Old photos of sheiks in Mirages and F-16s adorn the marble hallways of the Armed Forces Officers Club and Hotel, the venue for the Gulf C4ISR conference. At the military’s General Headquarters in downtown Abu Dhabi, a newer trend is playing out.
The U.A.E. is attempting to knit its fractious military networks into a seamless, modern network so the country’s commanders can apply its warplanes and troops faster and more effectively.
Much of the military terminology and doctrine behind this effort would be familiar to military intelligence experts in NATO, the U.K. and the U.S., some of whom have advised U.A.E.
The U.A.E’s joint forces commander runs a 24/7 Joint Operation Centre where staff from all elements of the U.A.E. armed forces monitor defense readings from aircraft, ships and radars. The system is not as powerful as the U.A.E. wants it to be, however.
The country’s military network, which it calls Al Sheryan, has “limited” capabilities, according to retired U.A.E. Air Force Gen. Khalid Abdullah Al Bu-Ainnain, who addressed the topic in a presentation, and in paper released at the conference, “A Vision for Transforming UAE Armed Forces into Network Centric Operations.”
Al Bu-Ainnain is the country’s strongest advocate for creation of U.S.-style “National Global Information Grid” incorporating Al Sheryan and wireless satellite communications.
His views have weight in the U.A.E. because of his experience in the military, and his current role as president of the Institute for Near East and Gulf Military Analysis (INEGMA), a think tank with offices in the U.A.E. and Lebanon.
“To achieve more accurate and timely ISR information, the UAE Armed Force’s planning, tasking, and execution process must also be improved,” he writ...
... middle of paper ...
...ile adversaries “are still planning and organizing” an attack.
He does not define what kind of preemptive actions U.A.E. might take.
Although U.A.E. officials did not discuss it publicly, several attendees said Iran’s missile and nuclear work is a major driver behind the U.A.E’s effort to improve its air defenses and command and control systems.
Almost as if on cue, shortly before the conference, the U.S. announced steps that would be taken with allies in the Gulf region, reportedly including U.A.E., to shore up anti-missiles defenses as a counter to Iran.
Speaking at Georgetown University and then at the Institute for the Study of War in Washington, Army Gen. David Petraeus of Central Command said U.S. Patriot missile batteries had been set up in four countries in the region, and that Aegis anti-missile ships would patrol the Persian Gulf “at all times now.”
U.S. Joint Chiefs of Staff, Joint Operations, Joint Publication 3-0 (Washington, DC: U.S. Joint Chiefs of Staff, August 11, 2011), III-1.
The strategy of the United States concentrates on the next five to ten years in order to protect the national interests around the global. With the increase in globalization, the ability to have a presence in all regions becomes important to national security and the United States accomplishes this by building and strengthening alliances. This promotes stability and security in the region as well. Defending the home front is the most important objective of the NSS and in order to accomplish that, continued global power projection is necessary. The NDS and NMS both seek to accomplish this through a thorough assessment of the strategic environment and applying either diplomatic or military power as necessary. The military serves as a major deterrent to potential adversaries, because of the United States’ military capability.
...al technical intelligence requirements (United States, I).” As wars continue, we must remain open to apply new strategies and tactics that will keep us out front as one of the most strategically and tactically sound military forces.
(U) IPB and MDMP: In order to fully understand the IPB process, an understanding of how MDMP and IPB are interrelated needs to be addressed. IPB is utilized to minimize unknown elements concerning an adversary, terrain, weather and civil considerations for a variety of operations including on-going and future operations. IPB provides a framework that assists in identifying information, facts and assumptions pertaining to the Mission, Enemy, Terrain and Weather, Troops and Support available, Time available and any Civil Considerations (METT-TC). While this does not answer everything that may occur, it does facilitate effective staff planning. By using the IPB Process and MDMP, the Commander and Staff are able to select a Course of Action (COA) and begin the orders process...
Air Force Special Operations Command, or AFSOC, is the elite force of the United States Air Force. The assistance of AFSOC is vital to the Air Force’s duties as well as the entire US military. The presence of special operations teams, working with foreign militaries, in Central Asia before the 9/11 terrorist attacks aided the US in gaining Air force bases in that region. AFSOC teams had made connections with the foreign militaries in several places, one of which led to the use of Manas AB, Kyrgyzstan, as a major mobility hub (Air Force Magazine). The AFSOC teams have been working all over the globe to help the US in its foreign affairs. By being active with Central Asia, AFSOC has been able to set up mobility command in Kyrgyzstan before the terrorist attacks from Al Qaeda. From theses connections, we were able to begin our Middle Eastern Operations with better ease. Lieutenant General Donald Wurster speaks about AFSOC’s cooperation with other countries saying "It seems there are places where effectiven...
In past instances the ability to control forces outside of territorial borders has been difficult, and can still be a challenge at times. Getting information to where it is needed when it is needed was just as much of a problem in the 1990’s as well, but with the advent of technologies such as the satellite phone and the global positioning system, directing the military outside of The States had become easier than ever before. Forward power projection is the control of military forces outside of its territory, and during the Operation Desert Shield and Storm this was effectively displaye...
Furthermore, in a few years there will be ten times the amount of internet connected devices as there are humans on the planet. This means that anywhere where you are, you are going to be observable (AUSA 2016, 13). In the future, leaders will not need to be flexible because higher headquarters can always monitor and give guidance for every tactical move. Thus, leaders will not need to think critically which will hinder their adaptability. General Milley counters his argument through his statement that in the future, “there is a high probability, a certainty really, that anything electronic will come under cyber or EW attack, and that we will be operating routinely in a partially or significantly degraded environment” (AUSA 2016, 17). As technology progresses, internet connected devices will become ISR platforms but the technology to counter that will also exist. If this happens, it will remain critical that units in the future remain extremely flexible and able to adapt to their operational
...here that are relatively safe from outside prying eyes, they are called Mesh, and a mesh can be used as a cheap way to access the regular Internet. Thousands of communities worldwide have been building these build your own networks to keep the government from prying into regular people business. It is said when a person runs this network nobody can shut it down. But if somehow, even though these mesh groups are private, and there broken encryptions, mesh can hook up to regular internet, for instance Via satellite then this person can be sending signals back out to where the NSA can get access to be able to set up taps. This software is likely to gain traction among terrorist here at home; it makes sense for Americans to invest in this because of the way we live today. This parallel, and worldwide Internet is run by the people, for the people.
U.S. Joint Chiefs of Staff, Joint and National Intelligence Support to Military Operations, Joint Publication 2-01 (Washington, DC: U.S. Joint Chiefs of Staff, 5 January 2012).pg II-6
The Army has transformed several times during its history. Adapting to the operational environment is a necessity for the force called upon to prosecute its adversaries. The Army must do what is necessary to protect the U.S. against all enemies, and advance the national interests of the American people. To accomplish this, anticipation of threats is crucial and victory against its adversaries is an imperative. The nation relies on the military for strategic level deterrence and expects that it will be decisive in combat operations. For the military to be successful, it is important that transformation adapt to meet these expectations by conforming to the requirements of a successful force of the future in order meet any new threats in any environment around the world.
“Ready for War.” Intelligence Reports Iss. 131 (Fall 2008). 46-54 SIRS Researcher. Web. 03 Feb. 2011.
The name of the missile program that is being developed to protect the United States is the National Missile Defense. This program...
The internet is a total of medium¢s which are connected between them with channels of communication. The internet is actually an internet after it connects smaller networks of many countries. The internet rouses the computer and the world of the communications like nothing else before. The invention of the computer, of the telephone, of the telegraph etc, place the stage of this unprecedented completion of faculties. The internet becomes right away a world capability radio broadcast, a mechanism for the distribution of information and a means for the cooperation and the interaction between the individuals and their computers, being indifferent to the geographic place. In 1958 the American ministry of defence created a department called "Advanced Research Projects Agency" – ARPA. Its goal was to create new technologies. In 1968 they created the ARPAnet, a network of computers. For 20 years the internet was a network with precise and enormous in volume computers.