Preview

Power to the Edge

Powerful Essays
Open Document
Open Document
65341 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Power to the Edge
Information Age Transformation Series

Power to the

Edge
Command... Control... in the Information Age

David S. Alberts Richard E. Hayes with a Foreword by John Stenbit

About the CCRP
The Command and Control Research Program (CCRP) has the mission of improving DoD’s understanding of the national security implications of the Information Age. Focusing upon improving both the state of the art and the state of the practice of command and control, the CCRP helps DoD take full advantage of the opportunities afforded by emerging technologies. The CCRP pursues a broad program of research and analysis in information superiority, information operations, command and control theory, and associated operational concepts that enable us to leverage shared awareness to improve the effectiveness and efficiency of assigned missions. An important aspect of the CCRP program is its ability to serve as a bridge between the operational, technical, analytical, and educational communities. The CCRP provides leadership for the command and control research community by: • articulating critical research issues; • working to strengthen command and control research infrastructure; • sponsoring a series of workshops and symposia; • serving as a clearing house for command and control related research funding; and • disseminating outreach initiatives that include the CCRP Publication Series.

This is a continuation in the series of publications produced by the Center for Advanced Concepts and Technology (ACT), which was created as a “skunk works” with funding provided by the CCRP under the auspices of the Assistant Secretary of Defense (NII). This program has demonstrated the importance of having a research program focused on the national security implications of the Information Age. It develops the theoretical foundations to provide DoD with information superiority and highlights the importance of active outreach and dissemination initiatives designed to acquaint senior military



Bibliography: (Maurer, 1994) Peace operations differ in significant ways from traditional combat missions The Mesh and the Net (Libicki, 1994) Command Arrangements for Peace Operations (Alberts & Hayes, 1995) (Libicki, 1995) The inability of computers to "talk" to one another is a major problem, especially for today 's high technology military forces What Is Information Warfare?* (Libicki, 1995) (Alberts & Hayes, 1995) This report documents the fourth in a series of workshops and roundtables organized by the INSS Center for Advanced Concepts and Technology (ACT) Interagency and Political-Military Dimensions of Peace Operations: Haiti - A Case Study (Hayes & Wheatley, 1996) The Unintended Consequences of the Information Age* (Alberts, 1996) Joint Training for Information Managers* (Maxwell, 1996) Defensive Information Warfare* (Alberts, 1996)

You May Also Find These Documents Helpful

  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    The U.S. Department of Defense (DoD) Information Security policy is managed by the Defense Information Systems Agency. DISA, one of five Combat Support Agencies designated by the Secretary of Defensei, administers “command and control (C2)” functions, information sharing effectiveness, and global operational information infrastructure projects, while providing support to force warfighters, national-level leaders, and coalition friendly forces across a wide range of undertakings. DISA’s perception is to “provide information superiority in defense of the United States.”…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Mccc Study Guide

    • 1046 Words
    • 5 Pages

    Preparation ⁃ Security ⁃ Disruption ⁃ Massing Effects ⁃ Flexibility 6. CHARACTERISTICS OF OFFENSIVE OPERATIONS (FM 3-0) ⁃ Surprise ⁃ Concentration ⁃ Audacity ⁃ Tempo 7. FORMS OF MANEUVER (FM 3.90) ⁃ Envelopment ⁃ Turning Movement ⁃ Infiltration ⁃ Penetration ⁃ Frontal Attack 8. TENETS OF BREACHING OPERATIONS (FM 3-21.10) ⁃ Intelligence ⁃ Breach Fundamentals ⁃ Breach Organization ⁃ Mass ⁃ Synchronization 9.…

    • 1046 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Hunter, T. B. (2011). Tips of the Trident. A History of the U.S. Navy 's Elite Counterrorism Team Since 9/11. Journal Of Counterterrorism & Homeland Security International, 17(3), 26-30.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    The events of September 11th, 2001 have had a larger impact on the United States Intelligence Community than any single event in its history. It forced the U.S. Intelligence community to look critically at their policies, organization, and how they handled business. The Joint Inquiry, 9/11 Commission, and Inspectors General found numerous deficiencies in communication, technological capabilities, and limited oversight. The government responded to these gaps through creation of legislation, implementation of regulations, a massive restructuring of the intelligence community, and utilization of new technologies.…

    • 1813 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The Department of Defense must attempt to combat all of the methods the enemy utilizes to monitor our forces, whether conducting daily activities in the U.S. or various operations abroad. In order…

    • 572 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Final

    • 2470 Words
    • 10 Pages

    Nici, A. (2012, June 13). Live Chat 8. Retrieved June 17, 2012, from Colorado Technical University Online: http://ctuadobeconnect.careeredonline.com/p40409790/?session=breez7v2shdtvkg68ppoi…

    • 2470 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    “Charles Goslin, Vice President of International Operations for Duos Technologies, Inc., is an international expert in security threat and risk assessment. He developed his extensive security experience as a veteran operations officer for 27 years with the Central Intelligence Agency. He is skilled in developing and executing programs targeting terrorism, espionage, weapons proliferation, and other select U.S. national security objective. He brings a unique, ground-level perspective to security challenges that can only come from a lifetime spent mitigating risk, in all its forms, while living and working abroad. His most recent…

    • 2262 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Federal Tort Claims Act

    • 1331 Words
    • 6 Pages

    Assistant Secretary of Defense for Homeland Defense and America 's Security Affairs. (n.d.). Retrieved September 22, 2004 from http://policy.defense.gov…

    • 1331 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Texas History Voting

    • 2541 Words
    • 11 Pages

    National Security Archive . (2008, January 2). Retrieved July 19, 2013, from National Security Achive George Washington University: http://www.gwu.edu/~nsarchiv/news/20071218/…

    • 2541 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Law Enforcement Paper

    • 1265 Words
    • 6 Pages

    The FBI’s efforts in combating terrorism included collecting, analyzing, and sharing information and critical intelligence with other federal agencies and departments. Some of these departments are the Central Intelligence Agency (CIA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) as well as other agencies across the country (Schmalleger, 2009). Some changes were made by the FBI as a result of September, 11, 2001. For example, the FBI has made modernization of its information technology (IT) systems a top-level priority. This is a multi-phased program code-named Trilogy. With Trilogy, the FBI can do three important things: First, the FBI has deployed a secure high-speed network that enables people in the FBI offices around the country to share data, including audio, video, and image files. Second, the FBI has given its agents and intelligence analysts more than 30,000 new computers that run several modern software applications. Third, the FBI has developed an IT infrastructure that enables secure communication with FBI intelligence partners (Grabosky,…

    • 1265 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Homeland Security

    • 3491 Words
    • 14 Pages

    Renuart, G. (2009). HOW THE MILITARY SUPPORTS HOMELAND SECURITY. U.S. Naval Institute Proceedings, 135(10), 26-31. Retrieved from Academic Search Premier database.…

    • 3491 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    The attraction of effects-based operations (EBO) is the prospect of improved efficiency in the planning and conduct of operations. Put simply, EBO can be seen as a coordinated set of actions that are directed at shaping the 1 behaviour of friends, foes and neutrals in peace, crisis and war. In shaping nation states, we would focus on politics, which drives the various dimensions of national power. In shaping the behaviour of non-state actors, the focus would be on ideology. But what brought us to this culminating point that presents EBO as an attractive option? Ed Smith has suggested that the combination of three technology revolutions – sensor, information and weapons – combined with the promise of network-centric thinking within an effects-based approach 2 herald enormous promise for improved efficiency as well as effectiveness. Sensor technology, which essentially provides situational awareness, offers the promise of comprehensive, near-real-time surveillance over vast areas and facilitates the move toward smaller, cheaper, more numerous sensors that can be networked to detect, locate, identify, and track targets. It’s not the sensor technology itself that is important to EBO; rather, it’s the information that the sensors provide. Information technology, which essentially provides the network backbone, offers the potential to expand the capability of the sensors both by better integrating the data collected and by allowing the sensors to interactively build on one another’s efforts. Furthermore, the scope and scale of the data provided by the sensor revolution is likely to be of such a quantity that it would be unmanageable if it were not for an information revolution that will bring the geometric increase in computing power necessary to process, collate, and analyse the resulting quantity of sensor data. Again, it’s not the…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sialkot Sport Industry

    • 42571 Words
    • 171 Pages

    SUBJECT: Change in distribution statement for Validating a Method for Enhanced Communications and Situational Awareness at the Incident Command Level – March 2006. 1. Reference: Graham, James H. Validating a Method for Enhanced Communications and Situational Awareness at the Incident Command Level. Monterey, CA: Naval Postgraduate School, March 2006. UNCLASSIFIED, [Distribution authorized to U.S. Government Agencies only; (Proprietary Information); (March 2006)]. 2. Upon consultation with NPS faculty, the School has determined that this thesis may be released to the public and that its distribution is unlimited, effective July 21, 2009.…

    • 42571 Words
    • 171 Pages
    Good Essays
  • Powerful Essays

    Converging Technologies

    • 2434 Words
    • 10 Pages

    will become increasingly dominant in the years to come. The information warfare of tomorrow will be radically different from its prototype today. No longer will it be confined to the mainframes of the Internet or to corporate databases: the battleground of the future will draw into its scope the scientific advances being made today in bio- and nano- technologies. The divisions between man and machine will blur.…

    • 2434 Words
    • 10 Pages
    Powerful Essays

Related Topics