259 research outputs found

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    A Dynamic Process Model for the Design and Assessment of Network Systems

    Get PDF
    Proceedings of the 2006 Command and Control Research and Technology Symposium, San Diego, CA June 2006.This paper won the Gary F. Wheatley Best Paper Award for the entire conference.Modern warfare has witnessed the proliferation of coalition efforts to contain terrorism. To be successful, these efforts rely upon the effective integration of human and technological agents. Typically, models and analyses of network centric warfare (NCW) focus on technological aspects of a system, eschewing the roles, contributions and decisions made by humans. The Dynamic Model of Situated Cognition (DMSC) emerged as an attempt to represent relationships between technology and humans in a system. The model has been applied in a variety of contexts: individual performance, military command and control, naval operations, human error in military mishaps, and, most recently, to modeling team behavior in complex organizations (Miller & Shattuck, 2004, 2005a, b; Shattuck & Miller, 2004, 2005; Miller, Shobe & Shattuck, 2005). During the 2004 CCRT Symposium, we introduced “A Process Model of Situated Cognition in Military Command and Control.” We have expanded and refined the model over the last two years and it continues to be well received. In this paper, we review these changes and extend the Dynamic Model of Situated Cognition to serve as an aid for system designers as they consider how individual and team behaviors emerge and interact with complex technology in a system context

    Coalition Battle Management Language (C-BML) Study Group Final Report

    Get PDF
    Interoperability across Modeling and Simulation (M&S) and Command and Control (C2) systems continues to be a significant problem for today\u27s warfighters. M&S is well-established in military training, but it can be a valuable asset for planning and mission rehearsal if M&S and C2 systems were able to exchange information, plans, and orders more effectively. To better support the warfighter with M&S based capabilities, an open standards-based framework is needed that establishes operational and technical coherence between C2 and M&S systems

    Revolution

    Get PDF
    Revolutio

    The Knowledge Application and Utilization Framework Applied to Defense COTS: A Research Synthesis for Outsourced Innovation

    Get PDF
    Purpose -- Militaries of developing nations face increasing budget pressures, high operations tempo, a blitzing pace of technology, and adversaries that often meet or beat government capabilities using commercial off-the-shelf (COTS) technologies. The adoption of COTS products into defense acquisitions has been offered to help meet these challenges by essentially outsourcing new product development and innovation. This research summarizes extant research to develop a framework for managing the innovative and knowledge flows. Design/Methodology/Approach – A literature review of 62 sources was conducted with the objectives of identifying antecedents (barriers and facilitators) and consequences of COTS adoption. Findings – The DoD COTS literature predominantly consists of industry case studies, and there’s a strong need for further academically rigorous study. Extant rigorous research implicates the importance of the role of knowledge management to government innovative thinking that relies heavily on commercial suppliers. Research Limitations/Implications – Extant academically rigorous studies tend to depend on measures derived from work in information systems research, relying on user satisfaction as the outcome. Our findings indicate that user satisfaction has no relationship to COTS success; technically complex governmental purchases may be too distant from users or may have socio-economic goals that supersede user satisfaction. The knowledge acquisition and utilization framework worked well to explain the innovative process in COTS. Practical Implications – Where past research in the commercial context found technological knowledge to outweigh market knowledge in terms of importance, our research found the opposite. Managers either in government or marketing to government should be aware of the importance of market knowledge for defense COTS innovation, especially for commercial companies that work as system integrators. Originality/Value – From the literature emerged a framework of COTS product usage and a scale to measure COTS product appropriateness that should help to guide COTS product adoption decisions and to help manage COTS product implementations ex post

    Coming Full Circle with Boyd\u27s OODA Loop Ideas: An Analysis of Innovation Diffusion and Evolution

    Get PDF
    The Observe-Orient-Decide-Act (OODA) Loop ideas of Air Force Colonel John Boyd have impacted the Department of Defense (DoD), influenced military thought, paved the way for operational change, and helped to shape fighting doctrines. A wide variety of OODA Loop ideas and interpretations exist in the literature, but are unorganized and have not undergone holistic study to determine how Boyd\u27s ideas have spread or changed over time. As such, this research analyzed a quarter century (1976-2003) sample of the OODA Loop literature to examine the diffusion and evolution of OODA Loop ideas since Boyd\u27s original conceptualizations. This research used qualitative data analysis to examine OODA Loop ideas in light of innovation diffusion theory. Ideas from Boyd\u27s original OODA Loop theories were compared and contrasted with subsequent literature instances to assess diffusion and evolution of OODA Loop ideas in the DoD. This research concluded with a proposed conceptual framework for collectively considering OODA Loop ideas

    Modeling & Simulation Education for the Acquisition and T&E Workforce: FY07 Deliverable Package

    Get PDF
    This report was prepared for CAPT Mike Lilienthal, PhD, CPE, and funded by ASN (RDA) CHENG and the Modeling and Simulation Coordination Office (MSCO).This technical report presents the deliverables for calendar year 2007 for the "Educating the Modeling and Simulation Workforce" project performed for the DoD Modeling and Simulation Steering Committee. It includes the results for spirals one and two. Spiral one is an analysis of the educational needs of the program manager, systems engineer, and test and evaluation workforces against a set of educational skill requirements developed by the project team. This is referred to as the 'learning matrix'. Spiral two is a set of module and course matrices, along with delivery options, that meets the educational needs indentified in spiral one. This is referred to as the 'learning architecture'. Supporting materials, such as case studies and a handbook, are included. These documents serve as the design framework for spirals three and four, to be completed in CY2008, and which involve the actual production and testing of the courses in the learning architecture and their longitudinal assessment. This report includes the creative work of a seven university consortium and a group of M&S stake-holders, together comprising over 60 personnel.ASN (RDA) CHENG and the Modeling and Simulation Coordination Office (MSCO).This report was prepared for CAPT Mike Lilienthal, PhD, CPE, and funded by ASN (RDA) CHENG and the Modeling and Simulation Coordination Office (MSCO)

    Transformation and the Navy’s Tough Choices Ahead

    Get PDF
    Analyses have pointed to a “coming train wreck” between defense program goals and available re- sources; the fact is that the collision is already upon us. Fundamental transformation, its advocates argue, is a response that would produce, for a given amount of resources, a force more effective against future threats than would implementing today’s collection of programs

    Maritime threat response

    Get PDF
    This report was prepared by Systems Engineering and Analysis Cohort Nine (SEA-9) Maritime Threat Response, (MTR) team members.Background: The 2006 Naval Postgraduate School (NPS) Cross-Campus Integrated Study, titled “Maritime Threat Response” involved the combined effort of 7 NPS Systems Engineering students, 7 Singaporean Temasek Defense Systems Institute (TDSI) students, 12 students from the Total Ship Systems Engineering (TSSE) curriculum, and numerous NPS faculty members from different NPS departments. After receiving tasking provided by the Wayne E. Meyer Institute of Systems Engineering at NPS in support of the Office of the Assistant Secretary of Defense for Homeland Defense, the study examined ways to validate intelligence and respond to maritime terrorist attacks against United States coastal harbors and ports. Through assessment of likely harbors and waterways to base the study upon, the San Francisco Bay was selected as a representative test-bed for the integrated study. The NPS Systems Engineering and Analysis Cohort 9 (SEA-9) Maritime Threat Response (MTR) team, in conjunction with the TDSI students, used the Systems Engineering Lifecycle Process (SELP) [shown in Figure ES-1, p. xxiii ] as a systems engineering framework to conduct the multi-disciplinary study. While not actually fabricating any hardware, such a process was well-suited for tailoring to the team’s research efforts and project focus. The SELP was an iterative process used to bound and scope the MTR problem, determine needs, requirements, functions, and to design architecture alternatives to satisfy stakeholder needs and desires. The SoS approach taken [shown in Figure ES-2, p. xxiv ]enabled the team to apply a systematic approach to problem definition, needs analysis, requirements, analysis, functional analysis, and then architecture development and assessment.In the twenty-first century, the threat of asymmetric warfare in the form of terrorism is one of the most likely direct threats to the United States homeland. It has been recognized that perhaps the key element in protecting the continental United States from terrorist threats is obtaining intelligence of impending attacks in advance. Enormous amounts of resources are currently allocated to obtaining and parsing such intelligence. However, it remains a difficult problem to deal with such attacks once intelligence is obtained. In this context, the Maritime Threat Response Project has applied Systems Engineering processes to propose different cost-effective System of Systems (SoS) architecture solutions to surface-based terrorist threats emanating from the maritime domain. The project applied a five-year time horizon to provide near-term solutions to the prospective decision makers and take maximum advantage of commercial off-the-shelf (COTS) solutions and emphasize new Concepts of Operations (CONOPS) for existing systems. Results provided insight into requirements for interagency interactions in support of Maritime Security and demonstrated the criticality of timely and accurate intelligence in support of counterterror operations.This report was prepared for the Office of the Assistant Secretary of Defense for Homeland DefenseApproved for public release; distribution is unlimited

    COTS DRONE DESIGN: A RAPID EQUIPAGE ALTERNATIVE FOR FORCE RECON COMPANIES

    Get PDF
    The Force Reconnaissance Group (FRG) of the Philippine Marine Corps (PMC) is a pioneer unit of the Armed Forces of the Philippines (AFP) in acquiring and utilizing small unmanned aircraft systems (SUAS) for aerial intelligence, surveillance, and reconnaissance (ISR). The sustainment of this ISR equipment, however, largely depends on ample resources that the FRG does not have. This organizational challenge results in an aerial ISR capability gap at the company level. Force Recon Companies (FRCs) do not have organic drones to support their aerial real-time reconnaissance, surveillance, and target acquisition requirements. This study explored an alternative solution to address this capability gap: a low-cost commercial-off-the-shelf (COTS) drone design specific to the operational needs of FRCs. A systems engineering approach to SUAS design resulted in a micro traditional helicopter drone as the FRC COTS Drone design. The study produced a prototype FRC COTS Drone consisting of a four-part reconnaissance kit that includes a micro helicopter UAV, handheld controller, first person view (FPV) goggles, and FPV monitor. This effort can promote a culture of innovation in small unmanned systems, not just within the PMC, but the AFP as a whole. This study can also serve as a model for security cooperation between the United States and the Philippines through the integration of three fields: Philippine experience, U.S. technical expertise and resources, and the global commercial market.Outstanding ThesisMajor, Philippine Marine CorpsApproved for public release. distribution is unlimite
    corecore