tags: [concept, doctrine, intelligence_theory, algorithmic_warfare, military_strategy] last_updated: 2026-03-23 # Data-Centric Warfare ## Core Definition (BLUF) [[Data-Centric Warfare]] is a contemporary military doctrine that conceptualises data—rather than physical platforms, troop formations, or geographic terrain—as the primary strategic asset and centre of gravity in modern conflict. Its primary strategic purpose is to achieve absolute [[Decision Superiority]] by ensuring that high-quality, standardised, and interoperable data is instantaneously available to commanders and artificial intelligence systems across all domains, thereby accelerating the [[Sensor-to-Shooter Timeline]] and enabling the orchestration of a distributed [[Kill Web]]. ## Epistemology & Historical Origins The epistemology of this doctrine represents the maturation and supersession of late-20th-century [[Network-Centric Warfare]] (NCW). While NCW focused primarily on the physical hardware and datalinks required to connect disparate platforms, Data-Centric Warfare, codified in the early 2020s by institutions like the [[United States Department of Defense]] under the [[Joint All-Domain Command and Control]] (JADC2) framework, treats the data itself as the foundational weapon system. This paradigm shift was heavily accelerated by the commercial technology sector's transition to cloud computing, edge processing, and [[Machine Learning]]. Concurrently, the [[People's Liberation Army]] of the [[People's Republic of China]] adopted a parallel epistemology, viewing data as a critical national resource necessary to fuel its doctrine of [[Intelligentised Warfare]], thereby framing geopolitical competition as a race for data accumulation and algorithmic processing power rather than purely industrial capacity. ## Operational Mechanics (How it Works) The transition to a data-centric force structure requires a radical overhaul of traditional military bureaucracy and IT infrastructure, relying on several core pillars: * **Data Standardisation & Interoperability:** Breaking down intelligence 'stovepipes'. Data collected by a naval radar must be formatted so that it is instantly machine-readable by an army artillery unit or an air force interceptor, necessitating universal, cross-service data ontologies. * **Cloud & Edge Computing:** Moving away from vulnerable, centralised physical servers. The doctrine relies on distributed cloud architectures that push computational processing power to the 'tactical edge' (e.g., placing micro-servers on infantry vehicles or autonomous drones). This allows forces to process data locally and maintain operational continuity even in austere, electronically jammed environments. * **Zero Trust Architecture:** Because data must be universally accessible across the multi-domain battlespace, traditional perimeter defence is obsolete. Security relies on the continuous, algorithmic verification of every user, device, and software microservice requesting access to the data lake, regardless of their position inside or outside the network. * **Algorithmic Triage:** The sheer volume of ingested data vastly exceeds human cognitive capacity (leading to [[Data Asphyxiation]]). The doctrine mandates the use of [[Artificial Intelligence]] to autonomously clean, tag, and fuse raw multi-modal data into a unified [[Common Operating Picture]], effectively establishing the operational prerequisite for [[Algorithmic Warfare]]. ## Modern Application & Multi-Domain Use * **Kinetic/Military:** Forces are increasingly deployed not merely to seize geographical terrain, but to secure or destroy adversary data nodes. In strike operations, data-centricity allows a commander to completely decouple the sensor from the shooter, utilising algorithms to dynamically pair the most lethal available munition with a target generated by a completely separate service branch, facilitating a highly resilient [[Kill Web]]. * **Cyber/Signals:** The paramount objective of defensive cyber operations shifts from protecting hardware platforms to ensuring data integrity and availability. Offensively, the goal is [[Data Poisoning]]—subtly altering the adversary's databases or manipulating their sensor feeds so their predictive algorithms output strategically disastrous recommendations, inducing systemic [[Automation Bias]] and operational fratricide. * **Cognitive/Information:** The accumulation of massive societal and individual datasets (via [[OSINT]], commercial data brokers, and [[SIGINT]]) enables state intelligence apparatuses to map the human terrain. This allows for the execution of hyper-targeted [[Information Operations]] designed to manipulate the adversary's domestic political consensus, exploiting psychological vulnerabilities with algorithmic precision. ## Historical & Contemporary Case Studies * **Case Study 1: The [[Russo-Ukrainian War]] (2022-Present)** - The conflict served as the primary historical accelerator for data-centric operations in high-intensity conventional warfare. The [[Ukrainian Armed Forces]] successfully integrated disparate, civilian-sourced data (such as citizen reporting applications) with NATO [[ISR]] and commercial satellite imagery into unified, cloud-based architectures like the [[Delta Situational Awareness System]] and [[Palantir Foundry]]. This approach bypassed rigid Soviet-era command structures, proving that superior data fusion and distribution could offset a massive deficit in conventional artillery and heavy armour. * **Case Study 2: [[Project Convergence]] & JADC2 Integration (2020-Present)** - The [[United States Armed Forces]] conducted a series of vast experimentation campaigns to physically manifest the data-centric doctrine. By forcibly linking the disparate, historically siloed data architectures of the Army, Navy, Air Force, and Space Force, the US demonstrated the capacity to pass targeting data from a space-based sensor to a ground-based shooter in a matter of seconds. However, these exercises continuously highlighted the immense friction caused by legacy, proprietary defence software that actively resists open-architecture data interoperability. ## Intersecting Concepts & Synergies * **Enables:** [[Algorithmic Warfare]], [[Joint All-Domain Command and Control]] (JADC2), [[Kill Web]], [[Decision Superiority]], [[Probabilistic Target Nomination]], [[Artificial Intelligence Platform]]. * **Counters/Mitigates:** Intelligence stovepiping, platform-centric [[War of Attrition]], the [[Fog of War]], hierarchical and sluggish [[Command and Control]]. * **Vulnerabilities:** The doctrine creates a critical, existential reliance on commercial technology giants (e.g., [[Amazon Web Services]], [[Microsoft Azure]], [[Palantir Technologies]]), raising severe strategic concerns regarding national digital sovereignty and vendor lock-in. Furthermore, it is acutely vulnerable to sophisticated [[Electronic Warfare]] designed to sever the high-bandwidth datalinks required to transmit vast data lakes across the battlespace, as well as the insidious threat of [[Data Poisoning]], which can mathematically weaponise a state's own data-centric architecture against itself.