Defense Policy Strategy based on Network Centric Warfare (NCW) toward Asymmetric Threats: Case study from an Indonesian Perspective

Authors

  • Nengah Putra Indonesia Defense University, IPSC Sentul, Sukahati, Citeureup, Bogor, Jawa Barat, Indonesia
  • April Kukuh Susilo Sekolah Tinggi Teknologi Angkatan Laut, Morokrembangan, Surabaya, Jawa Timur, Indonesia

DOI:

https://doi.org/10.15575/join.v11i1.1747

Keywords:

Asymmetric threats, Command Control Communications, Defense Strategy Intelligence , Network Centric Warfare, Policy Strategy, Reconnaissance

Abstract

Implementation of NCW as a core element of defense policy requires a comprehensive strategic framework. Without these basic elements, NCW may remain underutilized or fail to deliver the desired results in the face of asymmetric threats. Therefore, it is important to explore a Network Centric Warfare (NCW)-based defense strategy in addressing asymmetric threats. This paper seeks to analyze the formulation of a defense policy strategy based on the principles of Network Centric Warfare (NCW) to effectively address asymmetric threats by exploring the theoretical foundations of NCW in Indonesia Perspective. The analysis of NCW implementation strategies focuses on information superiority, communication speed, and cross-unit coordination as strategic solutions for detecting and responding to non-linear attack patterns. NCW-based defense strategies require inter-sectoral synergy as part of a holistic national security approach. Given the nature of asymmetric threats, which often involve non-state actors and span multiple domains (physical, digital, social), collaboration between the Indonesian National Armed Forces (TNI), the Indonesian National Police (Polri), the National Cyber and Cryptography Agency (BSSN), the State Intelligence Agency (BIN), and government and private institutions is crucial. NCW provides a technological framework and systems that can integrate these various actors into a national defense strategy that is responsive, adaptive, and collaborative in addressing the complexity of contemporary threats. The primary contribution of this paper is to formulate a defense policy strategy based on Network-Centric Warfare (NCW) principles, which is not only important for assessing NCW in the naval domain but also has potential application in a joint, interagency environment in Indonesia.

References

[1] M. Corominas-Bosch, “Bargaining with asymmetric threat points,” Econ. Lett., vol. 69, no. 3, pp. 333–339, 2000, doi: 10.1016/S0165-1765(00)00319-0.

[2] N. Brzica, “Understanding contemporary asymmetric threats,” Croat. Int. Relations Rev., vol. 24, no. 83, pp. 34–51, 2018, doi: 10.2478/cirr-2018-0013.

[3] T. Hovardas, “An ‘asymmetric Threat’ That Should Have Been Anticipated: Political Discourse on 2007 Wildfires in Greece,” Environ. Commun., vol. 9, no. 4, pp. 409–427, 2015, doi: 10.1080/17524032.2014.981282.

[4] S. Lee, “Terrorism and asymmetric war: Is North Korea a threat?,” East Asia An Int. Q., vol. 20, no. 2, pp. 21–47, 2003.

[5] D. Snowden, “Perspectives around emergent connectivity, sense-making and asymmetric threat management,” Public Money Manag., vol. 26, no. 5, pp. 275–277, 2006, doi: 10.1111/j.1467-9302.2006.00539.x.

[6] I. Maoz and C. McCauley, “Threat, dehumanization, and support for retaliatory aggressive policies in asymmetric conflict,” J. Conflict Resolut., vol. 52, no. 1, pp. 93–116, 2008, doi: 10.1177/0022002707308597.

[7] A. Almalawi, S. Hassan, A. Fahad, A. Iqbal, and A. I. Khan, “Hybrid Cybersecurity for Asymmetric Threats: Intrusion Detection and SCADA System Protection Innovations,” Symmetry (Basel)., vol. 17, no. 4, 2025, doi: 10.3390/sym17040616.

[8] M. Dillon, “Network Society, Network-centric Warfare and the State of Emergency,” Theory, Cult. Soc., vol. 19, no. 4, pp. 71–79, 2002, doi: 10.1177/0263276402019004005.

[9] N. H. Nguyen, M. A. Vu, A. N. Ta, D. V. Bui, and M. D. Hy, “Optimizing fire allocation in a Network Centric Warfare-type model,” J. Def. Model. Simul., vol. 19, no. 4, pp. 691–701, 2022, doi: 10.1177/15485129211022861.

[10] B. G. Kang, K.-M. Seo, and T. G. Kim, “Communication analysis of network-centric warfare via transformation of system of systems model into integrated system model using neural network,” Complexity, vol. 2018, 2018, doi: 10.1155/2018/6201356.

[11] C. K. Pang and J. Mathew, “Dynamically reconfigurable command and control structure for network-centric warfare,” Simulation, vol. 91, no. 5, pp. 417–431, 2015, doi: 10.1177/0037549715581076.

[12] D. M. Gormley and D. M. Hart, “Extending network‐centric warfare to coalition crisis management and assessment,” RUSI J., vol. 145, no. 2, pp. 67–72, 2000, doi: 10.1080/03071840008446512.

[13] Y. S. Liang and N. T. Zhang, “Study on QOS routing in network centric warfare,” Chinese J. Aeronaut., vol. 18, no. 3, pp. 250–255, 2005, doi: 10.1016/S1000-9361(11)60306-3.

[14] H. D. Tunnell, “The U.S. Army and network-centric warfare a thematic analysis of the literature,” Proc. - IEEE Mil. Commun. Conf. MILCOM, vol. 2015-Decem, pp. 889–894, 2015, doi: 10.1109/MILCOM.2015.7357558.

[15] H. Li, G. Yan, X. Zhao, J. Zhang, and M. Lyu, “Tactical mission event logic graph construction for Network-Centric Warfare,” Alexandria Eng. J., vol. 61, no. 11, pp. 9161–9173, 2022, doi: 10.1016/j.aej.2022.02.055.

[16] K. S. Kolet, “Asymmetric Threats to the United States,” Comp. Strateg., vol. 20, no. 3, pp. 277–292, 2001, doi: 10.1080/014959301753228894.

[17] N. Carpintero-santamaría, “Terrorism : An Electronic Journal and Knowledge Base Volume I , Number 2 Asymmetric Threats,” vol. I, no. 2, 2012.

[18] S. Lambakis, J. Kiras, and K. Kolet, “Understanding ‘Asymmetric’ Threats to the United States,” Comp. Strateg., vol. 21, no. 4, pp. 241–277, 2002, doi: 10.1080/01495930290043065a.

[19] S. Blank, “Rethinking the concept of asymmetric threats in u.s. strategy,” Comp. Strateg., vol. 23, no. 4–5, pp. 343–367, 2004, doi: 10.1080/01495930490898759.

[20] T. Yan and B. Wang, “Grid architecture model of network centric warfare,” J. Syst. Eng. Electron., vol. 17, no. 1, pp. 121–125, 2006, doi: 10.1016/S1004-4132(06)60022-4.

[21] Y. Liang and N. Zhang, “Research on performance of ethernet interface in network centric warfare,” J. Syst. Eng. Electron., vol. 15, no. 4, pp. 546–552, 2004, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-13944279230&partnerID=40&md5=3453f837184f69b1cd94d104ae576019

[22] S. Mishra, “Network centric warfare in the context of ‘operation Iraqi freedom,’” Strateg. Anal., vol. 27, no. 4, pp. 546–562, 2003, doi: 10.1080/09700160308450107.

[23] A. J. Masys, “Syndromic surveillance and bioterrorism: Embracing the network-centric warfare paradigm,” Disaster Prev. Manag. An Int. J., vol. 13, no. 5, pp. 351–355, 2004, doi: 10.1108/09653560410568462.

[24] E. J. Dahl, “Network centric warfare and the death of operational art,” Def. Stud., vol. 2, no. 1, pp. 1–24, 2002, doi: 10.1080/14702430208405009.

[25] V. Krishnamurthy, “Emission management for low probability intercept sensors in network centric warfare,” IEEE Trans. Aerosp. Electron. Syst., vol. 41, no. 1, pp. 133–152, 2005, doi: 10.1109/TAES.2005.1413752.

[26] B. J. Archuleta, “Rediscovering Defense Policy: A Public Policy Call to Arms,” Policy Stud. J., vol. 44, pp. S50–S69, 2016, doi: 10.1111/psj.12157.

[27] J. Liedtka, “In defense of strategy as design,” Calif. Manage. Rev., vol. 42, no. 3, pp. 8–30, 2000.

[28] M. Cepik and F. Licks Bertol, “Defense policy in Brazil: bridging the gap between ends and means?,” Def. Stud., vol. 16, no. 3, pp. 229–247, 2016, doi: 10.1080/14702436.2016.1180959.

[29] M. S. Alexander, “Did the Deuxieme Bureau Work? The Role of Intelligence in French Defence Policy and Strategy, 1919–39,” Intell. Natl. Secur., vol. 6, no. 2, pp. 293–333, 1991, doi: 10.1080/02684529108432105.

[30] C. Leuprecht and J. J. Sokolsky, “Defense Policy ‘Walmart Style’: Canadian Lessons in ‘not-so-grand’ Grand Strategy,” Armed Forces Soc., vol. 41, no. 3, pp. 541–562, 2015, doi: 10.1177/0095327X14536562.

[31] D. L. Bland, “Controlling the Defense Policy Process in Canada: White Papers on Defense and Bureaucratic Politics in the Denartment of National Defence,” Def. Anal., vol. 5, no. 1, pp. 3–17, 1989, doi: 10.1080/07430178908405374.

[32] C. Hoeffler and J. Joana, “The impact of austerity: spending cuts, coping strategies and institutional change in the case of French defense policy,” Def. Stud., vol. 22, no. 3, pp. 448–463, 2022, doi: 10.1080/14702436.2022.2080660.

[33] M. Steinbrecher and H. Biehl, “Military Know-Nothings or (At Least) Military Know-Somethings?: Knowledge of Defense Policy in Germany and Its Determinants,” Armed Forces Soc., vol. 46, no. 2, pp. 302–322, 2020, doi: 10.1177/0095327X18811384.

[34] A. Dorman, “Reconciling Britain to Europein the Next Millennium: The Evolution of British Defense Policy in the Post-Cold War Era,” Def. Anal., vol. 17, no. 2, pp. 187–202, 2001, doi: 10.1080/07430170120064258.

[35] A. Barokah, N. Nurmalia, F. M. Putri, and M. Nurholizah, “STUDI LITERATUR : ANALISIS EFEKTIVITAS PENGGUNAAN MEDIA TSTS (TWO STAY TWO STRAY) TERHADAP KEMAMPUAN BERPIKIR KRITIS PESERTA DIDIK SEKOLAH DASAR PADA MATA PELAJARAN IPA,” Bunayya J. Pendidik. Anak, vol. 10, no. 1, pp. 73–87, 2024.

[36] I. P. Syafa, M. Putri, N. Z. E. Setiawati, and A. Marin, “Pengaruh Media Pembelajaran Literasi Berbasis E-Modul terhadap Pembentukan Karakter Siswa Sekolah Dasar (Studi Literatur),” J. Pendidik. Dasar Dan Sos. Hum., vol. 2, no. 2, pp. 315–330, 2022, [Online]. Available: https://www.bajangjournal.com/index.php/JPDSH/article/view/4228/3202

[37] I. Onodera, “Japan’s New National Security Policy and Defense Strategy in a New Era,” Asia-Pacific Rev., vol. 26, no. 2, pp. 37–49, 2019, doi: 10.1080/13439006.2019.1688928.

[38] D. Güres, “Turkey’s Defence policy: The role of the armed forces and strategy, concepts and capabilities,” RUSI J., vol. 138, no. 3, pp. 1–6, 1993, doi: 10.1080/03071849308445707.

[39] J. B. Lyons, S. D. Swindler, and J. A. White, “Network centric warfare: Organizational collaboration as a key enabler,” 2008 Int. Symp. Collab. Technol. Syst. CTS’08, pp. 367–374, 2008, doi: 10.1109/CTS.2008.4543952.

[40] M. Guha, “Technical ecstasy: Network-centric warfare redux,” Secur. Dialogue, vol. 53, no. 3, pp. 185–201, 2022, doi: 10.1177/0967010621990309.

[41] M. Persson and G. Rigas, “Complexity: The dark side of network-centric warfare,” Cogn. Technol. Work, vol. 16, no. 1, pp. 103–115, 2014, doi: 10.1007/s10111-012-0248-1.

[42] W. Cheng and W. Chu, “SOA-based network-centric software architecture for warfare simulation applications,” Xitong Fangzhen Xuebao / J. Syst. Simul., vol. 28, no. 1, pp. 77–82, 2016, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-84960401434&partnerID=40&md5=5ad6316708c1dd498ed1f88c84ea0043

[43] D. M. Johnston, “An asymmetric counter to the asymmetric threat,” Rev. Educ. Pedagog. Cult. Stud., vol. 35, no. 1, pp. 9–14, 2013, doi: 10.1080/10803920.2013.757955.

[44] J. Tawa, “Asymmetric peer selections among Blacks, Asians, and Whites in a virtual environment: Preliminary evidence for triangulated threat theory,” J. Soc. Psychol., vol. 157, no. 6, pp. 736–753, 2017, doi: 10.1080/00224545.2017.1294140.

Downloads

Published

2026-05-14

Issue

Section

Article

Citation Check

Similar Articles

<< < 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.