INTRODUCTION
1. ‘Warfare takes on the characteristics of its age’. Network Centric Operations are therefore the military response to the Information Age. Network Centric Warfare can be concisely defined as the concept of linking all aspects of warfighting into a shared situation awareness and understanding of command intent so as to achieve a unity and synchronicity of effects that multiplies the combat power of military forces. Network-centric operations are military operations across the spectrum of conflict from peace, to crisis, to war to which the concepts and capabilities of Network Centric Warfare have been applied (US DoD report, 2006).
2. As defined NCO operates in the Physical domain, Information domain and cognitive domain. While enabling a force to maximise its combat potential, it cannot replace the force. In it, network centric operations are not new. From flags to radio circuits, a commander has always sought and received the battlespace picture. Only the speed and scope of this information exchange has changed. This paper shall therefore restrict its scope to the implementation of NCO in contemporary military operations. This requires study of trends of technology as well as trend of warfighting.
3. Colonel John Boyd., USAF described the OODA loop in a several hundred slide presentation titled Discourse on Winning & Losing. Based primarily on Fighter aircraft combat, this has become the primary basis of warfare in general. The application involves speeding up our loop to an extent that the enemy is perennially reacting or simply frozen. The most apt example would be the Battle of Midway, where the inadvertent observation of the carrier Yorktown, resulted in a decision to recall the aircrafts to b...
... middle of paper ...
...Cooperative Research Program, August 1999/Second printing February 2000.
http://www.wikipedia.org. Jul 25, 2010. http://en.wikipedia.org/wiki/Comparison_of_mobile_phone_standards (accessed Jul 25, 2010).
IBM. www.ibm.com. http://www-07.ibm.com/smb/in/expressadvantage/xoffers/index.html?ca=googleaw&gclid=COrutN3VhaMCFYcmHAods1dZZw (accessed Jul 25, 2010).
Maj DW Roberts USAF, LtCdr JA Smith USN. "The Promise of NCW." 2003.
Oxford University Press. Oxford MiniDictionary. 1979.
The Implications of Network-Centric Warfare for United States and Multinational Military Operations. New port: Naval War College, 31 Dec 1998.
US DoD . "report to the congress." 2006.
US DoD CCRP. NATO NECC2 Maturity Model. CCRP, 2010.
US DoD. JV 2010.
Vice Admiral Arthur K. Cebrowski, U.S. Navy, and John J. Garstka. "Network-Centric Warfare: Its Origin and Future." Proceedings , 1998.
(U) Background: Over the course of United States history the Army has made changes to how it engages its foreign enemies. These tactics techniques and procedures are the result of lessons learned during conflict, mistakes made under fire, and the results of a nation at war. As a result the IPB process has changed to accommodate a dynamic and often fluid battlefield. However this has not changed the core concept behind IPB, the four steps still remain an integral part of the Commanders Military Decision Making Process (MDMP), and are essential in war gaming. IPB assist in providing valuable Intelligence to the War Fighter throughout all phases of operations. This paper will cover each step of the IPB Process as well as discuss products associated with each of those steps and how these products can be an asset to the Commander and the War Fighter.
While many of these changes include the advancements in technology and ingenuity, nothing can replace the rich history, proud culture, and bright future of the NCO Corps. Though several additional factors doubtlessly play roles in the strength and continuity of the corps, I do not believe any have contributed to the extent of the solid rank structure, efficient training network, and passionate NCO Creed. These elements have worked together in continuously strengthening and molding the NCO Corps, and they will remain building blocks that will project the Army into the
. F.A. Osmanski, The Logistical Planning of Operation OVERLORD.” Military Review Vol. XXIX No. 8, (November 1949) accessed at http://cgsc.contentdm.oclc.org/cdm/ref/collection/p124201coll1/id903 (accessed 23 Oct 2013) p.41
Modern warfare will be fought predominantly in the chaos of the urban environment. As we move into the future we must never forget our past; always keeping in mind where we seek to go. Operations such as Vigilant Resolve, which on the surface seem like a failure, are quickly turned to future success if we remember, study, learn, and grow from them.
Shalikashvili, J.M. (n.d.). Shape, Respond, Prepare Now -- A Military Strategy for a New Era. National Military Strategy. Retrieved September 14, 2004, from http://www.dtic.mil/jcs/nms/index.html#Top
At this juncture, it may be somewhat difficult to accept the proposition that a threat to the telecommunications grid, both wired and wireless, in the United States could potentially be subject to a catastrophic cyber attack. After careful research on the subject, it appears the potentiality of an event of such magnitude, which either disrupts one or the other grids for a long period or destroys either, is both theoretically and realistically impossible. It may be that proponents—those who advance such theories—equate such “doomsday” scenarios as if a cyber attack would or could be of the same magnitude as a conventional or nuclear military strike. Terms such as “cyber Pearl Harbor,” “cyber 9/11” and “cyber Vietnam” have been used to describes potential catastrophic cyber attacks and yet, “Though many have posited notions on what a ‘real’ cyber war would be like, we lack the understanding of how such conflicts will be conducted and evolve.” (Rattray & Healey, 2010, p. 77). Yet, the U.S. government continues to focus on such events, as if the plausibility of small-scale cyber attacks were not as pressing.
In past instances the ability to control forces outside of territorial borders has been difficult, and can still be a challenge at times. Getting information to where it is needed when it is needed was just as much of a problem in the 1990’s as well, but with the advent of technologies such as the satellite phone and the global positioning system, directing the military outside of The States had become easier than ever before. Forward power projection is the control of military forces outside of its territory, and during the Operation Desert Shield and Storm this was effectively displaye...
Leaders today need to have an appreciation for the operation process, understand a situation, envision a desired future, and to lay out an approach that will achieve that future (Flynn & Schrankel, 2013). Plans need to be created that can be modified to changes in any factors considered. However, plans should not be dependent on specific information being precise or that require things to go exactly according to schedule. Instead, the staff NCO should be flexible where they can and always be prepared for the unexpected. Today’s military members are fighting an unconventional war in Iraq and Afghanistan. The enemy constantly changes their tactics, techniques, and procedures (TTP’s) to counter the United States technological advances, making planning very difficult for leaders. There are multiple tools at a staff NCO’s disposal to try to anticipate an outcome of a current operation, but also assist with the development of concepts in follow-on missions. The Military Decision Making Process (MDMP) is just one tool a staff NCO can utilize. In order to stay ahead of the enemy, create effective plans and orders, it is critical for a staff NCO to assist the commander, and understand that the MDMP and planning are essential in defeating the enemy and conserving the fighting force.
Armed with numerous studies, and intensive public hearings, Congress mandated far-reaching changes in DOD organization and responsibilities in the Goldwater-Nichols Department of Defense Reorganization Act of 1986. This landmark legislation significantly expanded the authority and responsibility of the chairman, Joint Chiefs of Staff. Included in this expanded authority and responsibility was the requirement for the chairman to develop a doctrine for the joint employment of armed forces. As operations Urgent Fury, Just Cause, and Desert Storm have vividly demonstrated, the realities of armed conflict in today's world make the integration of individual service capabilities a matter of success or failure, life or death. Furthermore, the operation Desert One demonstrated the need for a strengthened Joint Warfare Doctrine and the consequent change in Joint Warfare Employment. It is plain to see the benefits of having the greatest navy integrated with the world's greatest army and air force. However, even in the wake of a relatively successful joint operation in the Middle East (Desert Storm), certain weaknesses are evident in the current joint employment tactics and/or capabilities. By analyzing past operations such as Urgent Fury and Desert Storm, we are able to see sufficient evidence that the Joint Warfare Concept can be disastrous in one instance and virtually flawless in another.
In today’s operational environments, the U.S. Army is facing a range of problems and mission sets that are arguably more complex than previously encountered. Forces face an array of demands that encompass geo-political, social, cultural, and military factors that interact in unpredictable ways. The inherent complexity of today’s operations has underscored the need for the Army to expand beyond its traditional approach to operational planning. In March 2010 in FM 5-0: The Operations
There are many agencies that have the ability to perform Signals Intelligence, electronic reconnaissance and most of all signals intelligence from all available sources inducive to the environment. The United States Army uses the Joint Surveillance Target Attack Radar System (Joint STARS) as its main entity for signals collection. The Joint STARS platform was designed to provide a highly effective, real-time, collection tool to the ground task force commanders during battlefield engagements, but for the past ten years, the sensor has been used for peacekeeping missions. Army analysts can predict the enemy’s behavior by identifying choke points, potential avenues of approach and operating patterns such as supply routes and logistical points. The analysis gives the ground commander a more complete view of the enemy’s weaknesses. The United States Air Force employs the Joint STARS in a different mission than the Army. The Air Force uses Joint STARS as a battlefield management tool versus a collection tool as used for by the Army. The Air Force uses the platform to provide immediate and direct support to the Air Component Commander and continue to observe the enemy’s movement from a far distance in the sky. Providing essential data to commanders such as size, direction, and speed of the adversaries, with minimum casualties while under battlefield conditions, makes the Joint STARS an extremely effective tool. The Air Force also employs the Predator vehicles, which are unmanned aerial vehicles that are used for reconnaissance.
The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause. Instantaneous and unpredictable, the technological advantages these terrorists have obtained from using the Internet includes
This new technology helps the commanding officers know what is going on by that they can be back at there command base and watch raids unfold on large screens and watch real time footage. This allows them to know what exactly what is taking place.
Communication is critical to any organization and is necessary in every aspect especially in a military. Communication plays a role in Soldier development, peer to peer relations, Chain of command management, and virtually every aspect of a military operations. Commanders require it the most so that they can execute large scale operations without flaw and that alone requires ceaseless effective communication. If soldiers are informed and engaged, communications with other units are likely to be robust as well.
In today’s modern world, faster and faster are the world’s strongest nations developing new and advanced technologies for the future. Where they all start is in the government’s military field, where they search, and discover new innovations every day.