1,055 research outputs found

    Naval Integration into Joint Data Strategies and Architectures in JADC2

    Get PDF
    NPS NRP Technical ReportAs Joint capabilities mature and shape into the Joint All Domain C2 Concept, Services, COCOMs and Coalition Partners will need to invest into efforts that would seamlessly integrate into Joint capabilities. The objective for the Navy is to study the options for Navy, including Naval Special Warfare Command under SOCOM, on how to integrate Navy's data strategy and architecture under the unifying JADC2 umbrella. The other objectives are to explore alternatives considered by the SOCOM and the Air Force, which are responsible for JADC2 Information Advantage and Digital Mission Command & Control. A major purpose of Joint, Services/COCOMs, agencies and Coalition Partners capabilities is to provide shared core of integrated canonical services for data, information, and knowledge with representations for vertical interoperability across all command levels and JADC2, lateral interoperability between Naval Service/COCOMs, and any combination of JADC2 constituents, agencies, and coalition partners. Our research plan is to explore available data strategy options by leveraging previous NRP work (NPS-20-N313-A). We will participate in emerging data strategy by Navy JADC2 project Overmatch. By working with MITRE our team will explore Air Force JADC2 data strategy implemented in ABMS DataOne component. Our goal is to find a seamless integration between Naval Data Strategy and data strategies behind JADC2 Information Advantage and Digital Mission Command & Control capabilities. Our plan includes studying Service-to-Service and Service-to-COCOM interoperability options required for Joint operations with a goal to minimize OODA's loop latency across sensing, situation discovery & monitoring, and knowledge understanding-for-planning, deciding, and acting. Our team realizes JADC2 requires virtual model allowing interoperability between subordinate C2 for services, agencies, and partner. Without such flexible 'joint' intersection organizational principal hierarchical structure it would be impossible to define necessary temporal and spatial fidelities for each level of organizational command required for implanting JADC2. Research deliverables will document the results of the exploration of Joint, COCOM, Agency and Partner Data Strategies approaches as JADC2 interoperability options to the emerging JADC2. We strive for standard JADC2 interface. Keywords: JADC2, ABMS, DataOne, Information Advantage, Digital Mission Command, IntegrationN2/N6 - Information WarfareThis research is supported by funding from the Naval Postgraduate School, Naval Research Program (PE 0605853N/2098). https://nps.edu/nrpChief of Naval Operations (CNO)Approved for public release. Distribution is unlimited.

    A Value Function Approach to Information Operations MOE\u27s: A Preliminary Study

    Get PDF
    A value focused thinking approach is applied to information operations. A preliminary value hierarchy for information operations is constructed by extracting the values of senior military leadership from existing doctrine. To identify these key values for information operations, applicable existing doctrine was reviewed and summarized. Additionally, hierarchical representations of the values represented within each reviewed doctrine are developed. A value hierarchy requires that supporting objectives be mutually exclusive and collectively exhaustive. Within this analysis, these requirements are enforced, in part, by developed definitions which serve as tests to maintain mutual exclusivity. An exhaustive set of supporting values is also guaranteed by identifying a spanning set of values that directly support the overall objective of information operations. This preliminary value hierarchy serves as the basis for continuing research. The implications for this research include the construction of a prescriptive model in which the effectiveness of current and future systems can be assessed on a common scale. Further, the effectiveness of developing technologies can be assessed and the value of these technologies determined with respect to the values of senior military leadership. With this, the value of holes in our suite of information warfare systems can also be assessed in terms of their effectiveness in fulfilling the values of military leadership

    A Bayesian Abduction Model For Sensemaking

    Get PDF
    This research develops a Bayesian Abduction Model for Sensemaking Support (BAMSS) for information fusion in sensemaking tasks. Two methods are investigated. The first is the classical Bayesian information fusion with belief updating (using Bayesian clustering algorithm) and abductive inference. The second method uses a Genetic Algorithm (BAMSS-GA) to search for the k-best most probable explanation (MPE) in the network. Using various data from recent Iraq and Afghanistan conflicts, experimental simulations were conducted to compare the methods using posterior probability values which can be used to give insightful information for prospective sensemaking. The inference results demonstrate the utility of BAMSS as a computational model for sensemaking. The major results obtained are: (1) The inference results from BAMSS-GA gave average posterior probabilities that were 103 better than those produced by BAMSS; (2) BAMSS-GA gave more consistent posterior probabilities as measured by variances; and (3) BAMSS was able to give an MPE while BAMSS-GA was able to identify the optimal values for kMPEs. In the experiments, out of 20 MPEs generated by BAMSS, BAMSS-GA was able to identify 7 plausible network solutions resulting in less amount of information needed for sensemaking and reducing the inference search space by 7/20 (35%). The results reveal that GA can be used successfully in Bayesian information fusion as a search technique to identify those significant posterior probabilities useful for sensemaking. BAMSS-GA was also more robust in overcoming the problem of bounded search that is a constraint to Bayesian clustering and inference state space in BAMSS

    A human factors approach to analysing military command and control

    No full text
    This paper applies the Event Analysis for Systemic Teamwork (EAST) method to an example of military command and control. EAST offers a way to describe system level 'emergent properties' that arise from the complex interactions of system components (human and technical). These are described using an integrated methods approach and modelled using Task, Social and Knowledge networks. The current article is divided into three parts: a brief description of the military command and control context, a brief description of the EAST method, and a more in depth presentation of the analysis outcomes. Numerous findings emerge from the application of the method. These findings are compared with similar analyses undertaken in civilian domains, where Network Enabled Capability (NEC) is already in place. The emergent properties of the military scenario relate to the degree of system reconfigurability, systems level Situational Awareness (SA), team-working and the role of mediating technology. It is argued that the EAST method can be used to offer several interesting perspectives on designing and specifying NEC capability in military context

    Evolution in military affairs in the battlespace of Syria and Iraq

    Get PDF
    This paper will consider developments in the Syrian and Iraqi battlespaces that may be conceptualised as relevant to the broader evolution in military affairs. A brief discussion of different notions of „revolution" and „evolution” (in Military Affairs) will be offered, followed by an overview of the combatant actors involved in engagements in the battlespace concerned. The analysis distinguishes at the start between two different evolutionary processes: one specific to the local theatre of war in which local combatants, heavily constrained by their circumstances and limitations, show innovation with limited resources and means, and with very high (existential) stakes. This actually existential evolutionary process is complicated by the effects of the only quasi-evolutionary process of major powers’ interactions (with each other and with local combatants). The latter process is quasi-evolutionary in the sense that it does not carry direct existential stakes for the central players involved in it. The stakes are in a sense virtual: being a function of the prospects of imagined peer-competitor military conflict. Key cases studied in the course of the discussion include (inter alia) the evolution of the Syrian Arab Air Force's use of so-called barrel bombs as well as the use of land-attack cruise missiles and other high-end weaponry by major intervening powers

    フィリピンにおける民軍作戦 (CMO) : 過去及び現在の戦場管理に関する考察

    Get PDF
    早大学位記番号:新6419早稲田大

    Sensemaking training in preparation for effective mission command in the African battlespace

    Get PDF
    The South African National Defence Force (SANDF), as a member state of the United Nations, the African Union and the Southern African Development Community, has certain continental and regional responsibilities. It is foreseen that the main areas of influence and operations of the SANDF will be situated in Africa and are referred to as the African battlespace, which holds challenges for deploying military commanders. We argue that the elevated levels of complexity and uncertainty in this context make mission command, as a command approach, especially relevant. The conceptual study on which this article is based, found that mission command is highly suitable to promote a command culture that is flexible yet robust, fosters unity of command at all levels, and simultaneously provides subordinate commanders with the freedom to act decisively when new opportunities are identified. For mission command to be applied in the African battlespace, sensemaking is an important cognitive skill that should form an integral part of the psychological preparation and training of commanders. Recommendations are made for sensemaking development in the current training of commanders in the SANDF

    Domain Restriction Zones: An Evolution of the Military Exclusion Zone

    Get PDF
    Since the early part of the twenty-first century, US adversaries have expanded their military capabilities within and their access to new warfighting domains. When faced with the growth of adversaries’ asymmetric capabilities, the means, tactics, and strategies previously used by the US military lose their proportional effectiveness. To avoid such degradation of capability, the operational concept of the military exclusion zone (MEZ) should be revised to suit the modern battlespace while also addressing the shifts in national policy that encourage diplomacy over military force. The concept and development of domain restriction zones (DRZs) increase the relevancy of traditional MEZs in the modern battlespace, allowing them to address problems associated with cross-domain and multidomain capabilities. The growth of adversary capabilities provides a clear rationale for the implementation of DRZs through all levels of force application within the competition continuum

    Evolution in military affairs in the battlespace of Syria and Iraq

    Full text link
    corecore