1,085 research outputs found

    Training and education for network centric warfare : issues for New Zealand's Defence Force : a thesis presented in partial fulfilment of the requirements for the degree of Master of Arts in Defence and Strategic Studies at Massey University

    Get PDF
    The concept of Network centric warfare (NCW) is viewed as the next revolution in military affairs. Its introduction globally will necessarily affect the way the New Zealand Armed Forces operates in future conflicts. With the increasing use of digital technology in the military environment the need for and degree of increasing knowledge of Network Centric Warfare and its concepts must be explored.This country will have to combine its own definition and understanding of NCW into the framework of its Armed Force if it wants to continue to remain interoperable with technologically advanced coalition forces. This thesis looks into the issues and solutions which have been considered by other countries in their attempts to implement the NCW concept. It examines in detail how issues and solutions could be applied to New Zealand's attempt at NCW. Chapters One and Two define the academic processes which have been used in this study. They also give a brief introduction to the broad idea of Network Centric Warfare and its origins. Chapter Three examines in detail the complex evolution of the concept of Network Centric Warfare to its present state. In particular, it looks at how the events of September 11th 2001 have redefined warfare and the impact of that revolution on the traditional NCW concept. This chapter also focuses on the advantages and disadvantages of NCW which have now been proven through the experiences of Operation Enduring Freedom and Operation Iraqi Freedom. These two conflicts have been described as the first information technology wars of the 21st century. Chapter Four focuses on how the concept of Network Centric Warfare has and will affect the specifics of personnel and make-up of the New Zealand Defence Force, as it makes the transition from a Platform centric to a Network Centric approach in warfare. The special focus in this chapter is on the New Zealand Army. The concepts of the ethos and cultural identity of a force are introduced here, with a view to revealing the influences that the adaptation of NCW methods and techniques can have on the organisation of that force. The discussion concludes that the introduction of NCW can have profound and permanent effect on a force's ethos and identity. This chapter also considers the influence of technology can help in the recruitment and retention of highly skilled people in the Army. Chapter Five shows how the adoption of the concept of Network Centric warfare also has the potential to fundamentally change the way in which higher level policy and doctrine are introduced and modified in the Armed Forces. This chapter looks at how future infrastructure and policies will need to have increased flexibility built into them from the start in order to embrace the demands of NCW for rapid developments in information technology and force-wide diffusion of such developments. Chapter Six discusses a third important consequence of adopting the concept of Network Centric Warfare. Namely, how the introduction of NCW will affect both training and education of service personnel. In particular, it examines how the change from Platform Centric to Network Centric forms of warfare puts changing demands on the skill sets and needs required of service personnel. Examples are given of the new skill sets needed in order for them to work effectively in a NCW environment. Chapter Seven discusses the formation of a new training branch of service which will need to be set up to accommodate the new methods and skills that NCW brings to the battlefield. Included in this chapter are the imperatives of Information Warfare, Electronic Warfare, and Computer Network Operations for such a branch. Alongside Air, Land, Sea and Space NCW brings with it the creation of a fifth battle space. This battle-space is cyberspace which encompasses the electromagnetic sphere, the Internet and all manner of Wide and Local Area Networks (WANs and LANs). Chapter Eight returns to the issue of training and education introduced in Chapter Six, but focuses specifically on the use of simulation techniques and technologies. Such techniques will be required in order to help train soldiers to work effectively and efficiently under NCW. Why other training methods won't work well given an NCW environment, and why simulation technologies will work, is explained with examples of each. This chapter argues in particular that simulation provides the most effective training in the unified data architecture that will be needed to provide cross platform capability and inter and intra service solutions in Network Centric Warfare. Examples of data solutions are provided to help explain the underlying simulation concepts and methods. Chapter Nine is the conclusion of this study. It reviews the results of this thesis and provides recommendations on the implementation of the Network Centric Warfare environment required in the New Zealand Armed Forces

    Unaprjeđenje cjelovitosti vojno-obrambenih komunikacijskih sustava s pomoću mrežnih pristupnih točaka s naglaskom na zemaljskim radiorelejnim vezama

    Get PDF
    Obvious changes in a very broad field of the information and communication technologies are the key driver of the accelerated development of every sphere of human activity, including private life. In the military organization, this technological progress is present through the “post 2000” concept of the networked implementation of operations, which is implemented to varying degrees in armies around the world. New confrontations on the modern front include demands for an ever-increasing volume of the electronic traffic, complexity of the systems that generate, share and consume information content, and above all, the fastest possible availability of the relevant information. The race for information superiority is accompanied, on the other hand, by an ever more destructive highly sophisticated threats, from classic degradations and physical destruction, action of the hybrid (intelligence-combat) platforms of the unmanned systems, to cyber-electromagnetic activities of an offensivedefensive nature. The new paradigms of the multi-domain warfare and expected scenarios that such forms of engagement put forward, demand from the modern military organization further normative arrangements within the functional area related to communication information systems. At the operational-strategic level, they imply the introduction of adequate organizational concepts and doctrines, while in the implementation part they require correction of the established tactics, techniques and procedures. In such an operational environment, integrative efforts within today’s militarydefence communication systems transformed into unique complete solutions have brought a special challenge. Key networking of the mission components is provided by network access points. For this reason, they are the subject of special attention of the network designers, both conceptually and in terms of implementation. The effectiveness of their functioning is also an assessment of the maturity of military thinking, inventiveness and engineering practice – which will bring along defeats or victories to any combat system in future challenges.Očigledne promjene na vrlo širokom području informacijsko-komunikacijskih tehnologija ključni su pokretač ubrzanog razvoja svake sfere ljudskog djelovanja – uključujući i privatni život. U vojnoj organizaciji ovaj tehnološki napredak prisutan je kroz tzv. post 2000 koncept umrežene provedbe operacija – koji se u različitim stupnjevima implementira u vojskama širom svijeta. Nova sučeljavanja na suvremenoj bojišnici uključuju zahtjeve za sve većim volumenom elektroničkih prometnica, usložnjavanja sustava koji generiraju, dijele i konzumiraju informacijske sadržaje te prije svega što bržu dostupnost relevantnih informacija. Utrku za informacijskom superiornošću s druge strane prate nikad destruktivnije visokosofisticirane prijetnje – od klasičnih degradacija i fizičkih uništenja, djelovanja hibridnih (obavještajno-borbenih) platformi besposadnih sustava, do kiberelektromagnetskih aktivnosti napadajno-obrambene prirode. Nove paradigme višedomenskog ratovanja i očekujući scenariji koje takvi oblici angažmana donose, od suvremene vojne organizacije traže daljnja normativna uređenja unutar funkcionalnog područja vezanog uz komunikacijsko-informacijske sustave. Ona na operativno-strategijskoj razini podrazumijevaju uvođenje adekvatnih organizacijskih koncepata i doktrina, dok u provedbenom dijelu traže korigiranje ustaljenih taktika, tehnika i procedura. U takvom operativnom okružju, poseban izazov donose integrativni napori unutar vojno-obrambenih komunikacijskih sustava današnjice, pretočeni u jedinstvena cjelovita rješenja. Ključnu umreženost misijskih sastavnica osiguravaju mrežne pristupne točke. Zbog tog su razloga predmetom od posebne pozornosti mrežnih dizajnera, i u konceptualnom i u izvedbenom smislu. Učinkovitost njihova funkcioniranja, ujedno je i ocjena zrelosti vojnog promišljanja, inventivnosti i inženjerske prakse – koja će u budućim izazovima svakom borbenom sustavu donositi poraze ili pobjede

    SeBoCom Pre-Study - A preliminary study on Secure Border Communications

    Get PDF
    This document contains the outcome of the SeBoCom pre-study. The main objective of the SeBoCom project was to define the way to proceed to a further and complete study. This task was to be achieved through this pre-study and through a Workshop involving end-users to stimulate the discussion and gain input regarding their needs. This pre-study collects some initial data on the present Communications infrastructures outlining the co-existence of many different systems, some already based on digital technology, others outdated or quite obsolete. One of the key finding of the present study is the need to define joint procedures to manage communications among different bodies belonging to different Member States: the most reliable and secure telecommunication infrastructure will be useless if there is no agreement on the type and structure of communications that are transmitted over the infrastructure. The pre-study initially considers the pivotal role played by communications in Border Protection field operations, analyzing the different operational aspects. It subsequently presents the state if the art of the communication infrastructures of Border Security Forces in Europe as well as the expected future scenarios obtained through questionnaires sent to the contact points in the Member States. An initial broad view of the requirements for Secure Border Communications is outlined; this is followed by an analysis of the lessons learned in previous events; then a survey of the previous/ongoing studies on similar topics is also presented. The last chapters provide a Technology Survey and the conclusions based on the outcome of the pre-study and of the Workshop held in Ispra on May 27th and 28th 2008.JRC.G.6-Sensors, radar technologies and cybersecurit

    SIMULATION OF AUTONOMOUS SYSTEMS COLLABORATING IN INDUSTRIAL PLANTS FOR MULTIPLE TASKS

    Get PDF
    The autonomous systems are continuously extending their application fields and current advances in sensors and controls are enabling the possibility to operate also inside buildings and industrial plants. These new capabilities introduce challenges to be addressed in order to carry out new tasks and missions. This paper proposes advances in Modeling, interoperable Simulation and Serious Games devoted to support researches supporting autonomous system operations within Industrial Facilities

    An Analysis of Defense Information and Information Technology Articles: A Sixteen Year Perspective

    Get PDF
    Over the past two decades, information and information technology (IT) have evolved significantly and have become increasingly important to our national security. Many different journals have described this evolution. The purpose of this study is to examine the evolution of information and IT through the articles of two defense journals over a sixteen-year period. It provides a review of the article subject matter, the changes in the subject matter, the contributing authors and their institutions, and predictions for the next five years

    The Army Role in Achieving Deterrence in Cyberspace

    Get PDF
    In 2015, the Department of Defense (DoD) released the DoD Cyber Strategy which explicitly calls for a comprehensive strategy to provide credible deterrence in cyberspace against threats from key state and nonstate actors. To be effective, such activities must be coordinated with ongoing deterrence efforts in the physical realm, especially those of near-peers impacting critical global regions such as China in the Asia-Pacific region and Russia in Europe. It is important for the U.S. Army to identify and plan for any unique roles that they may provide to these endeavors. This study explores the evolving concept of deterrence in cyberspace in three major areas: • First, the monograph addresses the question: What is the current U.S. deterrence posture for cyberspace? The discussion includes an assessment of relevant current national and DoD policies and concepts as well as an examination of key issues for cyber deterrence found in professional literature. • Second, it examines the question: What are the Army’s roles in cyberspace deterrence? This section provides background information on how Army cyber forces operate and examines the potential contributions of these forces to the deterrence efforts in cyberspace as well as in the broader context of strategic deterrence. The section also addresses how the priority of these contributions may change with escalating levels of conflict. • Third, the monograph provides recommendations for changing or adapting the DoD and Army responsibilities to better define and implement the evolving concepts and actions supporting deterrence in the dynamic domain of cyberspace.https://press.armywarcollege.edu/monographs/1379/thumbnail.jp

    Unmanned Aerial Vehicle Domain: Areas of Research

    Get PDF
    Unmanned aerial vehicles (UAVs) domain has seen rapid developments in recent years. As the number of UAVs increases and as the missions involving UAVs vary, new research issues surface. An overview of the existing research areas in the UAV domain has been presented including the nature of the work categorised under different groups. These research areas are divided into two main streams: Technological and operational research areas. The research areas in technology are divided into onboard and ground technologies. The research areas in operations are divided into organization level, brigade level, user level, standards and certifications, regulations and legal, moral, and ethical issues. This overview is intended to serve as a starting point for fellow researchers new to the domain, to help researchers in positioning their research, identifying related research areas, and focusing on the right issues.Defence Science Journal, Vol. 65, No. 4, July 2015, pp. 319-329, DOI: http://dx.doi.org/10.14429/dsj.65.863

    Interoperability Measurement

    Get PDF
    This research presents an inaugural general method of measuring the collaborative and confrontational interoperability of a heterogeneous set of systems in the context of an operational process. The method is holistic, fundamental, flexible, and mathematical in nature and accommodates all types of systems and interoperations. The method relates the interoperability measurement to measures of operational effectiveness for confrontational operational processes. Extant leveling methods of describing interoperability are shown to be a special case of the more general method given in this research and the general interoperability measurement method is demonstrated through the presentation of coalition interoperability, suppression of enemy air defenses, and precision strike applications. Further application is recommended in technical, non-technical, cross-domain, and non-traditional interoperability areas and additional research is suggested on the topics of indirect interoperability measurement and collaborative interoperability impact on operational effectiveness

    Standardization Roadmap for Unmanned Aircraft Systems, Version 1.0

    Get PDF
    This Standardization Roadmap for Unmanned Aircraft Systems, Version 1.0 (“roadmap”) represents the culmination of the UASSC’s work to identify existing standards and standards in development, assess gaps, and make recommendations for priority areas where there is a perceived need for additional standardization and/or pre-standardization R&D. The roadmap has examined 64 issue areas, identified a total of 60 gaps and corresponding recommendations across the topical areas of airworthiness; flight operations (both general concerns and application-specific ones including critical infrastructure inspections, commercial services, and public safety operations); and personnel training, qualifications, and certification. Of that total, 40 gaps/recommendations have been identified as high priority, 17 as medium priority, and 3 as low priority. A “gap” means no published standard or specification exists that covers the particular issue in question. In 36 cases, additional R&D is needed. The hope is that the roadmap will be broadly adopted by the standards community and that it will facilitate a more coherent and coordinated approach to the future development of standards for UAS. To that end, it is envisioned that the roadmap will be widely promoted and discussed over the course of the coming year, to assess progress on its implementation and to identify emerging issues that require further elaboration
    corecore