟȕȣȍ

ǷȘȍȐȔțȡȍșȚȊȖ

 

 

 

ǰȕȜȖȘȔȈȞȐȖȕȕȖȍ

șȐȓȣ

 

 

 

 

 

 

ȗȘȍȐȔțȡȍșȚȊȖ

Ȋ șȐȓȈȝ Ȑ ȗȖȏȐȞȐȐ

 

ǹȒȖȘȖșȚȤ Ȑ ȌȖșȚțȗ

ǸȐș. 12

ǪȍȘȝȕȐȑțȘȖȊȍȕȤȒȖȕȞȍȗȚțȈȓȤȕȖȋȖȜȘȍȑȔȈșȍȚȍȞȍȕȚȘȐȟȕȣȝȖȗȍȘȈȞȐȑ. ǪȍȘșȐȧ 1.0.

ǬȈȕȖȗȖ Garstka, Network Centric Operations Conceptual Framework, Version1.0.

ǰȕȜȖȘȔȈȞȐȖȕȕȣȍ șȓțȎȉȣ

ǬȖȗȖȓȕȐȚȍȓȤȕȣȍ șȓțȎȉȣ

ǹȐȓȣ

DzȖȔȈȕȌȖȊȈȕȐȍ Ȑ țȗȘȈȊȓȍȕȐȍ

ǰșȗȖȓȕȐȚȍȓȤȕȣȍ ȖȘȋȈȕȣ

 

 

 

 

DzȈȟȍșȚȊȖ ȠȚȈȚȕȖȑ ȐȕȜȖȘȔȈȞȐȐ

 

DzȈȟȍșȚȊȖ șȍȚȍȊȖȑ ȖȘȋȈȕȐȏȈȞȐȐ

 

 

 

 

 

ǹȚȍȗȍȕȤ ȖȝȊȈȚȈ șȍȚȤȦ

ǫȖȚȖȊȕȖșȚȤ Ȓ șȍȚȐ țȏȓȖȊ

 

 

 

ǹȚȍȗȍȕȤ șȗȖșȖȉȕȖșȚȐ Ȓ șȖȊȔȍșȚȕȖȑ ȐȕȜȖȘȔȈȞȐȐ

DzȈȟȍșȚȊȖ ȐȕȌȐȊȐȌțȈȓȤȕȖȑ ȐȕȜȖȘȔȈȞȐȐ

 

ǹȚȍȗȍȕȤ șȖȊȔȍșȚȕȖȑ ȐȕȜȖȘȔȈȞȐȐ

 

 

DzȈȟȍșȚȊȖ ȊȏȈȐ-

 

 

ǹȚȍȗȍȕȤ ȐȕȌȐȊȐȌțȈȓȤȕȖȋȖ ȖșȔȣșȓȐȊȈȕȐȧ

ȔȖȌȍȑșȚȊȐȑ

ǹȚȍȗȍȕȤ șȖȊȔȍșȚȕȖȋȖ

 

 

 

ȖșȔȣșȓȐȊȈȕȐȧ

ǰȕȌȐȊȐȌțȈȓȤȕȈȧ ȖșȊȍȌȖȔȓȍȕȕȖșȚȤ

 

ǹȖȊȔȍșȚȕȈȧ ȖșȊȍȌȖȔȓȍȕȕȖșȚȤ

ǰȕȌȐȊȐȌțȈȓȤȕȖȍ ȗȖȕȐȔȈȕȐȍ

 

ǹȖȊȔȍșȚȕȖȍ ȗȖȕȐȔȈȕȐȍ

ǰȕȌȐȊȐȌțȈȓȤȕȣȍ ȘȍȠȍȕȐȧ

 

ǶȉȡȐȍ ȘȍȠȍȕȐȧ

ǼȐȏȐȟȍșȒȐȑ ȌȖȔȍȕ

ǹȚȍȗȍȕȤ ȘȍȠȍȕȐȧ/șȐȕȝȘȖȕȐȏȈȞȐȐ ȐȕȜȖȘȔȈȞȐȐ

 

 

 

 

*

ǰȕȜȖȘȔȈȞȐȖȕȕȣȑ ȌȖȔȍȕ

 

 

 

ǹȚȍȗȍȕȤ șȐȕȝȘȖȕȐȏȈȞȐȐ ȌȍȑșȚȊȐȑ/ȍȌȐȕȐȞ

 

DzȖȋȕȐȚȐȊȕȣȑ ȌȖȔȍȕ

 

 

 

 

**

ǹȖȞȐȈȓȤȕȣȑ ȌȖȔȍȕ

 

 

 

ǹȚȍȗȍȕȤ ȥȜȜȍȒȚȐȊȕȖșȚȐ

 

 

 

 

 

* ǷȖȌȊȐȎȕȖșȚȤ ȒȖȔȈȕȌȖȊȈȕȐȧ Ȑ țȗȘȈȊȓȍȕȐȧ. ** ǷȖȌȊȐȎȕȖșȚȤ șȐȓ.

ǹdzǶǮǵǶǭ ǴȃȀdzǭǵǰǭ ǰ ǹǭǺȄ: ǷǨǸǨǬǰǫǴǨ ǵǭdzǰǵǭDZǵǶǹǺǰ ǰ ǹǸǭǬǨ ǩǭǯǶǷǨǹǵǶǹǺǰ 21 ǪǭDzǨ

ȅȜȜȍȒȚȐȊȕȖșȚȤ șȍȚȍȞȍȕȚȘȐȟȕȣȝ ȖȗȍȘȈȞȐȑ Ȋ ǰȘȈȒȍ ȉȣȓȈ ȖȞȍȕȍȕȈ șȚȈȘȠȐȔ ȒȖȔȈȕȌȕȣȔ șȖșȚȈȊȖȔ, ȊȒȓȦȟȈȧ ȋȍȕȍȘȈȓȈ ǺȖȔȔȐ ǼȘȈȕȒȈ (Tommy Franks), ȒȖȔȈȕȌțȦȡȍȋȖ ǾȍȕȚȘȈȓȤȕȣȔ ȒȖȔȈȕȌȖȊȈȕȐȍȔ Ǫǹ ǹȀǨ Ȑ ȒȖȈȓȐȞȐȖȕȕȣȔ șȐȓȈȔȐ, Ȉ ȚȈȒȎȍ ȒȖȔȈȕȌȐȘȈȔȐ ȕȐȎȕȍȋȖ ȏȊȍȕȈ ȊȗȓȖȚȤ ȌȖ ȉȈȚȈȓȤȖȕȖȊ1. ǫȓȈȊȕȣȑ ȘȍȌȈȒȚȖȘ ȎțȘȕȈȓȈ «ǶȉȖȘȖȕȕȣȍ șȐșȚȍȔȣ» (Defense Systems) ǻȈȚȚ DzȍȠ (Wyatt Kash) ȊȘȍȌȈȒȚȖȘșȒȖȑ șȚȈȚȤȍ ȗȖȌȟȍȘȒȐȊȈȍȚ, ȟȚȖ, ȐșȝȖȌȧ Ȑȏ ȗȘȐȘȖȌȣ ȊȖȑȕȣ Ȋ 21 ȊȍȒȍ, ȌȍȉȈȚȣ Ȗ ȊȈȎȕȖșȚȐ

ȐȕȍȖȉȝȖȌȐȔȖșȚȐ șȒȖȘȍȑȠȍȋȖ ȊȕȍȌȘȍȕȐȧ Ȑ ȘȈȏȊȍȘȚȣȊȈȕȐȧ ȕȖȊȣȝ ȚȍȝȕȖȓȖȋȐȑ ȗȖ șȉȖȘț, ȖȉȘȈȉȖȚȒȍ ȐȕȜȖȘȔȈȞȐȐ, ȒȖȔȔțȕȐȒȈȞȐȖȕȕȣȝ ȚȍȝȕȖȓȖȋȐȑ șȚȈȕȖȊȧȚșȧ ȗȘȖșȚȖ ȕȍțȔȍșȚȕȣ. «Ǫșȍ ȊȖȏȘȈșȚȈȦȡȈȧ ȘȖȓȤ ȞȐȜȘȖȊȖȑ ȘȈȏȊȍȌȒȐ, ȕȈȉȓȦȌȍȕȐȧ Ȑ ȘȍȒȖȋȕȖșȞȐȘȖȊȒȐ ȕȈȐȉȖȓȍȍ ȧȘȒȖ ȊȐȌȕȈ Ȋ ȚȈȒȐȝ ȔȍșȚȈȝ, ȒȈȒ ǨȜȋȈȕȐșȚȈȕ. ǵȍȕȈșȣȚȕȖșȚȤ

ȐȎȈȌȕȖșȚȤ ȒȖȔȈȕȌȐȘȖȊ, ȗȖȟțȊșȚȊȖȊȈȊȠȐȝ Ȋșȍ ȗȘȍȐȔțȡȍșȚȊȈ ȖȉȔȍȕȈ șȐȚțȈȞȐȖȕȕȖȑȖșȊȍȌȖȔȓȍȕȕȖșȚȤȦ, ȕȖȊȣȝȚȍȝȕȖȓȖȋȐȑ ȕȍȏȕȈȍȚȗȘȍȌȍȓȈ»2.

ǺȖȕȐ ǽȖțȒȐȕș (Tony Hawkins), ȒȖȓțȔȕȐșȚ ǸȐȟȔȖȕȌ ǺȈȑȔș-ǬȐșȗȈȚȟ (Richmond Times-Dispatch) Ȑ ȕȈȞȐȖȕȈȓȤȕȣȑ ȒȖȖȘȌȐȕȈȚȖȘ ȖȘȋȈȕȐȏȈȞȐȐ ȊȍȚȍȘȈȕȖȊ ǹȀǨ (Congressional Black Caucus Veterans Brain Trust) Ȋ șȚȈȚȤȍ «ǹȖȊȘȍȔȍȕȕȣȍ ȊȖȑȕȣ ȚȘȍȉțȦȚ șȖȊȘȍȔȍȕȕȣȝ ȊȖȍȕȕȣȝ» ȗȐȠȍȚ, ȟȚȖ ȈȔȍȘȐȒȈȕșȒȐȍ ȊȖȑșȒȈ ȕțȎȌȈȦȚșȧ Ȋ ȥȒȐȗȐȘȖȊȒȍ 21 ȊȍȒȈ Ȍȓȧ ȊȍȌȍȕȐȧ ȊȖȑȕ 21 ȊȍȒȈ. DzȖȕȋȘȍșș Ȑ ȈȌȔȐȕȐșȚȘȈȞȐȧ ǶȉȈȔȣ ȌȖȓȎȕȣ ȗȘȍȌȗȘȐȕȧȚȤ Ȋșȍ ȕȍȖȉȝȖȌȐȔȖȍ, ȟȚȖȉȣ țșȒȖȘȐȚȤ ȗȘȖȞȍșș ȖșȕȈȡȍȕȐȧ ȈȔȍȘȐȒȈȕșȒȐȝ ȊȖȑșȒ Ȋ ǨȜȋȈȕȐșȚȈȕȍ Ȑ ǰȘȈȒȍ ȚȈȒȐȔ ȖȉȖȘțȌȖȊȈȕȐȍȔ Ȑ ȚȍȝȕȐȒȖȑ3.

2.4.2ǶșȕȖȊȕȣȍ ȥȓȍȔȍȕȚȣ ȒȖȕȞȍȗȚțȈȓȤȕȖȋȖ ȜȘȍȑȔȈ șȍȚȍȞȍȕȚȘȐȟȕȣȝ Ȗȗȍ-

ȘȈȞȐȑ. DzȖȕȞȍȗȚțȈȓȤȕȣȑ ȜȘȍȑȔ șȍȚȍȞȍȕȚȘȐȟȕȣȝ ȖȗȍȘȈȞȐȑ (DzǼ ǹǾǶ) (NCO Conceptual Framework) ȖȗȘȍȌȍȓȧȍȚ ȒȓȦȟȍȊȣȍ ȗȖȕȧȚȐȧ, ȒȖȕȞȍȗȞȐȐ, ȔȖȌȍȓȐ, Ȉ ȚȈȒȎȍ șȊȧȏȐ ȔȍȎȌț ȕȐȔȐ, ȘȈșșȔȈȚȘȐȊȈȍȔȣȍ Ȋ ȒȖȕȚȍȒșȚȍ ȟȍȚȣȘȍȝ ȌȖȔȍȕȖȊ ȊȖȑȕȣ. ǼȘȍȑȔ ȗȘȐȏȊȈȕ ȗȖȔȖȟȤ ȒȈȒ Ȋ ȗȘȖȊȍȌȍȕȐȐ ǹǾǶ, ȚȈȒ Ȑ Ȋ ȖȞȍȕȒȍ ȗȘȖȊȍȌȍȕȕȣȝ ȔȐșșȐȑ, ȖȗȘȍȌȍȓȧȧ ȔȍȚȘȐȒȐ, ȗȘȐ ȗȖȔȖȡȐ ȒȖȚȖȘȣȝ ȖȞȍȕȐȊȈȦȚșȧ ȗȘȖȞȍșșȣ ȊȕȍȌȘȍȕȐȧ ȚȍȖȘȐȐ ǹǾǪ Ȋ ȊȖȍȕȕțȦ ȖȘȋȈȕȐȏȈȞȐȦ. ǪȍȘșȐȧ 1.0 DzǼ ǹǾǶ ȉȣȓȈ ȐȏȌȈȕȈ Ȋ ȕȖȧȉȘȍ 20034 (șȔ. ǸȐș. 12 ȕȈ ȞȊȍȚȕȖȑ ȊȒȓȈȌȒȍ), ǪȍȘșȐȧ 2.0 – Ȋ ȐȦȕȍ 20045. Ǫ ȘȈȔ-

1 “Impact of the Network on Operation Iraqi Freedom,” a special presentation by General Tommy Franks, USA (Ret.) at the Network-Centric Warfare 2004 conference on 22 January 2004, Washington, DC. ǾȐȚȈȚȈ ȗȖ Cebrowski, The Implementation of Network-Centric Warfare, p. 44.

2 Kash, Wyatt. “Getting on with the Cyber Command,” Defence Systems, January 20, 2010. 12 January 2011. http://defensesystems.com/Articles/2010/01/27/Getting-on-with-Cyber-Command.aspx.

3 Hawkins, Tony. “Modern Wars Demand a Modern Military,” Richmond Times-Dispatch, June 15, 2010. 12 January 2011. http://www2.timesdispatch.com/news/2010/jun/15/ED-HAWKINS15-ar-139551/.

4 Garstka, John. Network Centric Operations Conceptual Framework, Version1.0. Department of Defense, Office of Force Transformation, Office of the Secretary of Defense, Vienna, VA: Evidence Based Research, November 2003.

5 Garstka, John and David S. Alberts. Network Centric Operations Conceptual Framework, Version 2.0. Department of Defense, Office of Force Transformation, Office of the Secretary of Defense, Vienna, VA: Evidence Based Research, 2004.

255

ǸȈȟȤȧ ǨǸǯǻǴǨǵȇǵ

ȒȈȝ DzǼ ǹǾǶ ȉȣȓȐ ȗȘȖȊȍȌȍȕȣ șȍȔȤ ȚȍȔȈȚȐȟȍșȒȐȝ ȐșșȓȍȌȖȊȈȕȐȑ, ȖȝȊȈȚȣȊȈȦȡȐȝ ȘȈȏȓȐȟȕȣȍ ȔȐșșȐȐ:

1.ȊȖȏȌțȠȕȣȍ ȖȗȍȘȈȞȐȐ (Air-to-air operations);

2.ȕȈȏȍȔȕȣȍ ȔȈȕȍȊȘȍȕȕȣȍ ȖȗȍȘȈȞȐȐ (ȉȘȐȋȈȌȕȈȧ ȚȈȒȚȐȟȍșȒȈȧ ȋȘțȗȗȈ ǹȚȘȈȑ-

ȒȍȘ) (Ground maneuver operations (Stryker Brigade Combat Team));

3.ȖȗȍȘȈȞȐȐ ȊȖȏȌțȝ-ȏȍȔȓȧ (ȕȍȗȖșȘȍȌșȚȊȍȕȕȈȧ ȈȊȐȈȞȐȖȕȕȈȧ ȗȖȌȌȍȘȎȒȈ) (Air- to-ground operations (close air support));

4.ȔȖȘșȒȐȍ ȖȗȍȘȈȞȐȐ (ȒȖȔȈȕȌȐȘ ȖȗȍȘȈȚȐȊȕȖȋȖ șȖȍȌȐȕȍȕȐȧ 50) (Naval operations (Commander Task Force Fifty) ȊȖ ȊȘȍȔȧ ȖȗȍȘȈȞȐȐ «ǵȍșȖȒȘțȠȐȔȈȧ șȊȖȉȖȌȈ»;

5.șȗȍȞȐȈȓȤȕȣȍ ȖȗȍȘȈȞȐȐ (ȊȖȍȕȕȖ-ȔȖȘșȒȈȧ ȋȘțȗȗȈ șȗȍȞȐȈȓȤȕȖȑ ȊȖȑȕȣ 1) (Special operations (Naval Special Warfare Group One));

6.ȒȖȈȓȐȞȐȖȕȕȣȍ ȖȗȍȘȈȞȐȐ ǹȀǨ/ǪȍȓȐȒȖȉȘȐȚȈȕȐȧ (US/UK coalition operations) Ȋ ȝȖȌȍ ȖȗȍȘȈȞȐȐ «ǹȊȖȉȖȌȈ ǰȘȈȒț»;

7.ȔȕȖȋȖȕȈȞȐȖȕȈȓȤȕȣȍ ȖȗȍȘȈȞȐȐ (ǵǨǺǶ) (Multinational operations (NATO)).

ǶȌȕȖȑ Ȑȏ Ȟȍȓȍȑ DzǼ ǹǾǶ ȧȊȓȧȍȚșȧ ȖȚȝȖȌ ȖȚ ȔȍȝȈȕȐșȚȐȟȍșȒȖȋȖ ȊȏȋȓȧȌȈ Ȑ ȗȘȐȏȕȈȕȐȍ ȒȘȐȚȐȟȍșȒȖȑ ȊȈȎȕȖșȚȐ ȟȍȓȖȊȍȟȍșȒȖȋȖ ȜȈȒȚȖȘȈ, Ȉ ȚȈȒȎȍ ȗȘȐȘȖȌȣ ȔȍȎȓȐȟȕȖșȚȕȣȝ ȖȚȕȖȠȍȕȐȑ Ȋ ȊȖȍȕȕȖȑ ȖȘȋȈȕȐȏȈȞȐȐ. DzǼ ǹǾǶ, ȘȈșșȔȈȚȘȐȊȈȧ ȗȘȖȞȍșșȣ Ȋ ȐȕȜȖȘȔȈȞȐȖȕȕȖȔ ȌȖȔȍȕȍ, ȗȘȖȊȖȌȐȚ ȘȈȏȓȐȟȐȍ ȔȍȎȌț ȓȐȟȕȖșȚȤȦ Ȑ ȖȘȋȈȕȐȏȈȞȐȍȑ – ȌȈȕȕȣȔȐ, ȐȕȜȖȘȔȈȞȐȍȑ Ȑ ȏȕȈȕȐȧȔȐ, ȒȖȚȖȘȣȔȐ ȖȉȓȈȌȈȦȚ ȐȓȐ Ȓ ȒȖȚȖȘȣȔ ȖȕȐ ȐȔȍȦȚ ȌȖșȚțȗ. ǸȈȏȓȐȟȐȍ ȗȘȖȊȖȌȐȚșȧ ȚȈȒȎȍ Ȋ ȐșȚȖȟȕȐȒȈȝ Ȑ ȗȘȐȘȖȌȍ ȐȕȜȖȘȔȈȞȐȐ, ȒȖȚȖȘȈȧ ȔȖȎȍȚ ȉȣȚȤ ȠȚȈȚȕȖȑ (organic) ȐȓȐ ȗȖȓțȟȍȕȕȖȑ ȟȍȘȍȏ șȍȚȤ Ȑ șȍȚȍȊȣȍ ȖȚȕȖȠȍȕȐȧ. ǪȊȍȌȍȕȐȍ ȔȖȌȍȓȐ șȍȚȐ Ȑ ȐșșȓȍȌȖȊȈȕȐȍ «ȒȈȟȍșȚȊȈ șȍȚȐ» ȌȍȓȈȍȚ ȊȖȏȔȖȎȕȣȔ ȘȈȏȓȐȟȈȚȤ ȗȘȖȞȍșșȣ, Ȋ ȒȖȚȖȘȣȍ ȊȖȊȓȍȟȍȕȣ ȖȌȐȕ ȐȓȐ ȕȍșȒȖȓȤȒȐȝ ȈȒȚȖȘȖȊ. ǪȊȖȌȐȚșȧ ȗȖȕȧȚȐȍ «ȗȖȓȤȏȖȊȈȚȍȓȍȑ, ȋȖȚȖȊȣȝ Ȓ șȍȚȐ» (net-ready users), ȒȖȚȖȘȣȍ ȗȖȌȒȓȦȟȍȕȣ Ȓ ǹȍȚȐ ȜȐȏȐȟȍșȒȐ Ȑ ȖȉȓȈȌȈȦȚ șȍȚȍȊȣȔ ȔȣȠȓȍȕȐȍȔ, ȧȊȓȧȦȡȐȔșȧ ȘȍȏțȓȤȚȈȚȖȔ șȖȖȚȊȍȚșȚȊțȦȡȍȑ ȗȖȌȋȖȚȖȊȒȐ Ȑ ȖȉțȟȍȕȐȧ Ȑ ȗȖȏȊȖȓȧȦȡȍȋȖ ȐȔ ȥȜȜȍȒȚȐȊȕȖ ȐșȗȖȓȤȏȖȊȈȚȤ ȊȖȏȔȖȎȕȖșȚȐ ǹȍȚȐ1.

ǸȈȏȓȐȟȍȕȐȍ ȒȖȋȕȐȚȐȊȕȖȋȖ Ȑ șȖȞȐȈȓȤȕȖȋȖ ȌȖȔȍȕȖȊ ȗȖȏȊȖȓȧȍȚ DzǼ ǹǾǶ ȗȖȌȟȍȘȒȕțȚȤ ȘȈȏȕȐȞț ȔȍȎȌț ȏȕȈȕȐȧȔȐ Ȑ ȌȍȑșȚȊȐȧȔȐ ȓȐȟȕȖșȚȐ (ȕȈȗȘȐȔȍȘ, ȒȖȔȈȕȌȐȘȈ) Ȑ șȖȞȐȈȓȤȕȣȝ ȋȘțȗȗ (ȒȖȔȈȕȌȕȣȑ șȖșȚȈȊ, șȖȖȉȡȍșȚȊȈ ȐȕȚȍȘȍșȖȊ Ȑ ȗȘ.). DzȖȋȕȐȚȐȊȕȣȍ ȗȘȖȞȍșșȣ ȓȐȟȕȖșȚȐ ȖȗȐȘȈȦȚșȧ ȕȈ ȐȕȜȖȘȔȈȞȐȖȕȕȣȍ ȗȖȚȖȒȐ ȘȈȏȓȐȟȕȖȑ ȗȘȐȘȖȌȣ, ȗȖșȚțȗȈȦȡȐȍ Ȑȏ ȐȕȜȖȘȔȈȞȐȖȕȕȖȋȖ ȌȖȔȍȕȈ Ȑ ȗȖȏȊȖȓȧȦȡȐȍ ȍȑ șȜȖȘȔȐȘȖȊȈȚȤ ȓȐȟȕțȦ ȖșȊȍȌȖȔȓȍȕȕȖșȚȤ, ȕȈ ȖșȕȖȊȍ ȒȖȚȖȘȖȑ ȗȖȧȊȓȧȍȚșȧ ȗȖȕȐȔȈȕȐȍ. ǷȖȕȐȔȈȕȐȍ ȧȊȓȧȍȚșȧ ȘȍȏțȓȤȚȈȚȖȔ ȒȖȔȉȐȕȈȞȐȐ ȖșȊȍȌȖȔȓȍȕȕȖșȚȐ, ȔȍȕȚȈȓȤ-

1 Alberts, David S. and Richard E. Hayes. Understanding Command and Control. Washington, DC: Department of Defense Command and Control Research Program (CCRP) Publication Series, 2006, pp. 169-170. 12 January 2011. http://www.dodccrp.org/files/Alberts_UC2.pdf.

256

ǹdzǶǮǵǶǭ ǴȃȀdzǭǵǰǭ ǰ ǹǭǺȄ: ǷǨǸǨǬǰǫǴǨ ǵǭdzǰǵǭDZǵǶǹǺǰ ǰ ǹǸǭǬǨ ǩǭǯǶǷǨǹǵǶǹǺǰ 21 ǪǭDzǨ

ȕȣȝ ȔȖȌȍȓȍȑ Ȑ ȏȕȈȕȐȑ ȓȐȟȕȖșȚȐ, ȗȖȏȊȖȓȧȦȡȐȝ ȍȑ ȘȈȏȓȐȟȈȚȤ Țȍ ȐȓȐ Ȑȕȣȍ ȗȘȐ- ȟȐȕȕȖ-șȓȍȌșȚȊȍȕȕȣȍ șȊȧȏȐ, ȗȖȕȧȚȤ ȌȐȕȈȔȐȒț ȗȘȖȞȍșșȖȊ Ȑ ȗȘȖȋȕȖȏȐȘȖȊȈȚȤ Ȑȝ ȘȈȏȊȐȚȐȍ. ǸȍȏțȓȤȚȈȚȖȔ șȚȈȕȖȊȐȚșȧ ȔȕȖȎȍșȚȊȖ ȈȓȤȚȍȘȕȈȚȐȊȕȣȝ șȞȍȕȈȘȐȍȊ ȉțȌțȡȍȋȖ Ȑ ȗȖȕȐȔȈȕȐȍ ȚȖȋȖ, ȒȈȒ ȕȈ ȕȐȝ ȔȖȎȕȖ ȊȖȏȌȍȑșȚȊȖȊȈȚȤ, ȟȚȖ ȗȖȏȊȖȓȧȍȚ ȗȍȘȍȑȚȐ Ȓ ȗȘȖȞȍșșț ȗȘȐȕȧȚȐȧ ȘȍȠȍȕȐȧ, ȒȖȚȖȘȣȑ ȟȈȡȍ ȊșȍȋȖ șȊȖȌȐȚșȧ Ȓ ȊȣȉȖȘț Ȑȏ ȐȔȍȦȡȐȝșȧ ȈȓȤȚȍȘȕȈȚȐȊ. ǸȈșșȔȖȚȘȍȕȕȣȍ ȊȣȠȍ ȚȘȐ ȒȖȋȕȐȚȐȊȕȣȝ ȗȘȖȞȍșșȈ – ȖșȊȍȌȖȔȓȍȕȕȖșȚȤ, ȗȖȕȐȔȈȕȐȍ Ȑ ȗȘȐȕȧȚȐȍ ȘȍȠȍȕȐȧ – Ȋ șȖȊȖȒțȗȕȖșȚȐ ȜȖȘȔȐȘțȦȚ «ȖșȔȣșȓȐȊȈȕȐȍ» (sensemaking)1.

DzȖȕȞȍȗȚțȈȓȤȕȣȑ ȜȘȍȑȔ șȍȚȍȞȍȕȚȘȐȟȕȣȝ ȖȗȍȘȈȞȐȑ ȐșȝȖȌȐȚ Ȑȏ ȚȖȋȖ, ȟȚȖ Ȋ ȐȕȜȖȘȔȈȞȐȖȕȕțȦ ȥȗȖȝț ȓȐȟȕȖșȚȐ ȘȍȌȒȖ ȘȈȉȖȚȈȦȚ Ȋ ȐȏȖȓȧȞȐȐ, Ȑ ȗȘȖȞȍșș, ȔȖȌȍȓȐȘțȦȡȐȑ ȒȖȓȐȟȍșȚȊȖ Ȑ ȒȈȟȍșȚȊȖ șȖȞȐȈȓȤȕȣȝ ȊȏȈȐȔȖȌȍȑșȚȊȐȑ, ȧȊȓȧȍȚșȧ ȊȈȎȕȣȔ ȥȓȍȔȍȕȚȖȔ DzǼ ǹǾǶ. DzǼ ǹǾǶ ȊȒȓȦȟȈȍȚ ȔȖȌȍȓȐ Ȑ ȔȍȚȘȐȒȐ, ȗȖȏȊȖȓȧȦȡȐȍ ȖȞȍȕȐȚȤ ȊȏȈȐȔȖȌȍȑșȚȊȐȍ Ȑ ȖȉȔȍȕ ȐȕȜȖȘȔȈȞȐȍȑ ȟȍȘȍȏ șȖȞȐȈȓȤȕȣȍ șȊȧȏȐ Ȑ șȖȚȘțȌȕȐȟȍșȚȊȖ Ȋ ȊȖȍȕȕȖȑ ȖȘȋȈȕȐȏȈȞȐȐ, Ȉ ȚȈȒȎȍ ȗȖșȓȍȌșȚȊȐȧ ȚȈȒȖȑ ȈȒȚȐȊȕȖșȚȐ. ǹȚȍȗȍȕȤ șȐȕȝȘȖȕȐȏȈȞȐȐ (țșȗȍȠȕȣȍ ȔȍȘȖȗȘȐȧȚȐȧ ȊȖ ȊȘȍȔȍȕȐ Ȑ ȗȘȖșȚȘȈȕșȚȊȍ)2 ȗȘȐȏȕȈȍȚșȧ Ȋ ȒȈȟȍșȚȊȍ ȔȍȚȘȐȒȐ Ȍȓȧ ȖȞȍȕȒȐ ȘȈșșȔȈȚȘȐȊȈȍȔȣȝ ȗȘȖȞȍșșȖȊ Ȑ ȈȚȘȐȉțȚȖȔ, ȊȓȐȧȦȡȐȔ ȕȈ ȥȜȜȍȒȚȐȊȕȖșȚȤ șȍȚȍȊȣȝ șȐȓ. ǪȈȎȕȍȑȠȐȔ ȥȓȍȔȍȕȚȖȔ DzǼ ǹǾǶ ȧȊȓȧȍȚșȧ ȒȖȕȞȍȗȞȐȧ ȗȖȌȊȐȎȕȖșȚȐ.

ǺȈȒȐȔ ȖȉȘȈȏȖȔ, ǹǾǶ DzǼ ȖȉȍșȗȍȟȐȊȈȍȚ ȉȖȓȍȍ ȌȍȚȈȓȤȕțȦ ȘȈȏȘȈȉȖȚȒț ȗȘȐȕȞȐȗȖȊ ǹǾǪ Ȑ ȊȒȓȦȟȈȍȚ ȒȈȒ șȚȘțȒȚțȘȕȣȍ Ȑ ȜțȕȒȞȐȖȕȈȓȤȕȣȍ ȥȓȍȔȍȕȚȣ, ȚȈȒ Ȑ ȐȕșȚȘțȔȍȕȚȈȓȤȕțȦ ȟȈșȚȤ, ȖȗȐșȣȊȈȧ ȔȍȝȈȕȐȏȔȣ, ȗȘȐ ȗȖȔȖȡȐ ȒȖȚȖȘȣȝ ȔȖȋțȚ ȉȣȚȤ ȗȖȕȧȚȣ Ȑ ȖȞȍȕȍȕȣ șȍȚȍȞȍȕȚȘȐȟȕȣȍ ȖȗȍȘȈȞȐȐ. ǩȈȏȐșȕȈȧ șȚȘțȒȚțȘȈ DzǼ ǹǾǶ ȗȘȐȏȊȈȕȈ ȗȖȔȖȟȤ ȐșșȓȍȌȖȊȈȚȍȓȧȔ Ȋ ȘȈȏȘȈȉȖȚȒȍ Ȑ ȖȞȍȕȒȍ ȕȖȊȣȝ ȔȖȌȍȓȍȑ ǹȍȚȐ, ȐșȗȖȓȤȏțȧ ȖȉȡȐȍ Ȑ șȖȗȖșȚȈȊȐȔȣȍ ȔȍȚȘȐȒȐ, ȗȘȐȔȍȕȧȍȔȣȍ ȒȖ ȊșȍȔ ȗȘȖȍȒȚȈȔ Ȑ ȊȖ Ȋșȍȝ ȌȖȔȍȕȈȝ.

1 ǶșȔȣșȓȐȊȈȕȐȍ (sensemaking) ȕȍ ȍșȚȤ «ȖșȔȣșȓȍȕȐȍ», ȕȖ ȗȘȖȞȍșș țȓȈȊȓȐȊȈȕȐȧ șȔȣșȓȈ, ȓȖȋȐȒȐ ȘȈȏȊȖȘȈȟȐȊȈȦȡȐȝșȧ șȖȉȣȚȐȑ, ȘȍȏțȓȤȚȈȚȖȔ ȒȖȚȖȘȖȋȖ Ȑ șȚȈȕȖȊȐȚșȧ ȖșȔȣșȓȍȕȐȍ. ǺȍȘȔȐȕ, ȗȘȐȏȊȈȕȕȣȑ șȝȊȈȚȐȚȤ Ȑ ȖȚȘȈȏȐȚȤ ȌȐȕȈȔȐȒț, ȗȘȖȞȍșș. ǶșȔȣșȓȐȊȈȕȐȍ ȊȒȓȦȟȈȍȚ Ȋ șȍȉȧ Ȟȍȓȣȑ ȘȧȌ ȗȘȖȞȍșșȖȊ Ȋ ȒȖȋȕȐȚȐȊȕȖȔ Ȑ șȖȞȐȈȓȤȕȖȔ ȌȖȔȍȕȈȝ, ȐȕȐȞȐȐȘțȦȡȐȝșȧ ȕȈ ȋȘȈȕȐȞȍ ȐȕȜȖȘȔȈȞȐȖȕȕȖȋȖ ȌȖȔȍȕȈ ș ȊȖșȗȘȐȧȚȐȧ ȐȔȍȦȡȍȑșȧ ȐȕȜȖȘȔȈȞȐȐ Ȑ ȏȈȒȈȕȟȐȊȈȦȡȐȝșȧ ȕȍȗȖșȘȍȌșȚȊȍȕȕȖ ȌȖ ȗȘȍȌȗȘȐȧȚȐȧ ȌȍȑșȚȊȐȑ, șȖȏȌȈȦȡȐȝ ȥȜȜȍȒȚȣ ȊȖ Ȋșȍȝ ȌȖȔȍȕȈȝ (ȕȈȗȘȐȔȍȘ, ȗȘȐȔȍȕȍȕȐȍ ȖȘțȎȐȧ Ȋ ȜȐȏȐȟȍșȒȖȔ ȌȖȔȍȕȍ, ȗȘȐȊȖȌȧȡȍȍ Ȓ ȗȘȧȔȣȔ Ȑ ȕȍȗȘȧȔȣȔ ȥȜȜȍȒȚȈȔ, ȘȈȏȊȖȘȈȟȐȊȈȕȐȍ ȗșȐȐȓȐ ȐȕȜȖȘȔȈȞȐȖȕȕȣȝ ȒȈȔȗȈȕȐȑ, ȗȘȐȏȊȈȕȕȣȝ ȖȒȈȏȣȊȈȚȤ ȗȘȧȔȖȍ ȊȖȏȌȍȑșȚȊȐȍ ȕȈ ȒȖȋȕȐȚȐȊȕȣȑ Ȑ ȐȕȜȖȘȔȈȞȐȖȕȕȣȑ ȌȖȔȍȕȣ, Ȉ ȚȈȒȎȍ ȕȍȗȘȧȔȣȍ ȥȜȜȍȒȚȣ Ȋ ȜȐȏȐȟȍșȒȖȔ ȌȖȔȍȕȍ). Alberts, David S. and Richard E. Hayes.

Understanding Command and Control, pp. 64-66.

2 Ǫ ȌȈȕȕȖȔ șȓțȟȈȍ ȗȖȌ ȗȘȖșȚȘȈȕșȚȊȖȔ ȗȖȌȘȈȏțȔȍȊȈȍȚșȧ ȕȍ ȋȍȖȋȘȈȜȐȟȍșȒȖȍ ȗȘȖșȚȘȈȕșȚȊȖ, ȕȖ ȜȖȘȔȐȘțȍȔȖȍ ȟȍȚȣȘȤȔȧ ȌȖȔȍȕȈȔȐ ȗȘȖșȚȘȈȕșȚȊȖ ȊȖȑȕȣ 21 ȊȍȒȈ.

257

ǸȈȟȤȧ ǨǸǯǻǴǨǵȇǵ

3.ǪȕȍȌȘȍȕȐȍ ȗȘȐȕȞȐȗȖȊ șȍȚȍȞȍȕȚȘȐȟȕȣȝ ȊȖȑȕ

3.1ǹȚȘȈȚȍȋȐȧ ȊȕȍȌȘȍȕȐȧ ȗȘȐȕȞȐȗȖȊ șȍȚȍȞȍȕȚȘȐȟȕȣȝ ȊȖȑȕ

ǹȚȘȈȚȍȋȐȧ ȊȕȍȌȘȍȕȐȧ ȚȍȖȘȐȐ ǹǾǪ ǴȐȕȐșȚȍȘșȚȊȈ ȖȉȖȘȖȕȣ ǹȀǨ ȉȈȏȐȘțȍȚșȧ ȕȈ ȚȘȍȝ ȗȘȐȕȞȐȗȈȝ: ȖȗȘȍȌȍȓȍȕȐȍ ȗȘȐȖȘȐȚȍȚȖȊ, ȌȈȦȡȐȝ ȊȖȏȔȖȎȕȖșȚȤ ȘȈȏȊȐȊȈȚȤ Ȑ ȊȕȍȌȘȧȚȤ șȍȚȍȞȍȕȚȘȐȟȕȣȍ ȒȖȕȞȍȗȞȐȐ Ȑ ȊȖȏȔȖȎȕȖșȚȐ; ȖȗȘȍȌȍȓȍȕȐȍ ȒȖȕȒȘȍȚȕȣȝ Ȟȍȓȍȑ Ȑ ȖȞȍȕȒȈ ȗȘȖȋȘȍșșȈ ȗȖ Ȑȝ ȌȖșȚȐȎȍȕȐȦ; ȗȘȍȖȌȖȓȍȕȐȍ ȊȖȏȕȐȒȈȦȡȐȝ ȗȘȍȗȧȚșȚȊȐȑ1.

ǶȗȘȍȌȍȓȍȕȐȍ ȗȘȐȖȘȐȚȍȚȖȊ. Ǫ ȒȈȟȍșȚȊȍ ȗȘȐȖȘȐȚȍȚȈ ȗȘȐȏȕȈȍȚșȧ ȕȍȖȉȝȖȌȐȔȖșȚȤ ȘȈȏȊȖȘȈȟȐȊȈȕȐȧ ȘȖȉȈșȚȕȖȑ șȍȚȐ, ȖȝȊȈȚȣȊȈȦȡȍȑ ȒȘȐȚȐȟȍșȒțȦ ȟȈșȚȤ ǶȉȢȍȌȐȕȍȕȕȣȝ șȐȓ, ȒȖȚȖȘȈȧ ȘȈșșȔȈȚȘȐȊȈȍȚșȧ ȒȈȒ «ȗȓȈȚȈ ȏȈ ȊȝȖȌ» Ȑ «ȗȘȖȗțșȒ» Ȓ ȊȕȍȌȘȍȕȐȦ ȗȘȐȕȞȐȗȖȊ ǹǾǪ. ǹȖȏȌȈȕȐȍ ȚȈȒȖȑ șȍȚȐ ȚȘȍȉțȍȚ ȘȍȠȍȕȐȧ ȗȘȖȉȓȍȔȣ șȖȊȔȍșȚȐȔȖșȚȐ țȎȍ ȘȈȏȊȍȘȕțȚȣȝ șȍȚȍȑ, ȒȖȚȖȘȈȧ ȕȍ ȌȖȓȎȕȈ ȗȘȐȕȖșȐȚȤșȧ Ȋ ȎȍȘȚȊț ȒȘȈȚȒȖșȘȖȟȕȣȔ ȏȈȌȈȟȈȔ. ǶȉȢȍȒȚȣ ȗȘȖșȚȘȈȕșȚȊȈ ȉȖȧ – șȍȕșȖȘȣ, ȗȓȈȚȜȖȘȔȣ, șȖȓȌȈȚȣ, ȗȖȌȘȈȏȌȍȓȍȕȐȧ – ȌȖȓȎȕȣ ȉȣȚȤ ȋȖȚȖȊȣ Ȓ șȍȚȐ. ǺȈȒȎȍ ȌȖȓȎȕȣ ȉȣȚȤ ȗȘȍȌȗȘȐȕȧȚȣ ȌȖȗȖȓȕȐȚȍȓȤȕȣȍ țșȐȓȐȧ ȗȖ ȘȈȏȊȐȚȐȦ țȘȖȊȕȧ ȖȉȔȍȕȈ șȐȚțȈȞȐȖȕȕȖȑ ȖșȊȍȌȖȔȓȍȕȕȖșȚȤȦ Ȑ ȘȈȏȘȈȉȖȚȒȐ ȕȖȊȣȝ ȖȘȋȈȕȐȏȈȞȐȖȕȕȣȝ ȜȖȘȔ Ȍȓȧ ȌȖșȚȐȎȍȕȐȧ șȐȕȝȘȖȕȐȏȈȞȐȐ. ǬȖȓȎȕȖ ȉȣȚȤ țȌȍȓȍȕȖ ȌȖȓȎȕȖȍ ȊȕȐȔȈȕȐȍ ȘȈȏȘȈȉȖȚȒȍ ȕȖȊȣȝ ȔȖȌȍȓȍȑ Ȑ ȒȖȕȞȍȗȞȐȑ, ȔȖȌȍȓȐȘțȦȡȐȝ șȍȚȍȞȍȕȚȘȐȟȕȣȍ ȊȖȏȔȖȎȕȖșȚȐ Ȑ ȗȖȏȊȖȓȧȦȡȐȝ ȓțȟȠȍ ȗȖȕȐȔȈȚȤ Ȑ țȗȘȈȊȓȧȚȤ șȓȖȎȕȣȔȐ șȍȚȧȔȐ.

ǶȗȘȍȌȍȓȍȕȐȍ Ȟȍȓȍȑ Ȑ ȖȞȍȕȒȈ ȗȘȖȋȘȍșșȈ. ǵȍȖȉȝȖȌȐȔȖ ȟȍȚȒȖ ȖȗȘȍȌȍȓȐȚȤ ȞȍȓȐ, ȌȖșȚȐȎȍȕȐȍ ȒȖȚȖȘȣȝ șȗȖșȖȉșȚȊțȍȚ ȊȕȍȌȘȍȕȐȦ ȗȘȐȕȞȐȗȖȊ ǹǾǪ. ǷȍȘȊȖȖȟȍȘȍȌȕȖȑ ȞȍȓȤȦ ȗȘȐȏȕȈȍȚșȧ ȊȖȏȔȖȎȕȖșȚȤ șȖȏȌȈȕȐȧ ȘȖȉȈșȚȕȣȝ șȍȚȍȊȣȝ ǶȉȢȍȌȐȕȍȕȕȣȝ șȐȓ (robustly networked Joint Force), ȒȖȚȖȘȣȍ ȉțȌțȚ Ȋ șȖșȚȖȧȕȐȐ ȐșȗȖȓȤȏȖȊȈȚȤ șȍȚȍȞȍȕȚȘȐȟȕȣȍ ȒȖȕȞȍȗȞȐȐ Ȑ ȊȖȏȔȖȎȕȖșȚȐ. ǬȖȓȎȕȣ ȉȣȚȤ ȘȈȏȘȈȉȖȚȈȕȣ ȔȍȚȘȐȒȐ, ȗȖȏȊȖȓȧȦȡȐȍ ȖȞȍȕȐȚȤ ȗȘȖȋȘȍșș Ȑ țșȐȓȐȧ ȗȖ ȘȈȏȊȐȚȐȦ ȒȓȦȟȍȊȣȝ ȈșȗȍȒȚȖȊ ǹǾǪ.

ǷȘȍȖȌȖȓȍȊȈȚȤ ȗȘȍȋȘȈȌȣ ȕȈ ȗțȚȐ ȗȘȖȋȘȍșșȈ. ǹțȡȍșȚȊțȦȚ ȗȘȖȉȓȍȔȣ ȗȘȍȖȌȖȓȍȕȐȧ ȗȘȍȗȧȚșȚȊȐȑ, ȊȖȏȕȐȒȈȦȡȐȝ ȗȘȐ ȊȕȍȌȘȍȕȐȐ ȗȘȐȕȞȐȗȖȊ ǹǾǪ, ȉȖȓȤȠȈȧ ȟȈșȚȤ ȒȖȚȖȘȣȝ ȔȖȎȍȚ ȉȣȚȤ ȘȍȠȍȕȈ ȟȍȘȍȏ ȜȖȒțșȐȘȖȊȈȕȐȍ țșȐȓȐȑ ȕȈ șȖȖȚȊȍȚșȚȊțȦȡȐȝ ȒȘȐȚȐȟȕȣȝ ȖȉȓȈșȚȧȝ. Ǫ ȕȈșȚȖȧȡȍȍ ȊȘȍȔȧ ȚȈȒȖȊȣȔȐ ȧȊȓȧȦȚșȧ ȗȘȖȉȓȍȔȣ ȉȍȏȖȗȈșȕȖșȚȐ Ȋ șȍȚȐ, șȖȊȔȍșȚȐȔȖșȚȐ șȍȚȍȑ Ȑ ȗȖȕȐȔȈȕȐȧ ȟȍȓȖȊȍȟȍșȒȖȋȖ Ȑ ȖȘȋȈȕȐȏȈȞȐȖȕȕȖȋȖ ȗȖȊȍȌȍȕȐȧ. ǹȖȏȌȈȕȐȍ șȖȖȚȊȍȚșȚȊțȦȡȍȑ ȐȕȕȖȊȈȞȐȖȕȕȖȑ Ȑ ȒȘȍȈȚȐȊȕȖȑ șȘȍȌȣ ȟȍȘȍȏ ȓțȟȠȍȍ ȗȖȕȐȔȈȕȐȍ ȐȕȌȐȊȐȌțȈȓȤȕȖȋȖ, ȒȖȔȈȕȌȕȖȋȖ, ȖȘȋȈȕȐȏȈȞȐȖȕȕȖȋȖ Ȑ ȒțȓȤȚțȘȕȖȋȖ ȗȖȊȍȌȍȕȐȧ ȉțȌȍȚ șȗȖșȖȉșȚȊȖȊȈȚȤ ȘȈȏȊȍȘȚȣȊȈȕȐȦ Ȋ ȗȖȓȕȖȔ ȖȉȢȍȔȍ ȗȖȚȍȕȞȐȈȓȈ ǹǾǪ Ȑ ȏȕȈȟȐȚȍȓȤȕȖ țșȒȖȘȐȚ ȗȘȖȋȘȍșș. ǵȐȎȍ ȘȈșșȔȈȚȘȐȊȈȍȚșȧ ȘȧȌ ȗȘȐȔȍȘȖȊ ȊȕȍȌȘȍȕȐȧ șȍȚȍȞȍȕȚȘȐȟȕȣȝ ȗȘȐȕȞȐȗȖȊ Ȋ ȊȖȖȘțȎȍȕȕȣȝ șȐȓȈȝ ȘȧȌȈ șȚȘȈȕ Ȑ ǵǨǺǶ.

1 Cebrowski, The Implementation of Network-Centric Warfare, p. 11.

258