{"title":"Military Data Link Integration Application","authors":"James T. Sturdy","doi":"10.21236/ada465745","DOIUrl":"https://doi.org/10.21236/ada465745","url":null,"abstract":"Abstract : The military uses tactical data link radios to send and receive digital voice, data, and video between vehicles and command and control facilities. These data link radios are interfaced to various mission computers and display systems. As outlined in the Joint Tactical Data Link Management Plan, a wide range of legacy military platforms will be upgraded to incorporate new data link radios through 2015 and beyond. The upgrade costs to do this will be enormous if traditional subsystem upgrade approaches are used. A need exists for a common, scalable and low cost military data link integration solution that can be used in multiple and disparate platform applications. The author will discuss such a design approach that can be used on each military platform application. The solution processes new and evolving messages with a database driven design so that the user can control message activation, deactivation, and processing instructions for each unique platform application. The database used for this capability is created by and maintained by the user. This allows a common design to work and to evolve on each unique platform without the need to modify the operational software.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128937693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Network-Centric Enterprise Service for Mediation and Interoperability: The Dynamic Operational Object Registration Service (DOORS)","authors":"Jonathan C. Bollers","doi":"10.21236/ada465772","DOIUrl":"https://doi.org/10.21236/ada465772","url":null,"abstract":"Abstract : Warfighters conducting joint and coalition task force operations and inter-governmental agency operations supporting homeland security must interoperate with C2/C4I systems that possess disparate mapping/visualization and information management infrastructures. These C2/C4I systems are generally built upon dissimilar data representations and stovepipe interfaces. To achieve information superiority while engaged in such operations, commanders must transform component C2/C4I system data into interoperable information and shared knowledge, making the result available for exchange to multiple levels and nodes bases upon need and choice. This level of interoperability is critical for geo-spatially and temporally registered operational object information that comprises situation understanding aspects of a common operational picture, which also extends to supporting drill down information. SAIC's Dynamic Operational Object Registration Service (DOORS) was developed in the anticipation that a properly conceived C2/C4I vocabulary of domain knowledge representation, supported by an ontology-driven adaptive system, and employing meta-data based translation services (mapping of data from each participating system to a common representation) will provide the requisite basis for a network-centric enterprise data mediation service that addresses current interoperability challenges. DOORS provides the mechanism to exchange interoperable information for joint/combined task force operations according to a register-publish-subscribe metaphor that reflects the commander's information exchange requirements.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125144817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View","authors":"Medhat A. Abuhantash, Matthew V. Shoultz","doi":"10.21236/ada466489","DOIUrl":"https://doi.org/10.21236/ada466489","url":null,"abstract":"Abstract : In today's Command and Control (C2) environment critical information is located in many disparate data sources. C2 decision-making can be adversely affected by insufficient or unavailable access to information located in these disparate data sources. This paper will provide an overview of the problems surrounding this issue, a real-world scenario representing the problem, and how the problem was overcome using a network centric approach. The paper will also demonstrate how the application of current technology can be leveraged to present a unified view of data from disparate data sources, and how our organization is leveraging technology to help the Warfighter eliminate the stove-piping of information to increase network centricity. The objective of this paper is to present the reader with insight on how to utilize today's technology to allow leaders to make well-informed decisions, thus increasing their effectiveness in fighting the Global War on Terrorism (GWOT). By understanding our use of technology in support of the Warfighter, the reader will gain key insights on how to improve their own organization's capabilities to support C2 decision-making.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defining a Security Architecture for Real-Time Embedded Systems [Presentation]","authors":"T. Reinhart, C. Boettcher, G. Gándara","doi":"10.21236/ada465687","DOIUrl":"https://doi.org/10.21236/ada465687","url":null,"abstract":"Abstract : Providing information assurance (IA) for embedded aerospace platforms in a network centric battlespace presents new challenges for information-intensive system development and deployment. This paper will discuss ongoing research being conducted by Raytheon under two Air Force programs. As part of this research, Raytheon is assessing the vulnerability of mission-critical platforms to information warfare attacks on the infrastructure required to achieve interoperability and information sharing. This paper discusses Air Force missions, the technologies that are likely to be used to achieve interoperability, ongoing research in IA that can be leveraged, any IA vulnerabilities that are not yet being addressed, and approaches to mitigating those vulnerabilities. Recommendations for promising future research directions are described.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125931343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rethinking Defensive Information Warfare","authors":"Geoffrey S. French","doi":"10.21236/ada465836","DOIUrl":"https://doi.org/10.21236/ada465836","url":null,"abstract":"Abstract : Although the origins of information warfare lie in the defense of critical computer systems, defensive information warfare (DIW) per se has advanced little beyond an information assurance model. Information assurance is an integral part of any military organization's operations, but it falls far short of meeting the needs for robust defense of critical command-and-control (C2) computer networks against a sophisticated adversary. By looking at the ways that militaries have responded to challenging defensive situations in the past, some insights can be made into the nature of IW and potential application of conventional operations. This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128953134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of Dynamic Systems Theory to Effects-Based Operations and Adversarial Modelling","authors":"Paul Bello, M. Mailman","doi":"10.21236/ADA465801","DOIUrl":"https://doi.org/10.21236/ADA465801","url":null,"abstract":"Abstract : Effects-based operations (EBO) has become an increasingly important doctrinal concept used in the prosecution of war, most especially against terrorist organizations and the rogue states which support them. As a philosophy, EBO reaches beyond the realm of the propagation of simple physical effects. EBO encompasses the full spectrum of military activities, including psychological operations (PSYOPS). While a number of different accounts of EBO have been documented (Warden 1995, Barlow 1994), alarmingly little work has been conducted concerning the application of effects-based operations to organizations of human entities. Herein, we present a formal model of nth-order cascading belief revision in the style of Warden's model. The considered approach is motivated by the theory of dynamic systems, and is able to be generalized through the manipulation of beliefs via information-theoretic (Shannon & Weaver 1949) metrics. We shall conclude with a simple example, and some future directions for research in this area.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Deception in Defense of Information Systems","authors":"N. Rowe, M. Auguston, D. Drusinsky, J. Michael","doi":"10.21236/ada464829","DOIUrl":"https://doi.org/10.21236/ada464829","url":null,"abstract":"This paper appeared in the Command and Control Research and Technology Symposium, San Diego, CA, \u0000June 2004.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"525 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117034157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COM as Shooter - Operational Planning using C2 for Confronting and Collaborating","authors":"A. Baan","doi":"10.21236/ada462086","DOIUrl":"https://doi.org/10.21236/ada462086","url":null,"abstract":"Abstract : In Peace Support Operations, COM needs to be fully informed and engaged. The goal is to change the intention of parties because the mission does note end until parties realize that their desired end-state is the international community's end state.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"43 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131992695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Critical Thinking","authors":"J. Freeman, K. Hess","doi":"10.1037/e530592011-001","DOIUrl":"https://doi.org/10.1037/e530592011-001","url":null,"abstract":"Abstract : Command and Control (C2) organizations must operate decisively and synchronously, and do so in highly uncertain and dynamic settings. Individuals succeed in these settings in part by thinking critically about their assessments and plans. We argue that individual team members collaborate in their application of critical thinking in a process called collaborative critical thinking. We are developing this concept of Collaborative Critical Thinking (CCT) within C2 teams from three research threads concerning 1) individual critical thinking, 2) team process and architecture, and 3) human performance in information age warfare. This paper describes our CCT framework and the tools and training we are developing to improve CCT among team members.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network-Centric Intelligence: An Approach to a Strategic Framework","authors":"Peter Sharfman","doi":"10.21236/ada467476","DOIUrl":"https://doi.org/10.21236/ada467476","url":null,"abstract":"Abstract : The intelligence cycle (other than actual collection by technical or human means) is discussed in terms of the differences between normal processes and the processes used on the most difficult and important problems. It is argued that a network-centric intelligence process (analogous to network-centric warfare) would be more effective than the best of today's processes. The capabilities that must be developed to enable such network centric intelligence are identified, and experimentation is suggested as an effective path towards the development and fielding of these capabilities.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115418819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}