Situation and Threat Refinement Approach for Combating the Asymmetric Threat

Size: px
Start display at page:

Download "Situation and Threat Refinement Approach for Combating the Asymmetric Threat"

Transcription

1 Approved for public release; distribution is unlimited Situation and Threat Refinement Approach for Combating the Asymmetric Threat Angela M. Pawlowski, Sergio Gigli, and Frank J. Vetesi Lockheed Martin Advanced Technology Laboratories Camden, NJ [apawlows, sgigli, 1 ABSTRACT In order to combat the present and future asymmetric threats to national and international security, information fusion developments must progress beyond current Level 1 (Object Refinement) paradigms. By focusing on the challenges of Continuous Intelligence Preparation of the Battlespace (CIPB), Lockheed Martin Advanced Technology Laboratories (ATL) has begun to elicit an infrastructure and enabling technologies for information fusion at Level 2 (Situation Refinement) and Level 3 (Threat Refinement). Our approach to Level 2 is to perform spatial and temporal processing on tracks produced by Level 1 multi-sensor, multi-target fusion supplemented with intelligence information from both structured data sources such as databases, and from unstructured data sources such as text documents. The output of Level 2 is referred to as a factlet. Factlet creation is driven both by the evolution of events in the battlespace and by the top-down information needs of the CIPB analysts working at Level 3. Our approach to Level 3 is to drive existing and newly formulated models of threat behavior, viewed from multiple perspectives, such as political, economic, and tactical, with factlets derived in Level 2, to support the determination of possible enemy courses of action. We leverage existing algorithmic lessons learned from Level 1 Classification Fusion, where each sensor represented track classification from a different, complementary perspective, for factlet or evidence fusion. In addition, an approach to automated threat information discovery is discussed, which is initiated by the need for supporting evidence to further refine the Level 3 inferencing processes. Our approach to Level 2 Situation Refinement and Level 3 Threat Refinement will be demonstrated via an Air Force CIPB scenario. 2 INTRODUCTION There is a critical need to provide today s military decision makers with actionable information. This is information that the decision makers can use to make more effective targeting decisions, to plan friendly courses of action (COAs), to mitigate the impact of unexpected adversary actions, and to direct sensing systems to better observe adversary behavior. A key requirement to generate this type of actionable information is the ability to predict the adversary s most likely future COAs. In today s asymmetric warfare, such prediction is especially difficult. Lockheed Martin Advanced Technology Laboratories (ATL) is engaged in internal research and development work to assess adversary COAs and thus enable the generation of actionable information for decision makers. ATL is leveraging this work into an Air Force Research Laboratories (AFRL) Information Institute Research Project, Adversary Intent Inferencing for Predictive Battlespace Awareness [1]. 2.1 OVERVIEW Section 3 of this paper presents a discussion of the operational issues facing military decision makers. Currently, intelligence analysts perform adversary COA prediction manually. This manual process is becoming increasingly difficult to perform in an accurate and timely fashion. Section 4 discusses ATL s technical approach to designing and implementing a COA decision aid (DA) for intelligence analysts. -1-

2 Specifically, ATL has addressed the COA analysis problem as a data fusion problem. Our technical approach leverages ATL s experience in Level 1 data fusion gained as developers of the Rotorcraft Pilot s Associate (RPA) Data Fusion System [2, 3], which was flight demonstrated aboard an Apache AH/64-D in August 1999 and ATL s Extendable Mobile Agent Architecture (EMAA), developed via 14 DARPA and DoD intelligent agent programs and more than $10M of R&D funding [4, 5]. In Section 5, we present an experimental scenario, based on the events leading up to the Battle of Khafji during the Gulf War, to illustrate the functioning of our DA. 3 OPERATIONAL ISSUES 3.1 OBJECTIVE General Jumper, Chief of Staff of the US Air Force is a key proponent of a major new Air Force initiative known as Predictive Battlespace Awareness (PBA). At the center of the PBA concept is the fact that, if one can predict what the adversary is likely to do next, friendly forces can be more effective in: Targeting, by ensuring that strike platforms are in the correct position and of the correct type to be able to best attack the adversary. Planning friendly COAs to mitigate the impact of unexpected adversary actions. Tasking of intelligence, surveillance, and reconnaissance (ISR) collection assets (usually sensor systems) to cover areas where the adversary is expected to be next. A key enabler for PBA is the ability to predict adversary COAs. 3.2 CURRENT ADVERSARY COA PREDICTION Today, the prediction of adversary COAs is done almost exclusively by intelligence analysts. In the case of the Air Force, these intelligence analysts work in the Fusion Cell of the Combat Intelligence Division of the Air Operations Center [6]. Intelligence analysts work towards a prediction of adversary COA by using a four-step process called Intelligence Preparation of the Battlespace (IPB). The four steps of the IPB process, as shown in Figure 1, are: (1) define the battlespace, (2) describe the battlespace effects, (3) evaluate the adversary, and (4) determine the adversary COA. Clearly, the output of Step 4 of IPB is the adversary COA. AF AF Definition of of Predictive Battlespace Awareness (PBA) IPB IPB TSA ISR Step Step 1 Step 2 Step 3 Step 4 Define Battlespace Describe Battlespace Effects Evaluate Adversary Determine Adversary COA Figure 1 Intelligence Preparation of the Battlespace (IPB) -2-

3 In practice, because new intelligence information is constantly becoming available in the battlespace, IPB is a continuous process that iterates multiple times during the course of a conflict. Enemy COA analysis is a critical development in Continuous Intelligence Preparation of the Battlespace (CIPB). 3.3 CHALLENGES OF CURRENT ADVERSARY COAs PREDICTION We believe, in today s battlespace and with today s asymmetric threats present, CIPB is becoming an increasingly difficult process for humans to perform both accurately and in a timely fashion because: Human analysts are limited in the volume of data that they can organize, store, and process. Human analysts are limited in the speed at which they can process data. It is difficult for human analysts to perform a complete evaluation of an adversary from all possible perspectives, such as political, economic, and cultural. Data must be combined to arrive at a composite picture of the adversary. A doctrine is an organized pattern of behavior common in military operations. Doctrine for today s asymmetric adversaries are minimal or nonexistent. Without doctrine, adversary COA prediction becomes more difficult for human analysts; with faster moving adversaries, the analyst has less time to reach a prediction. 4 TECHNICAL ISSUES A key operational objective for military decision makers is to have advance knowledge of an adversary s COA. ATL is developing decision aids (DAs) to assist human intelligence analysts with the CIPB process. 4.1 DATA FUSION ATL s approach to resolving the prediction of adversary COAs is to treat the process as a data fusion problem. Data fusion is the complex problem of bringing together data from multiple sources in many different formats to create one overall integrated picture from which decision makers can act. An architecture for data fusion is provided by the Joint Directors of Laboratories (JDL) data fusion model [7]. Key features of the JDL model include: Information sources. The information sources may be of many different types including sensor systems, structured data sources such as databases, unstructured text documents and reports, and input from people. Level 2 processing Situation Refinement attempts to discover the relationships that exist between the objects (or entities) in the battlespace, events that occur within the battlespace, and the environment. Level 3 processing Threat Refinement projects the current situation in the battlespace forward into the future. One output from Level 3 processing is an assessment of the likely adversary COAs. ATL supports proposals to add an additional level, Level 5, to the JDL model. Level 5 processing, User Refinement, is concerned with taking feedback from the operator of the data fusion system, in our case, the military intelligence analysts, and using this feedback to control and improve the fusion performance. Our DA designs have been impacted by the JDL data fusion model. The JDL model does not, however, provide specific details as to how to implement the model in software. ATL has designed, and is currently implementing, a software prototype of a DA for intelligence analysts, providing Level 2, Level 3 and Level 5 capabilities (Figure 2). In addition, we have engineered the interfaces between our DA and ATLdeveloped data fusion systems performing Level 1 fusion. -3-

4 Evidence Fusion Threat COA Generation Plausible COAs Level 2 Level 3 Master Threat Model Threat Perspective.. Threat Perspective A Model Z Model Evidence Needs Evaluation Calls to Factlet Functions Factlet Analysis Functions Virtual Battlespace Virtual Battlespace Factlets (Evidence) Factlets Level 5 COAs (New Models or Mods) Smart Agent Generation Engine (SAGE) DBs Non-Traditional Data Sources Level 1 Fused Tracks Figure 2 ATL s Decision Aid for Intelligence Analysts 4.2 OBSERVATIONS, DATA SOURCES, AND EMAA AGENTS This section introduces three components that form the core of ATL s decision aids. Firstly, we define observations as data containers that transport data into and around the DA. An observation may originate from a battlefield sensor or from an intelligence report. Secondly, we discuss the data sources that provide data for our DA to reason about. Finally, we present details of ATL s EMAA agents. These agents are a key enabling technology for discovering and retrieving data from the data sources Observations We have defined a format for a data container, referred to as an observation, that transports data within our DA. For example, a report from a field operative on the sighting of a tribal meeting, will be converted to the observation format for presentation to our DA. Each observation may have one or more of the following descriptors: The source of the data in the observation allows us to maintain the pedigree of the information. The time at which the observation was generated. The spatial location of the observation. The name of the object about which the observation is made. Objects can range broadly in extent and in type. Thus a howitzer is an object, as is a bridge, a tribal clan, or the leadership of a country. The attributes of the object in question. Attributes are grouped by perspectives such as damage range (how far can an object project damage?), economic significance and allegiance (with whom or what is the object in question allied?). The confidence measure in the observation can be expressed as actual probabilities; measures of belief, disbelief, and ignorance; fuzzy assessments of confidence such as very probable, somewhat probable, and unlikely; and simply true or false Data Sources ATL s DAs access information from a wide range of distributed, heterogeneous data sources, categorized into traditional and non-traditional sources. Traditional sources will typically be structured -4-

5 intelligence databases shown in Figure 2 as DBs and databases containing fused tracks derived by Level 1 processing. Non-traditional data sources refer to large unstructured text streams such as documents and Internet websites. These sources may well contain a wealth of information pertinent to the adversary and to the battlespace in general. In general, the DA must react to traditional information that is continually accumulating in the structured data stores. The DA must also be proactive about retrieving data from non-traditional, unstructured data sources EMAA Agents The mechanisms to populate and transport observations throughout the DA architecture are based on ATL s EMAA agents. EMAA agents are very small threads of mobile software, and are readily composable. A composable agent is an agent that is constructed from a series of tasks. Examples of tasks include moving from one computer to another or accessing data from a data source. These tasks are assembled in a sequence to form the itinerary of an EMAA agent. Control logic may also be embedded between tasks in an agent s itinerary to allow the agent to make intelligent, autonomous choices as to which particular subset of tasks to follow in a given situation. ATL s DA makes extensive use of EMAA composable agents as data discovery, retrieval, and monitoring tools. The tasks these agents perform closely mirror those executed by human analysts performing intelligence data retrieval. To support the accumulation of threat evidence, ATL has developed the Smart Agent Generation Engine (SAGE) to automate the construction of itineraries for data retrieval and discovery agents to support both Level 2 and Level 3 processing as shown in Figure 2 above. SAGE contains libraries of data retrieval, discovery, and processing steps that it can sequence and combine to construct unique itineraries for agents to follow. SAGE constructs these itineraries based on requests for information from the DA. Specific implementations of SAGE to support both the Level 2 and the Level 3 DA are discussed below. 4.3 JDL LEVEL 2 SITUATION REFINEMENT DA The objectives of JDL Level 2 Situation Refinement include making inferences about the measurements and observations that are available and establishing relationships between entities, events, and the environment. This section discusses ATL s concept of the functional objectives of JDL Level 2 in a DA that is being developed at ATL (Figure 2) Virtual Battlespace The Virtual Battlespace is the central Level 2 DA space in which to store objects. When the DA first encounters a new object, it instantiates it in the Virtual Battlespace, locating it, if appropriate in a spatial grid. In addition, the DA is responsible for correctly organizing observations in the Virtual Battlespace, both spatially and temporally, by grouping and queuing these observations with the objects to which they refer. The Virtual Battlespace has areas with accurate spatial dimensions to allow the placement of objects such as tanks, cities and power stations and it has areas without spatial dimensions to place objects such as the adversary leadership. The Virtual Battlespace is built in two stages. During the first, initialization phase, the Virtual Battlespace is populated with observations generated before the commencement of hostilities. These observations tend to be more strategic in nature addressing among other issues natural objects such as terrain, lakes, and forests; man-made objects such as cities, ports, bridges, roads, and railroads; and military objects such as troop camps, bunkers, airfields, and air defense sites. Also among the strategically oriented observations are those referring to political objects such as a country s leadership and ethnic groups; economic objects such as oil fields, refineries, and manufacturing centers; and religious objects such as -5-

6 mosques and holy sites. During the second execution phase, observations will typically be tactical observations such as the movement of infantry divisions or small bands of soldiers within the battlespace. The Virtual Battlespace also ensures that observations correctly update the state of objects. For example, if an observation arrives that food supplies to a training camp have been cut off, then the occupants of the camp should have their morale and effectiveness descriptors reduced Factlet Analysis Functions The Factlet Analysis Functions execute across the extent of the Virtual Battlespace, reasoning across the objects present, and within each analysis perspective, to generate both measured and inferred items of evidence, the factlets. These Functions are concerned with establishing the relationships between objects in the Virtual Battlespace. For example, the Motion Analysis Function considers the movement patterns of groups (established by the Aggregate Analysis Function) of military objects such as armored personnel carriers. The Motion Analysis Function may conclude that the current movement pattern indicates a probing behavior on the part of the adversary, rather than a full scale attack. This inference becomes a factlet. Factlets are statements or evidence about the situation in the battlespace and they form the main input to the Level 3 DA. An example of a Level 2 Factlet Analysis Function is the Economic Center of Gravity Analysis Function, which executes across the entire Virtual Battlespace and identifies objects that are likely to have economic influence on the organization. This organization could be a country or a terrorist group. A power station is likely to be a major economic center of gravity as is a cocoa plantation. On the other hand, an un-navigable river, with no hydroelectric facilities, is unlikely to be a major economic contributor to its host organization. The output of this Function is a factlet describing the economic centers of gravity for each of the red (adversary), gray (non-combatant), and blue (friendly) forces present in the battlespace Level 2 SAGE In order to form factlets, the Factlet Analysis Functions determine the information they will need for their computations. In many cases, this information will flow into Level 2 from measurements made in Level 1. In other cases, software agents will be needed to retrieve the needed data from additional information sources. SAGE, at Level 2, takes a request for data and translates it into an agent s itinerary. As an example, the Level 2 Allegiance Analysis Function assesses the likely allegiance of objects within the battlespace. Although the names of the leaders of a collection of factions within the battlespace are known, the allegiances of these factions may have not yet been stored in the allegiance perspective of the faction objects. The Allegiance Analysis Function will task the Level 2 SAGE to discover, retrieve, and process any allegiance information that it can locate on the various factions. Level 2 SAGE will use the names of the leaders of the factions as search keys within both traditional, structured and non-traditional, unstructured data sources. In addition, SAGE understands rules of association (by leveraging DAML ontologies), namely that if Joe is associated with Pierre and Pierre is associated with Organization A, then there may be some link between Joe and Organization A. 4.4 JDL LEVEL 3 THREAT REFINEMENT DA The objectives of JDL Level 3 Threat Refinement include establishing possible adversary COAs. This section discusses ATL s concept of the functional objectives of JDL Level 3 in a DA that is being developed at ATL and is shown in Figure 2 above. -6-

7 4.4.1 Threat Perspective Models The Level 3 DA contains a number of threat perspective models. Collectively, these models form Level 3 s central repository of threat intent inference information. Each model is concerned with reasoning about possible adversary COAs from a single analysis perspective. Analysis perspectives include political, economic, social and ideological. Thus, an adversary s decision to invade a neighboring country will mostly likely be analyzed in different ways depending on the analysis perspective. From a political perspective, we may conclude that the adversary will not invade as it expects a strong, military intervention from United Nations forces. From an economic perspective, however, the possibility to acquire a route to the sea may be sufficient motivation for the adversary to invade. Each threat perspective model is represented by a hierarchical graph structure. The leaf nodes within the graph correspond to factlets passed in by the Evidence Needs Evaluation component described below. The graphs provide a structure for collecting factlets under a specific perspective and then reasoning as to the likelihood of one or more adversary COAs. For example, under the ideology threat perspective model, factlets contributing to the willingness of the adversary to sacrifice forces for its beliefs, will be reasoned about in determining the likelihood of a retreat COA. The computational mechanisms to perform the fusion of factlet evidence within each graph are provided by the Evidence Fusion component discussed below Master Threat Model The Level 3 Master Threat Model (see Figure 2) is responsible for reasoning about adversary COAs by combining evidence from the entire range of analysis perspectives. The Master Threat Model is thus highly interconnected with all the Threat Perspective Models. In addition the Master Threat Model can receive factlets directly from the Evidence Needs Evaluation component. The Master Threat Model uses reasoning already performed under each analysis perspective, to further corroborate or refute hypotheses about likely adversary COAs. Considering the country invasion example introduced above, the Master Threat Model will attempt to combine the conclusions reached under the political (no invasion due to possibility of United Nation intervention) and economic (access to sea strategically valuable) perspectives to arrive at a likelihood of invasion, relative to the many other COAs open to the adversary. As with the Threat Perspective Models, the Master Threat Model relies on the Evidence Fusion component to provide the computational mechanisms to fuse evidence across the multiple analysis perspectives Evidence Needs Evaluation The Evidence Needs Evaluation component of the Level 3 DA is responsible for supplying the Threat Perspective Models and Master Threat Model (discussed above) with evidence. Evidence may be generated by calls to the Level 2 Factlet Analysis Functions and by data discovery performed by Level 3 SAGE (discussed below). Certain high priority factlets will be automatically generated by Level 2 and the Evidence Needs Evaluation component will merely route these factlets to the appropriate perspective and master models. Given that the perspective and threat models can reason over a large range of factlets, it is often the case that at any one moment, the perspective and master models lack a complete set of factlets over which to reason. At such times, the Evidence Needs Evaluation component examines the perspective and master models to generate a prioritized list of factlet needs. This list is assembled by considering the factlets, which if available, would contribute most to corroborating or refuting the current set hypotheses in the perspective and master models as to the likely adversary COAs. Once the Evidence Needs Evaluation component has assembled the prioritized list of evidence needs, it makes calls to the Level 2 Factlet Analysis Functions or to Level 3 SAGE to retrieve the missing evidence. -7-

8 4.4.4 Evidence Fusion The Evidence Fusion component of the Level 3 DA provides the computational mechanisms to fuse evidence in three areas of Level 3. Firstly, factlets grouped and routed to leaf nodes within the perspective and master models by the Evidence Needs Evaluation component must be combined. This stage of evidence fusion has to deal with conflicting evidence about the same concepts. For example, one data source may suggest that the morale of an enemy troop division is particularly low, while another source may suggest the opposite is true. Evidence Fusion takes these morale-related factlets and resolves conflicts based on, among other factors, the pedigree of the data sources. Secondly, Evidence Fusion combines evidence within each Threat Perspective Model. Evidence Fusion leverages evidence combination technology, known as the Modified Bayesian Evidence Combination (MBEC) algorithm, developed under ATL s Rotorcraft Pilot s Associate (RPA) [3]. This technology combines evidence in an efficient way, and with no need to specify a priori or conditional probability tables as required by Bayesian networks, which are typically difficult to obtain in this domain. Thirdly, Evidence Fusion combines evidence from the multiple Threat Perspective Models into the Master Threat Model. Evidence Fusion once again leverages the RPA MBEC algorithm to fuse this evidence Threat COA Generation The primary output from our Level 3 DA is the adversary s likely COAs. The Threat COA Generation component is responsible for compiling the list of the most likely adversary COAs. The Threat COA Generation component selects and ranks plausible adversary COAs suggested by the individual Threat Perspective Models and by the Master Threat Model. This selection and ranking process is based on the Level 1 track classification hypothesis generation paradigm developed by ATL under the RPA program. This approach examines the various hypotheses within the models, and from their likelihood values and from the structure of the graphs within each model, computes an optimal ranking of the hypotheses for selection and output to the intelligence analyst Level 3 SAGE The Level 3 DA contains many models that reason across information from multiple analysis perspectives. In cases where these models have incomplete information, Level 3 SAGE will be tasked to either retrieve additional information directly from the data sources or to make calls to the Level 2 Factlet Analysis Functions to generate additional factlets. 4.5 JDL LEVEL 5 HUMAN/COMPUTER COLLABORATION ATL has designed its data fusion system specifically as a decision aid for intelligence analysts, thereby explicitly recognizing the crucial role that the human/computer collaboration plays in assessing adversary COAs. The following functionality is provided by our Level 5 Human/Computer Collaboration system: The intelligence analyst is able to directly augment or override the factlets generated by the Level 2 Factlet Analysis Functions. The analyst can supply new COAs, new Threat Perspective Models, and can make modifications to existing Threat Perspective and Master Models. The DAs provide the analyst with plausible adversary COAs, along with detailed explanations of the processing steps involved. The DAs permit the analyst to call upon SAGE and COA explanation facilities on-demand. -8-

9 5 SCENARIO 5.1 OVERVIEW In order to demonstrate the processing flows of our DA and the potential impact such a DA might have in an operational environment, ATL identified the need for a scenario based on real world military entities and events. Exercising the DA against a rich, yet plausible scenario would also better demonstrate the capabilities that it could provide to support military intelligence analysts. Our selection criteria gave preference to high pedigree, public domain sources that provided rich descriptions of recent military engagements and resulted in the selection of a scenario based on the Battle of Khafji, which took place during the Gulf War between January 29, 1991 and January 31, 1991 [8, 9, 10, 11]. In the three weeks prior to the Battle of Khafji, Iraq encountered heavy and sustained losses to its forces and infrastructure. With Iraqi air defenses eliminated, the Coalition exercised its air superiority by focusing most of its air resources on SCUD batteries and Republican Guard divisions north of Khafji, Saudi Arabia. The shift of military priorities left the southern theater lightly defended, and with little coverage by the Coalition JSTARS sensor platform. Most Iraqi engagements in this area consisted of simple probing attacks that were quickly and easily repelled by Coalition forces. On January 29, 1991, Iraq decided to directly engage the Coalition forces by crossing the Saudi Arabian border with one armored and two mechanized divisions. The Iraqi forces broke through a lightly defended border crossing and continued down the main coastal road towards Khafji and Al Mishab. With Khafji deserted, the town was quickly captured by Iraqi forces on January 30, Due to pressure from the Saudi contingent of the Coalition, a plan to re-take Khafji was quickly formulated and ultimately executed successfully. Though no confirming data is available, it is speculated that the Iraqi offensive into Saudi Arabia was initiated in order to either (a) capture Coalition prisoners or (b) thwart a possible invasion by attacking the suspected Coalition staging area at the port of Al Mishab to the south of Khafji. One of the pivotal events in the days leading up to the Battle of Khafji was the change in Iraqi COAs from simple, light cross border probing incursions, to the massing and movement of a large scale force across the Saudi border. ATL s focus was to analyze whether our DAs could have anticipated this large Iraqi offensive. 5.2 DECISION AID EXECUTION This section presents a chronological account of the execution of ATL s decision aid on the Battle of Khafji scenario from the Gulf War. A variant of this scenario has also been used by ATL on the AFRL Information Institute Research Project, Adversary Intent Inferencing for Predictive Battlespace Awareness January 22, 1991: Massing On January 22, 1991, the DA has access to data from the US JSTARS platform and from other Coalition sensors that vehicles are massing in Kuwait. The DA also knows the location of various cultural features in the battlespace, such as the Kuwait Saudi border, and the location of the friendly, Coalition forces. This data is represented in the Virtual Battlespace. The Level 2 Factlet Analysis Functions then proceed with the Aggregate and Allegiance Analysis Functions and determine that the force is large and has allegiance to Iraq. These factlets are collected by the Level 3 Evidence Needs Evaluation component and routed to the Threat Perspective Models and to the Master Threat Model. The tactical perspective analysis asks whether this massing activity is taking place in proximity to any relevant battlespace features. SAGE -9-

10 accesses the intelligence databases and determines that the massing is in close proximity to both the Coalition s Marine outposts (shown in Figure 3 as numbered stars) and to the Kuwait Saudi border Marine Outpost Large force 5 Near outposts 4 Oil Field JSTARS reports 320 vehicles 2 Allegiance to Iraq Near border Iraqi Forces US Forces January 22 29, 1991: Moving Figure 3 January 22, 1991: Massing Between January 22 and 29, 1991, the DA receives observations from the JSTARS platform that the previously identified Iraqi vehicles are moving towards the Kuwait Saudi border (Figure 4). The Level 2 DA generates motion factlets, detailing that a large force is moving, with consistent velocity and direction, towards the border. The Level 3 Master Threat Model identifies a number of possible adversary COAs including a border attack, cross-border probing activity, or a training mission. SAGE is dispatched to look for additional evidence of jamming activity on behalf of the adversary - evidence that might corroborate a border attack. 6 Marine Outpost 5 4 Oil Field JSTARS reports Large force moving show heavy Consistent velocity traffic Look for evidence of attack, 2 probing or training Iraqi Forces US Forces Figure 4 January 22 29, 1991: Moving -10-

11 :30 Hours, January 29, 1991: Jamming At 18:30 hours on January 29, 1991, the DA receives observations from COMINT data sources, that the adversary is jamming friendly force communications (Figure 5). SAGE, which had been dispatched to look for evidence of jamming is now able to return positive evidence to the Threat Perspective and Master Threat Models. The border attack COA is assigned greater plausibility. SAGE is dispatched to find further evidence of a border attack including a search for evidence of an Iraqi move across the border and friendly forces taking fire. 6 Marine Outpost 5 Iraqi Look for further forces evidence of Oil attack Field 4 2 COMINT 1 7 detects jamming by Iraqi forces 8 Iraqi Forces US Forces Figure 5 18:30 Hours, January 29, 1991: Jamming :00 Hours, January 29, 1991: Engagement At 19:00 hours on January 29, 1991, the DA receives a situation report indicating that the Coalition Marine outposts are under fire and a JSTARS report showing Iraqi forces crossing the border close to a major coastal road from Kuwait into Saudi Arabia (Figure 6). Level 2 Factlet Analysis Functions 6 Marine Outpost 5 4 Oil Field SITREP Marine outpost 2 under fire JSTARS reports show Iraqi 1 forces 7 in column 8 Iraqi Forces US Forces Force-on-force attack Iraqi forces on coastal road Figure 6 19:00 Hours, January 29, 1991: Engagement -11-

12 conclude that the troop movement is down the coastal road and the Level 3 Threat COA Generation component selects and ranks a full force-on-force attack as the most plausible adversary COA. 5.3 LEVELS 2 AND 3 DECISION AIDING IMPACT Actual coalition forces, developing threat COAs manually, were unaware of the Iraqi maneuver until they were actually attacked on January 29, ATL s Level 2 and 3 Decision Aiding would have prevented the Coalition s surprise, via inferred COAs, starting one week before the attack on January 22, CONCLUSIONS The conclusions derived from our current research and development include: A key operational objective for military decision makers is the availability of automated assessments of the adversary s most likely courses of action. Such predictions represent actionable information. Currently, predictions of adversary COAs are generated by intelligence analysts using processes such as Intelligence Preparation of the Battlespace. Human analysts are limited in the volume and complexity of data that they can process. ATL has begun to design and develop decision aids to help intelligence analysts assess adversary COAs in a more accurate and timely fashion. ATL s DAs resolve adversary COA assessment as a data fusion problem. ATL s DA leverages a number of technologies developed by ATL, including the Extendable Mobile Agent Architecture, link discovery and analysis, and the evidence combination algorithms developed for the Rotorcraft Pilot s Associate. A high level overview of the execution of the DAs was shown using an experimental scenario developed from the Battle of Khafji during the Gulf War. 7 REFERENCES [1] Bell, B., Santos, E., Brown, S., Making Adversary Decision Modeling Tractable with Intent Inference and Information Fusion, 11 th Conference on CGF-BR, May 2002, Orlando, Florida. [2] Malkoff, D. and Pawlowski, A., RPA Data Fusion, 9 th National Symposium on Sensor Fusion, Vol. 1, Infrared Information Analysis Center, pp , September [3] Hofmann, M., Multi-Sensor Track Classification in Rotorcraft Pilot s Associate Data Fusion, American Helicopter Society 53 rd Annual Forum, Virginia Beach, Virginia, April 29 May 1, [4] Lentini, R., Rao, G., and Thies, J., EMAA: An Extendable Mobile Agent Architecture, AAAI Workshop, Software Tools for Developing Agents, July [5] Hofmann, M., Chacon, D., Mayer, G., Whitebread, K., CAST Agents: Network-Centric Fires Unleashed, 2001 National Fire Control Symposium: Session: Automation of the Kill Chain, August 27-30, 2001, Lihue Hawaii (Island of Kauai). [6] Air Operations Center Standard Operating Procedure Twelfth Air Force Air Force Forces, [7] Hall, D. L., Llinas, J., Handbook of Multisensor Data Fusion, CRC Press, [8] The Battle of Khafji: An Overview and Preliminary Analysis, Titus, September 1996, Airpower Research Institute, Maxwell AFB. [9] The Battle of Khafji: Implications for Airpower, Rochelle, MAJ USAF, June 1997, School of Advanced Airpower Studies, Air University, Maxwell AFB. [10] The Battle of Khafji: An Assessment of Airpower, Palmer LTC USA, Scott LTC USAF, Toolan LTC USMC, April 1998, Air War College, Air University, Maxwell AFB. [11] Airpower and The Battle of Khafji: Setting the Record Straight, Newell MAJ USAF, June 1998, School of Advanced Airpower Studies, Air University, Maxwell AFB. -12-

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040:, Development, Test & Evaluation, Army / BA 2: Applied COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY

More information

INTRODUCTION. Chapter One

INTRODUCTION. Chapter One Chapter One INTRODUCTION Traditional measures of effectiveness (MOEs) usually ignore the effects of information and decisionmaking on combat outcomes. In the past, command, control, communications, computers,

More information

UNCLASSIFIED UNCLASSIFIED

UNCLASSIFIED UNCLASSIFIED EXHIBIT R-2, RDT&E Budget Item Justification APPROPRIATION/BUDGET ACTIVITY R-1 ITEM NOMENCLATURE RESEARCH DEVELOPMENT TEST & EVALUATION, NAVY / BA-7 0305192N - JOINT MILITARY INTELLIGENCE PROGRAM Prior

More information

Team 3: Communication Aspects In Urban Operations

Team 3: Communication Aspects In Urban Operations Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2007-03 Team 3: Communication Aspects In Urban Operations Doll, T. http://hdl.handle.net/10945/35617

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Technology Development (ATD) COST ($ in Millions) Prior

More information

C4I System Solutions.

C4I System Solutions. www.aselsan.com.tr C4I SYSTEM SOLUTIONS Information dominance is the key enabler for the commanders for making accurate and faster decisions. C4I systems support the commander in situational awareness,

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate Exhibit R-2, RDT&E Budget Item Justification: PB 2011 Air Force DATE: February 2010 COST ($ in Millions) FY 2009 Actual FY 2010 FY 2012 FY 2013 FY 2014 FY 2015 To Complete Program Element 0.000 35.533

More information

A FUTURE MARITIME CONFLICT

A FUTURE MARITIME CONFLICT Chapter Two A FUTURE MARITIME CONFLICT The conflict hypothesized involves a small island country facing a large hostile neighboring nation determined to annex the island. The fact that the primary attack

More information

U.S. Air Force Electronic Systems Center

U.S. Air Force Electronic Systems Center U.S. Air Force Electronic Systems Center A Leader in Command and Control Systems By Kevin Gilmartin Electronic Systems Center The Electronic Systems Center (ESC) is a world leader in developing and fielding

More information

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations By Major Robert A. Piccerillo, USAF And David A. Brumbaugh Major Robert A.

More information

UNCLASSIFIED. FY 2017 Base FY 2017 OCO

UNCLASSIFIED. FY 2017 Base FY 2017 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2017 Office of the Secretary Of Defense Date: February 2016 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($

More information

THE UNITED STATES NAVAL WAR COLLEGE OPERATIONAL ART PRIMER

THE UNITED STATES NAVAL WAR COLLEGE OPERATIONAL ART PRIMER THE UNITED STATES NAVAL WAR COLLEGE JOINT MILITARY OPERATIONS DEPARTMENT OPERATIONAL ART PRIMER PROF. PATRICK C. SWEENEY 16 JULY 2010 INTENTIONALLY BLANK 1 The purpose of this primer is to provide the

More information

Data Mining Techniques Applied to Urban Terrain Command and Control Experimentation

Data Mining Techniques Applied to Urban Terrain Command and Control Experimentation Data Mining Techniques Applied to Urban Terrain Command and Control Experimentation Track: C2 Experimentation Authors: Janet O May (POC) U.S. Army Research Laboratory ATTN: AMSRL-CI-CT, B321 Aberdeen Proving

More information

Air Force intelligence, surveillance, and reconnaissance (ISR)

Air Force intelligence, surveillance, and reconnaissance (ISR) Airmen Delivering Decision Advantage Lt Gen Larry D. James, USAF Air Force intelligence, surveillance, and reconnaissance (ISR) provides global vigilance our hedge against strategic uncertainty and risk

More information

Annual Automated ISR and Battle Management Symposium

Annual Automated ISR and Battle Management Symposium Defense Strategies Institute professional educational forum: 6th Annual Automated ISR and Battle Management Symposium February 13-14, 2018: Mary M. Gates Learning Center 701 N. Fairfax St. Alexandria,

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8320.2 December 2, 2004 ASD(NII)/DoD CIO SUBJECT: Data Sharing in a Net-Centric Department of Defense References: (a) DoD Directive 8320.1, DoD Data Administration,

More information

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob Infantry Companies Need Intelligence Cells Submitted by Captain E.G. Koob Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated

More information

CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission. Elements of Intelligence Support. Signals Intelligence (SIGINT) Electronic Warfare (EW)

CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission. Elements of Intelligence Support. Signals Intelligence (SIGINT) Electronic Warfare (EW) CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission The IEW support mission at all echelons is to provide intelligence, EW, and CI support to help you accomplish your mission. Elements of Intelligence

More information

Joint Warfare System (JWARS)

Joint Warfare System (JWARS) Joint Warfare System (JWARS) Update to DMSO Industry Days June 4, 1999 Jim Metzger JWARS Office Web Site: http://www.dtic.mil/jwars/ e-mail: jwars@osd.pentagon.mil 6/4/99 slide 1 Agenda Background Development

More information

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of Battlefield or IPB as it is more commonly known is a Command and staff tool that allows systematic, continuous

More information

The Marine Corps Operating Concept How an Expeditionary Force Operates in the 21 st Century

The Marine Corps Operating Concept How an Expeditionary Force Operates in the 21 st Century September How an Expeditionary Force Operates in the 21st Century Key Points Our ability to execute the Marine Corps Operating Concept in the future operating environment will require a force that has:

More information

THE UNITED STATES NAVAL WAR COLLEGE

THE UNITED STATES NAVAL WAR COLLEGE NWC 1159 THE UNITED STATES NAVAL WAR COLLEGE JOINT MILITARY OPERATIONS DEPARTMENT A Guide for Deriving Operational Lessons Learned By Dr. Milan Vego, JMO Faculty 2006 A GUIDE FOR DERIVING OPERATIONAL LESSONS

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit) BUDGET ACTIVITY ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit) PE NUMBER AND TITLE and Sensor Tech COST (In Thousands) FY 2002 FY 2003 FY 2004 FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 Actual Estimate

More information

THE STRYKER BRIGADE COMBAT TEAM INFANTRY BATTALION RECONNAISSANCE PLATOON

THE STRYKER BRIGADE COMBAT TEAM INFANTRY BATTALION RECONNAISSANCE PLATOON FM 3-21.94 THE STRYKER BRIGADE COMBAT TEAM INFANTRY BATTALION RECONNAISSANCE PLATOON HEADQUARTERS DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

More information

Plan Requirements and Assess Collection. August 2014

Plan Requirements and Assess Collection. August 2014 ATP 2-01 Plan Requirements and Assess Collection August 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. Headquarters, Department of the Army This publication is available

More information

Future military operations will require close coordination and information sharing

Future military operations will require close coordination and information sharing C o a l i t i o n O p e r a t i o n s Force Templates: A Blueprint for Coalition Interaction within an Infosphere Robert E. Marmelstein, Air Force Research Laboratory Emerging architectures, such as the

More information

AGI Technology for EW and AD Dominance

AGI Technology for EW and AD Dominance AGI Technology for EW and AD Dominance Singapore 2015 Content Overview of Air Defense Overview of Electronic Warfare A practical example Value proposition Summary AMD - a multidisciplinary challenge Geography

More information

Geographic Intelligence

Geographic Intelligence MCWP 2-12.1 Geographic Intelligence U.S. Marine Corps 6 July 2000 PCN 143 000067 00 DEPARTMENT OF THE NAVY Headquarters United States Marine Corps Washington, DC 20380-1775 6 July 2000 FOREWORD Marine

More information

The first EHCC to be deployed to Afghanistan in support

The first EHCC to be deployed to Afghanistan in support The 766th Explosive Hazards Coordination Cell Leads the Way Into Afghanistan By First Lieutenant Matthew D. Brady On today s resource-constrained, high-turnover, asymmetric battlefield, assessing the threats

More information

Chapter 13 Air and Missile Defense THE AIR THREAT AND JOINT SYNERGY

Chapter 13 Air and Missile Defense THE AIR THREAT AND JOINT SYNERGY Chapter 13 Air and Missile Defense This chapter addresses air and missile defense support at the operational level of war. It includes a brief look at the air threat to CSS complexes and addresses CSS

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3100.10 October 18, 2012 USD(P) SUBJECT: Space Policy References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive (DoDD) 3100.10 (Reference (a))

More information

MECHANIZED INFANTRY PLATOON AND SQUAD (BRADLEY)

MECHANIZED INFANTRY PLATOON AND SQUAD (BRADLEY) (FM 7-7J) MECHANIZED INFANTRY PLATOON AND SQUAD (BRADLEY) AUGUST 2002 HEADQUARTERS DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *FM 3-21.71(FM

More information

First Announcement/Call For Papers

First Announcement/Call For Papers AIAA Strategic and Tactical Missile Systems Conference AIAA Missile Sciences Conference Abstract Deadline 30 June 2011 SECRET/U.S. ONLY 24 26 January 2012 Naval Postgraduate School Monterey, California

More information

Capability Integration

Capability Integration SoS/Interoperability IPT Integrating Lockheed Martin Strengths Realizing Military Value Integration Framework for Developing C4ISTAR Solutions Dr David Sundstrom Director, Network Centric 21 September

More information

Infantry Battalion Operations

Infantry Battalion Operations .3 Section II Infantry Battalion Operations MCWP 3-35 2201. Overview. This section addresses some of the operations that a task-organized and/or reinforced infantry battalion could conduct in MOUT. These

More information

UNCLASSIFIED. Unclassified

UNCLASSIFIED. Unclassified Clinton Administration 1993 - National security space activities shall contribute to US national security by: - supporting right of self-defense of US, allies and friends - deterring, warning, and defending

More information

Response to the. Call for Papers on Operational Challenges. Topic #4

Response to the. Call for Papers on Operational Challenges. Topic #4 Response to the Call for Papers on Operational Challenges Topic #4 How to ensure the speed of decision-making keeps pace with the speed of action on the battlefield 5 December, 2016 Proposed by Captain

More information

Responsive Decision Making through Automated Policy-Enabled Systems

Responsive Decision Making through Automated Policy-Enabled Systems Responsive Decision Making through Automated Policy-Enabled Systems Anne-Marie Buibish Amy Lange Michael Woitalla Raytheon Company Network Centric Systems 1010 Production Road Fort Wayne, IN 46808-4106

More information

Military Radar Applications

Military Radar Applications Military Radar Applications The Concept of the Operational Military Radar The need arises during the times of the hostilities on the tactical, operational and strategic levels. General importance defensive

More information

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations 2004 Command and Control Research and Technology Symposium The Power of Information Age Concepts and Technologies Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance

More information

CHAPTER 10. PATROL PREPARATION

CHAPTER 10. PATROL PREPARATION CHAPTER 10. PATROL PREPARATION For a patrol to succeed, all members must be well trained, briefed, and rehearsed. The patrol leader must have a complete understanding of the mission and a thorough understanding

More information

Managing Dynamic Collaborative Action Teams in a Net-Centric Environment

Managing Dynamic Collaborative Action Teams in a Net-Centric Environment Page 1 Managing Dynamic Collaborative Action Teams in a Net-Centric Environment Christine O. Salamacha Christine.Salamach@jhuapl.edu Dr. Steve Forsythe Steve.Forsythe@jhuapl.edu N. Ray Briscoe Ray.Briscoe@jhuapl.edu

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Army DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program

More information

The Concept of C2 Communication and Information Support

The Concept of C2 Communication and Information Support The Concept of C2 Communication and Information Support LTC. Ludek LUKAS Military Academy/K-302 Kounicova str.65, 612 00 Brno, Czech Republic tel.: +420 973 444834 fax:+420 973 444832 e-mail: ludek.lukas@vabo.cz

More information

From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View

From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View Medhat A. Abuhantash U.S. Army, Communications and Electronics Command (CECOM), Software Engineering Center (SEC), Battlespace

More information

LESSON 2 INTELLIGENCE PREPARATION OF THE BATTLEFIELD OVERVIEW

LESSON 2 INTELLIGENCE PREPARATION OF THE BATTLEFIELD OVERVIEW LESSON DESCRIPTION: LESSON 2 INTELLIGENCE PREPARATION OF THE BATTLEFIELD OVERVIEW In this lesson you will learn the requirements and procedures surrounding intelligence preparation of the battlefield (IPB).

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 15-1 12 NOVEMBER 2015 Weather WEATHER OPERATIONS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications and forms

More information

Tactical Technology Office

Tactical Technology Office Tactical Technology Office Dr. Bradford Tousley, Director DARPA Tactical Technology Office Briefing prepared for NDIA s 2017 Ground Robotics Capabilities Conference & Exhibition March 22, 2017 1 Breakthrough

More information

TMD IPB MARCH 2002 AIR LAND SEA APPLICATION CENTER ARMY, MARINE CORPS, NAVY, AIR FORCE MULTISERVICE TACTICS, TECHNIQUES, AND PROCEDURES

TMD IPB MARCH 2002 AIR LAND SEA APPLICATION CENTER ARMY, MARINE CORPS, NAVY, AIR FORCE MULTISERVICE TACTICS, TECHNIQUES, AND PROCEDURES ARMY, MARINE CORPS, NAVY, AIR FORCE TMD IPB MULTISERVICE TACTICS, TECHNIQUES, AND PROCEDURES FOR THEATER MISSILE DEFENSE INTELLIGENCE PREPARATION OF THE BATTLESPACE FM 3-01.16 MCWP 2-12.1A NTTP 2-01.2

More information

UNCLASSIFIED. FY 2017 Base FY 2017 OCO

UNCLASSIFIED. FY 2017 Base FY 2017 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2017 Office of the Secretary Of Defense Date: February 2016 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development

More information

COMMON AVIATION COMMAND AND CONTROL SYSTEM

COMMON AVIATION COMMAND AND CONTROL SYSTEM Section 6.3 PEO LS Program COMMON AVIATION COMMAND AND CONTROL SYSTEM CAC2S Program Background The Common Aviation Command and Control System (CAC2S) is a modernization effort to replace the existing aviation

More information

Global Vigilance, Global Reach, Global Power for America

Global Vigilance, Global Reach, Global Power for America Global Vigilance, Global Reach, Global Power for America The World s Greatest Air Force Powered by Airmen, Fueled by Innovation Gen Mark A. Welsh III, USAF The Air Force has been certainly among the most

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit) BUDGET ACTIVITY ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit) PE NUMBER AND TITLE 2 - Applied Research 0602308A - Advanced Concepts and Simulation COST (In Thousands) FY 2002 FY 2003 FY 2004 FY 2005

More information

Chapter FM 3-19

Chapter FM 3-19 Chapter 5 N B C R e c o n i n t h e C o m b a t A r e a During combat operations, NBC recon units operate throughout the framework of the battlefield. In the forward combat area, NBC recon elements are

More information

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness) Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness) The Nation's Army in Cyberspace OVERALL CLASSIFICATION: US Army Cyber Command and Second Army 1 COL Mark Schonberg,

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Task Number: 01-6-0416 Task Title: Conduct Aviation Missions as part of an Area Defense Supporting Reference(s): Step Number Reference ID Reference Name Required

More information

Mission Threads: Bridging Mission and Systems Engineering

Mission Threads: Bridging Mission and Systems Engineering Mission Threads: Bridging Mission and Systems Engineering Dr. Greg Butler Engility Corp Dr. Carol Woody Software Engineering Institute SoSECIE Webinar June 20, 2017 Any opinions, findings and conclusions,

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Technology Development (ATD) COST ($ in Millions) Prior

More information

UNCLASSIFIED FY 2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2008 Exhibit R-2

UNCLASSIFIED FY 2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2008 Exhibit R-2 Exhibit R-2 PROGRAM ELEMENT: 0605155N PROGRAM ELEMENT TITLE: FLEET TACTICAL DEVELOPMENT AND EVALUATION COST: (Dollars in Thousands) Project Number & Title FY 2007 Actual FY 2008 FY 2009 FY 2010 FY 2011

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) Exhibit R-2 0602712A Countermine Systems ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 Total Program Element (PE) Cost 26267 29171 22088 21965

More information

More Data From Desert

More Data From Desert USAF has released additional information about the Persian Gulf War, which opened five years ago this month. More Data From Desert PERATION Desert Storm Obegan on January 17, 1991, led off by a ferocious

More information

HEADQUARTERS DEPARTMENT OF THE ARMY FM US ARMY AIR AND MISSILE DEFENSE OPERATIONS

HEADQUARTERS DEPARTMENT OF THE ARMY FM US ARMY AIR AND MISSILE DEFENSE OPERATIONS HEADQUARTERS DEPARTMENT OF THE ARMY FM 44-100 US ARMY AIR AND MISSILE DEFENSE OPERATIONS Distribution Restriction: Approved for public release; distribution is unlimited FM 44-100 Field Manual No. 44-100

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Technology Development (ATD) COST ($ in Millions) Prior

More information

UNCLASSIFIED FY 2008/2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2007 Exhibit R-2

UNCLASSIFIED FY 2008/2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2007 Exhibit R-2 Exhibit R-2 PROGRAM ELEMENT: 0605155N PROGRAM ELEMENT TITLE: FLEET TACTICAL DEVELOPMENT AND EVALUATION COST: (Dollars in Thousands) Project Number & Title FY 2006 Actual FY 2007 FY 2008 FY 2009 FY 2010

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit) BUDGET ACTIVITY ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit) PE NUMBER AND TITLE Sensor Tech COST (In Thousands) FY 2000 FY 2001 FY 2002 FY 2003 FY 2004 FY 2005 FY 2006 FY 2007 Cost to Total Cost

More information

Detect, Deny, Disrupt, Degrade and Evade Lethal Threats. Advanced Survivability Suite Solutions for Mission Success

Detect, Deny, Disrupt, Degrade and Evade Lethal Threats. Advanced Survivability Suite Solutions for Mission Success Detect, Deny, Disrupt, Degrade and Evade Lethal Threats Advanced Survivability Suite Solutions for Mission Success Countering Smart and Adaptive Threats Military pilots and aircrews must be prepared to

More information

DANGER WARNING CAUTION

DANGER WARNING CAUTION Training and Evaluation Outline Report Task Number: 01-6-0447 Task Title: Coordinate Intra-Theater Lift Supporting Reference(s): Step Number Reference ID Reference Name Required Primary ATTP 4-0.1 Army

More information

This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in

This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in 1 This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in the JCIDS process is CJCSI 3010.02, entitled Joint Operations

More information

552nd ACW (Air Control Wing), 2000, informal paper defining C2ISR package commander, 552 ACW/552 OSS, Tinker AFB, Okla.

552nd ACW (Air Control Wing), 2000, informal paper defining C2ISR package commander, 552 ACW/552 OSS, Tinker AFB, Okla. REFERENCES 552nd ACW (Air Control Wing), 2000, informal paper defining C2ISR package commander, 552 ACW/552 OSS, Tinker AFB, Okla. 93rd ACW, 1998, Draft Tactics Techniques and Procedures (TTP) for 93rd

More information

GLOBAL INFORMATION GRID NETOPS TASKING ORDERS (GNTO) WHITE PAPER.

GLOBAL INFORMATION GRID NETOPS TASKING ORDERS (GNTO) WHITE PAPER. . Introduction This White Paper advocates United States Strategic Command s (USSTRATCOM) Joint Task Force Global Network Operations (JTF-GNO) and/or AF Network Operations (AFNETOPS) conduct concept and

More information

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July 2009 Since the early days of the Revolutionary War,

More information

Fiscal Year (FY) 2011 Budget Estimates

Fiscal Year (FY) 2011 Budget Estimates Fiscal Year (FY) 2011 Budget Estimates Attack the Network Defeat the Device Tr ai n the Force February 2010 JUSTIFICATION OF FISCAL YEAR (FY) 2011 BUDGET ESTIMATES Table of Contents - Joint Improvised

More information

Sense And Respond: A Paradigm for Future Integration of Information Technology into Command and Control Operations

Sense And Respond: A Paradigm for Future Integration of Information Technology into Command and Control Operations Sense And Respond: A Paradigm for Future Integration of Information Technology into Command and Control Operations Colonel Art Corbett, USMC Marine Corps Combat Development Command Director, Futures Warfighting

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Task Number: 01-6-0029 Task Title: Maintain the BCT Current Situation for Aviation Supporting Reference(s): Step Number Reference ID Reference Name Required Primary

More information

Naval Unmanned Combat Air Vehicle

Naval Unmanned Combat Air Vehicle Naval Unmanned Combat Air Vehicle Advanced Technology Program TTO Tactical Technology Office Dr. William Scheuren DARPA/TTO wscheuren@darpa.mil (703) 696-2321 UCAV-N Vision ❶ Revolutionary New Ship-based

More information

Intelligence Support for Military Operations Using

Intelligence Support for Military Operations Using Intelligence Support for Military Operations Using the ArcGIS Platform April 2016 Copyright 2016 Esri All rights reserved. Printed in the United States of America. The information contained in this document

More information

Engineering Operations

Engineering Operations MCWP 3-17 Engineering Operations U.S. Marine Corps PCN 143 000044 00 To Our Readers Changes: Readers of this publication are encouraged to submit suggestions and changes that will improve it. Recommendations

More information

Research Proposal Major William Torn Tompkins ISR RTF Vigilant Horizons. Working Title

Research Proposal Major William Torn Tompkins ISR RTF Vigilant Horizons. Working Title Working Title Multi-Domain Command and Control of ISR: Ensuring support to Unit Level Intelligence DISCLAIMER The views expressed in this academic research paper are those of the author and do not reflect

More information

Defense Daily Open Architecture Summit EMS Panel

Defense Daily Open Architecture Summit EMS Panel Defense Daily Open Architecture Summit EMS Panel 4 November 2014 Dr. Richard Wittstruck PEO IEW&S Acting DPEO Defense Daily Open Architecture Summit 4 NOV 2014 1 IEWS Concept of Operations IEWS CONOPS:

More information

The Patriot Missile Failure

The Patriot Missile Failure The Patriot Missile Failure GAO United States General Accounting Office Washington, D.C. 20548 Information Management and Technology Division B-247094 February 4, 1992 The Honorable Howard Wolpe Chairman,

More information

The main tasks and joint force application of the Hungarian Air Force

The main tasks and joint force application of the Hungarian Air Force AARMS Vol. 7, No. 4 (2008) 685 692 SECURITY The main tasks and joint force application of the Hungarian Air Force ZOLTÁN OROSZ Hungarian Defence Forces, Budapest, Hungary The tasks and joint force application

More information

Activity: Persian Gulf War. Warm Up: What do you already know about the Persian Gulf War? Who was involved? When did it occur?

Activity: Persian Gulf War. Warm Up: What do you already know about the Persian Gulf War? Who was involved? When did it occur? Activity: Persian Gulf War Warm Up: What do you already know about the Persian Gulf War? Who was involved? When did it occur? DESERT STORM PERSIAN GULF WAR (1990-91) WHAT ABOUT KUWAIT S GEOGRAPHICAL LOCATION

More information

(QJLQHHU 5HFRQQDLVVDQFH FM Headquarters, Department of the Army

(QJLQHHU 5HFRQQDLVVDQFH FM Headquarters, Department of the Army FM 5-170 (QJLQHHU 5HFRQQDLVVDQFH Headquarters, Department of the Army DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *FM 5-170 Field Manual No. 5-170 Headquarters Department

More information

Stability Assessment Framework Quick Reference Guide. Stability Operations

Stability Assessment Framework Quick Reference Guide. Stability Operations Stability Assessment Framework Quick Reference Guide The Stability Assessment Framework (SAF) is an analytical, planning, and programming tool designed to support civilmilitary operations planning, the

More information

UNCLASSIFIED UNCLASSIFIED

UNCLASSIFIED UNCLASSIFIED (U) COST: (Dollars in Thousands) PROJECT NUMBER & TITLE FY 2000 ACTUAL FY 2001 ESTIMATE FY 2002 ESTIMATE ** ** 83,557 CONT. ** The Science and Technology Program Elements (PEs) were restructured in FY

More information

HUMAN RESOURCES ADVANCED / SENIOR LEADERS COURSE 42A

HUMAN RESOURCES ADVANCED / SENIOR LEADERS COURSE 42A HUMAN RESOURCES ADVANCED / SENIOR LEADERS COURSE 42A FACILITATED ARTICLE #25 Doctrine at the Speed of War A 21 st Century Paradigm For Army Knowledge January 2013 From Army Magazine, March 2012. Copyright

More information

Science and Technology Conference for Chem-Bio Information Systems

Science and Technology Conference for Chem-Bio Information Systems Science and Technology Conference for Chem-Bio Information Systems Joint Requirements Office for Chemical, Biological, Radiological, and Nuclear Defense (JRO for CBRND) 24-28 October 2005 1 JRO CBRN Defense

More information

GOOD MORNING I D LIKE TO UNDERSCORE THREE OF ITS KEY POINTS:

GOOD MORNING I D LIKE TO UNDERSCORE THREE OF ITS KEY POINTS: Keynote by Dr. Thomas A. Kennedy Chairman and CEO of Raytheon Association of Old Crows Symposium Marriott Marquis Hotel Washington, D.C. 12.2.15 AS DELIVERED GOOD MORNING THANK YOU, GENERAL ISRAEL FOR

More information

10 th INTERNATIONAL COMMAND AND CONTROL RESEARCH AND TECHNOLOGY SYMPOSIUM THE FUTURE OF C2

10 th INTERNATIONAL COMMAND AND CONTROL RESEARCH AND TECHNOLOGY SYMPOSIUM THE FUTURE OF C2 10 th INTERNATIONAL COMMAND AND CONTROL RESEARCH AND TECHNOLOGY SYMPOSIUM THE FUTURE OF C2 Air Warfare Battlelab Initiative for Stabilized Portable Optical Target Tracking Receiver (SPOTTR) Topic Track:

More information

Preparing to Occupy. Brigade Support Area. and Defend the. By Capt. Shayne D. Heap and Lt. Col. Brent Coryell

Preparing to Occupy. Brigade Support Area. and Defend the. By Capt. Shayne D. Heap and Lt. Col. Brent Coryell Preparing to Occupy and Defend the Brigade Support Area By Capt. Shayne D. Heap and Lt. Col. Brent Coryell A Soldier from 123rd Brigade Support Battalion, 3rd Brigade Combat Team, 1st Armored Division,

More information

mm*. «Stag GAO BALLISTIC MISSILE DEFENSE Information on Theater High Altitude Area Defense (THAAD) and Other Theater Missile Defense Systems 1150%

mm*. «Stag GAO BALLISTIC MISSILE DEFENSE Information on Theater High Altitude Area Defense (THAAD) and Other Theater Missile Defense Systems 1150% GAO United States General Accounting Office Testimony Before the Committee on Foreign Relations, U.S. Senate For Release on Delivery Expected at 10:00 a.m.,edt Tuesday May 3,1994 BALLISTIC MISSILE DEFENSE

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 90-16 31 AUGUST 2011 Special Management STUDIES AND ANALYSES, ASSESSMENTS AND LESSONS LEARNED COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

More information

SIMULATION AS A MISSION PLANNING AND REHEARSAL TOOL. William M. Garrabrants

SIMULATION AS A MISSION PLANNING AND REHEARSAL TOOL. William M. Garrabrants Proceedings of the 1998 Winter Simulation Conference D.J. Medeiros, E.F. Watson, J.S. Carson and M.S. Manivannan, eds. SIMULATION AS A MISSION PLANNING AND REHEARSAL TOOL William M. Garrabrants VisiCom

More information

FIGHTER DATA LINK (FDL)

FIGHTER DATA LINK (FDL) FIGHTER DATA LINK (FDL) Joint ACAT ID Program (Navy Lead) Prime Contractor Total Number of Systems: 685 Boeing Platform Integration Total Program Cost (TY$): $180M Data Link Solutions FDL Terminal Average

More information

Information Operations

Information Operations Information Operations Air Force Doctrine Document 2 5 5 August 1998 BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE DOCTRINE DOCUMENT 2 5 5 AUGUST 1998 OPR: HQ AFDC/DR (Maj Stephen L. Meyer, USAF)

More information

JFHQ DODIN Update. The overall classification of this briefing is: UNCLASSIFIED Lt Col Patrick Daniel JFHQ-DODIN J5 As of: 21 April 2016 UNCLASSIFIED

JFHQ DODIN Update. The overall classification of this briefing is: UNCLASSIFIED Lt Col Patrick Daniel JFHQ-DODIN J5 As of: 21 April 2016 UNCLASSIFIED JFHQ DODIN Update The overall classification of this briefing is: Lt Col Patrick Daniel JFHQ-DODIN J5 As of: 21 April 2016 1 Presentation Disclaimer "The information provided in this briefing is for general

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Development (ATD) COST ($ in Millions) Prior Years FY

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Central Test and Evaluation Investment Program (CTEIP) FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Central Test and Evaluation Investment Program (CTEIP) FY 2011 Total Estimate. FY 2011 OCO Estimate COST ($ in Millions) FY 2009 Actual FY 2010 FY 2012 FY 2013 FY 2014 FY 2015 Cost To Complete Program Element 143.612 160.959 162.286 0.000 162.286 165.007 158.842 156.055 157.994 Continuing Continuing

More information

The Verification for Mission Planning System

The Verification for Mission Planning System 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 The Verification for Mission Planning System Lin ZHANG *, Wei-Ming CHENG and Hua-yun

More information

The Tactical Engagement Team Concept: Operational Employment of DCGS-A in Support of Mission Command

The Tactical Engagement Team Concept: Operational Employment of DCGS-A in Support of Mission Command The Tactical Engagement Team Concept: Operational Employment of DCGS-A in Support of Mission Command Introduction MG Robert P. Ashley COL William L. Edwards As the Army faces the challenges of the new

More information